Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qgdf1HLJno.exe

Overview

General Information

Sample name:qgdf1HLJno.exe
renamed because original name is a hash value
Original sample name:0b0b4093391e1eb14216f9328dd73e2b.exe
Analysis ID:1505784
MD5:0b0b4093391e1eb14216f9328dd73e2b
SHA1:4ecb8b2e427c8d22eaa2c77dfef134210f38fc07
SHA256:b57bf92cf01f32b1df6b540fea73cabcfda60e1cc2111d644521f6db42eac39f
Tags:exeSocks5Systemz
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Found API chain indicative of debugger detection
Machine Learning detection for dropped file
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • qgdf1HLJno.exe (PID: 6792 cmdline: "C:\Users\user\Desktop\qgdf1HLJno.exe" MD5: 0B0B4093391E1EB14216F9328DD73E2B)
    • qgdf1HLJno.tmp (PID: 6864 cmdline: "C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp" /SL5="$10412,3558674,54272,C:\Users\user\Desktop\qgdf1HLJno.exe" MD5: 77DCBC20C2F217DC78610C5795A55F30)
      • ffmpegsmartgui32_64.exe (PID: 6936 cmdline: "C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe" -i MD5: 096271271557E1A33376E74C764F46EF)
  • cleanup
{"C2 list": ["aiqorjv.ru"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2907391186.0000000002AEA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: ffmpegsmartgui32_64.exe PID: 6936JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-09-06T19:52:49.782928+020020494671A Network Trojan was detected192.168.2.449736185.196.8.21480TCP
        2024-09-06T19:52:52.693625+020020494671A Network Trojan was detected192.168.2.449736185.196.8.21480TCP
        2024-09-06T19:52:53.044490+020020494671A Network Trojan was detected192.168.2.449736185.196.8.21480TCP
        2024-09-06T19:52:53.867346+020020494671A Network Trojan was detected192.168.2.449740185.196.8.21480TCP
        2024-09-06T19:52:54.220857+020020494671A Network Trojan was detected192.168.2.449740185.196.8.21480TCP
        2024-09-06T19:52:55.025750+020020494671A Network Trojan was detected192.168.2.449741185.196.8.21480TCP
        2024-09-06T19:52:55.841500+020020494671A Network Trojan was detected192.168.2.449742185.196.8.21480TCP
        2024-09-06T19:52:56.671160+020020494671A Network Trojan was detected192.168.2.449743185.196.8.21480TCP
        2024-09-06T19:52:57.630991+020020494671A Network Trojan was detected192.168.2.449744185.196.8.21480TCP
        2024-09-06T19:52:57.979664+020020494671A Network Trojan was detected192.168.2.449744185.196.8.21480TCP
        2024-09-06T19:52:58.795934+020020494671A Network Trojan was detected192.168.2.449745185.196.8.21480TCP
        2024-09-06T19:52:59.636862+020020494671A Network Trojan was detected192.168.2.449746185.196.8.21480TCP
        2024-09-06T19:53:00.471051+020020494671A Network Trojan was detected192.168.2.449747185.196.8.21480TCP
        2024-09-06T19:53:01.286711+020020494671A Network Trojan was detected192.168.2.449748185.196.8.21480TCP
        2024-09-06T19:53:01.646691+020020494671A Network Trojan was detected192.168.2.449748185.196.8.21480TCP
        2024-09-06T19:53:02.477744+020020494671A Network Trojan was detected192.168.2.449749185.196.8.21480TCP
        2024-09-06T19:53:03.308477+020020494671A Network Trojan was detected192.168.2.449750185.196.8.21480TCP
        2024-09-06T19:53:04.154627+020020494671A Network Trojan was detected192.168.2.449751185.196.8.21480TCP
        2024-09-06T19:53:04.959648+020020494671A Network Trojan was detected192.168.2.449752185.196.8.21480TCP
        2024-09-06T19:53:05.314692+020020494671A Network Trojan was detected192.168.2.449752185.196.8.21480TCP
        2024-09-06T19:53:06.179803+020020494671A Network Trojan was detected192.168.2.449753185.196.8.21480TCP
        2024-09-06T19:53:07.000725+020020494671A Network Trojan was detected192.168.2.449754185.196.8.21480TCP
        2024-09-06T19:53:07.812218+020020494671A Network Trojan was detected192.168.2.449755185.196.8.21480TCP
        2024-09-06T19:53:08.631133+020020494671A Network Trojan was detected192.168.2.449756185.196.8.21480TCP
        2024-09-06T19:53:08.978513+020020494671A Network Trojan was detected192.168.2.449756185.196.8.21480TCP
        2024-09-06T19:53:09.798632+020020494671A Network Trojan was detected192.168.2.449757185.196.8.21480TCP
        2024-09-06T19:53:10.630206+020020494671A Network Trojan was detected192.168.2.449758185.196.8.21480TCP
        2024-09-06T19:53:10.979197+020020494671A Network Trojan was detected192.168.2.449758185.196.8.21480TCP
        2024-09-06T19:53:11.818431+020020494671A Network Trojan was detected192.168.2.449759185.196.8.21480TCP
        2024-09-06T19:53:12.173813+020020494671A Network Trojan was detected192.168.2.449759185.196.8.21480TCP
        2024-09-06T19:53:12.998857+020020494671A Network Trojan was detected192.168.2.449760185.196.8.21480TCP
        2024-09-06T19:53:13.823982+020020494671A Network Trojan was detected192.168.2.449761185.196.8.21480TCP
        2024-09-06T19:53:14.646518+020020494671A Network Trojan was detected192.168.2.449762185.196.8.21480TCP
        2024-09-06T19:53:14.999795+020020494671A Network Trojan was detected192.168.2.449762185.196.8.21480TCP
        2024-09-06T19:53:15.950501+020020494671A Network Trojan was detected192.168.2.449763185.196.8.21480TCP
        2024-09-06T19:53:16.771874+020020494671A Network Trojan was detected192.168.2.449764185.196.8.21480TCP
        2024-09-06T19:53:17.125198+020020494671A Network Trojan was detected192.168.2.449764185.196.8.21480TCP
        2024-09-06T19:53:17.928145+020020494671A Network Trojan was detected192.168.2.449765185.196.8.21480TCP
        2024-09-06T19:53:18.286780+020020494671A Network Trojan was detected192.168.2.449765185.196.8.21480TCP
        2024-09-06T19:53:18.635499+020020494671A Network Trojan was detected192.168.2.449765185.196.8.21480TCP
        2024-09-06T19:53:19.450030+020020494671A Network Trojan was detected192.168.2.449766185.196.8.21480TCP
        2024-09-06T19:53:20.294461+020020494671A Network Trojan was detected192.168.2.449767185.196.8.21480TCP
        2024-09-06T19:53:21.113247+020020494671A Network Trojan was detected192.168.2.449768185.196.8.21480TCP
        2024-09-06T19:53:21.463197+020020494671A Network Trojan was detected192.168.2.449768185.196.8.21480TCP
        2024-09-06T19:53:22.299828+020020494671A Network Trojan was detected192.168.2.449769185.196.8.21480TCP
        2024-09-06T19:53:22.652758+020020494671A Network Trojan was detected192.168.2.449769185.196.8.21480TCP
        2024-09-06T19:53:23.631474+020020494671A Network Trojan was detected192.168.2.449770185.196.8.21480TCP
        2024-09-06T19:53:24.452510+020020494671A Network Trojan was detected192.168.2.449771185.196.8.21480TCP
        2024-09-06T19:53:25.263538+020020494671A Network Trojan was detected192.168.2.449772185.196.8.21480TCP
        2024-09-06T19:53:26.133938+020020494671A Network Trojan was detected192.168.2.449773185.196.8.21480TCP
        2024-09-06T19:53:26.481842+020020494671A Network Trojan was detected192.168.2.449773185.196.8.21480TCP
        2024-09-06T19:53:27.307980+020020494671A Network Trojan was detected192.168.2.449774185.196.8.21480TCP
        2024-09-06T19:53:28.168799+020020494671A Network Trojan was detected192.168.2.449775185.196.8.21480TCP
        2024-09-06T19:53:29.023584+020020494671A Network Trojan was detected192.168.2.449776185.196.8.21480TCP
        2024-09-06T19:53:29.374135+020020494671A Network Trojan was detected192.168.2.449776185.196.8.21480TCP
        2024-09-06T19:53:30.210531+020020494671A Network Trojan was detected192.168.2.449777185.196.8.21480TCP
        2024-09-06T19:53:30.560548+020020494671A Network Trojan was detected192.168.2.449777185.196.8.21480TCP
        2024-09-06T19:53:31.404527+020020494671A Network Trojan was detected192.168.2.449778185.196.8.21480TCP
        2024-09-06T19:53:32.227490+020020494671A Network Trojan was detected192.168.2.449779185.196.8.21480TCP
        2024-09-06T19:53:32.586238+020020494671A Network Trojan was detected192.168.2.449779185.196.8.21480TCP
        2024-09-06T19:53:33.431921+020020494671A Network Trojan was detected192.168.2.449780185.196.8.21480TCP
        2024-09-06T19:53:34.255850+020020494671A Network Trojan was detected192.168.2.449781185.196.8.21480TCP
        2024-09-06T19:53:34.601842+020020494671A Network Trojan was detected192.168.2.449781185.196.8.21480TCP
        2024-09-06T19:53:34.946479+020020494671A Network Trojan was detected192.168.2.449781185.196.8.21480TCP
        2024-09-06T19:53:35.295901+020020494671A Network Trojan was detected192.168.2.449781185.196.8.21480TCP
        2024-09-06T19:53:36.174263+020020494671A Network Trojan was detected192.168.2.449782185.196.8.21480TCP
        2024-09-06T19:53:37.052507+020020494671A Network Trojan was detected192.168.2.449783185.196.8.21480TCP
        2024-09-06T19:53:37.968781+020020494671A Network Trojan was detected192.168.2.449784185.196.8.21480TCP
        2024-09-06T19:53:38.795697+020020494671A Network Trojan was detected192.168.2.449785185.196.8.21480TCP
        2024-09-06T19:53:39.678947+020020494671A Network Trojan was detected192.168.2.449786185.196.8.21480TCP
        2024-09-06T19:53:40.521170+020020494671A Network Trojan was detected192.168.2.449787185.196.8.21480TCP
        2024-09-06T19:53:40.867660+020020494671A Network Trojan was detected192.168.2.449787185.196.8.21480TCP
        2024-09-06T19:53:41.222104+020020494671A Network Trojan was detected192.168.2.449787185.196.8.21480TCP
        2024-09-06T19:53:41.668515+020020494671A Network Trojan was detected192.168.2.449787185.196.8.21480TCP
        2024-09-06T19:53:42.512973+020020494671A Network Trojan was detected192.168.2.449788185.196.8.21480TCP
        2024-09-06T19:53:43.341694+020020494671A Network Trojan was detected192.168.2.449789185.196.8.21480TCP
        2024-09-06T19:53:44.163221+020020494671A Network Trojan was detected192.168.2.449790185.196.8.21480TCP
        2024-09-06T19:53:44.509885+020020494671A Network Trojan was detected192.168.2.449790185.196.8.21480TCP
        2024-09-06T19:53:45.559489+020020494671A Network Trojan was detected192.168.2.449791185.196.8.21480TCP
        2024-09-06T19:53:46.395520+020020494671A Network Trojan was detected192.168.2.449792185.196.8.21480TCP
        2024-09-06T19:53:46.747385+020020494671A Network Trojan was detected192.168.2.449792185.196.8.21480TCP
        2024-09-06T19:53:47.556149+020020494671A Network Trojan was detected192.168.2.449793185.196.8.21480TCP
        2024-09-06T19:53:47.898036+020020494671A Network Trojan was detected192.168.2.449793185.196.8.21480TCP
        2024-09-06T19:53:48.758439+020020494671A Network Trojan was detected192.168.2.449794185.196.8.21480TCP
        2024-09-06T19:53:49.568765+020020494671A Network Trojan was detected192.168.2.449795185.196.8.21480TCP
        2024-09-06T19:53:50.371973+020020494671A Network Trojan was detected192.168.2.449796185.196.8.21480TCP
        2024-09-06T19:53:51.189728+020020494671A Network Trojan was detected192.168.2.449797185.196.8.21480TCP
        2024-09-06T19:53:52.774390+020020494671A Network Trojan was detected192.168.2.449798185.196.8.21480TCP
        2024-09-06T19:53:53.594895+020020494671A Network Trojan was detected192.168.2.449799185.196.8.21480TCP
        2024-09-06T19:53:54.430894+020020494671A Network Trojan was detected192.168.2.449800185.196.8.21480TCP
        2024-09-06T19:53:55.250974+020020494671A Network Trojan was detected192.168.2.449801185.196.8.21480TCP
        2024-09-06T19:53:56.067004+020020494671A Network Trojan was detected192.168.2.449802185.196.8.21480TCP
        2024-09-06T19:53:56.918973+020020494671A Network Trojan was detected192.168.2.449803185.196.8.21480TCP
        2024-09-06T19:53:57.757151+020020494671A Network Trojan was detected192.168.2.449804185.196.8.21480TCP
        2024-09-06T19:53:58.592939+020020494671A Network Trojan was detected192.168.2.449805185.196.8.21480TCP
        2024-09-06T19:53:59.457944+020020494671A Network Trojan was detected192.168.2.449806185.196.8.21480TCP
        2024-09-06T19:54:00.293095+020020494671A Network Trojan was detected192.168.2.449807185.196.8.21480TCP
        2024-09-06T19:54:01.148735+020020494671A Network Trojan was detected192.168.2.449808185.196.8.21480TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-09-06T19:52:49.782928+020020501121A Network Trojan was detected192.168.2.449736185.196.8.21480TCP
        2024-09-06T19:52:52.693625+020020501121A Network Trojan was detected192.168.2.449736185.196.8.21480TCP
        2024-09-06T19:52:53.044490+020020501121A Network Trojan was detected192.168.2.449736185.196.8.21480TCP
        2024-09-06T19:52:53.867346+020020501121A Network Trojan was detected192.168.2.449740185.196.8.21480TCP
        2024-09-06T19:52:54.220857+020020501121A Network Trojan was detected192.168.2.449740185.196.8.21480TCP
        2024-09-06T19:52:55.025750+020020501121A Network Trojan was detected192.168.2.449741185.196.8.21480TCP
        2024-09-06T19:52:55.841500+020020501121A Network Trojan was detected192.168.2.449742185.196.8.21480TCP
        2024-09-06T19:52:56.671160+020020501121A Network Trojan was detected192.168.2.449743185.196.8.21480TCP
        2024-09-06T19:52:57.630991+020020501121A Network Trojan was detected192.168.2.449744185.196.8.21480TCP
        2024-09-06T19:52:57.979664+020020501121A Network Trojan was detected192.168.2.449744185.196.8.21480TCP
        2024-09-06T19:52:58.795934+020020501121A Network Trojan was detected192.168.2.449745185.196.8.21480TCP
        2024-09-06T19:52:59.636862+020020501121A Network Trojan was detected192.168.2.449746185.196.8.21480TCP
        2024-09-06T19:53:00.471051+020020501121A Network Trojan was detected192.168.2.449747185.196.8.21480TCP
        2024-09-06T19:53:01.286711+020020501121A Network Trojan was detected192.168.2.449748185.196.8.21480TCP
        2024-09-06T19:53:01.646691+020020501121A Network Trojan was detected192.168.2.449748185.196.8.21480TCP
        2024-09-06T19:53:02.477744+020020501121A Network Trojan was detected192.168.2.449749185.196.8.21480TCP
        2024-09-06T19:53:03.308477+020020501121A Network Trojan was detected192.168.2.449750185.196.8.21480TCP
        2024-09-06T19:53:04.154627+020020501121A Network Trojan was detected192.168.2.449751185.196.8.21480TCP
        2024-09-06T19:53:04.959648+020020501121A Network Trojan was detected192.168.2.449752185.196.8.21480TCP
        2024-09-06T19:53:05.314692+020020501121A Network Trojan was detected192.168.2.449752185.196.8.21480TCP
        2024-09-06T19:53:06.179803+020020501121A Network Trojan was detected192.168.2.449753185.196.8.21480TCP
        2024-09-06T19:53:07.000725+020020501121A Network Trojan was detected192.168.2.449754185.196.8.21480TCP
        2024-09-06T19:53:07.812218+020020501121A Network Trojan was detected192.168.2.449755185.196.8.21480TCP
        2024-09-06T19:53:08.631133+020020501121A Network Trojan was detected192.168.2.449756185.196.8.21480TCP
        2024-09-06T19:53:08.978513+020020501121A Network Trojan was detected192.168.2.449756185.196.8.21480TCP
        2024-09-06T19:53:09.798632+020020501121A Network Trojan was detected192.168.2.449757185.196.8.21480TCP
        2024-09-06T19:53:10.630206+020020501121A Network Trojan was detected192.168.2.449758185.196.8.21480TCP
        2024-09-06T19:53:10.979197+020020501121A Network Trojan was detected192.168.2.449758185.196.8.21480TCP
        2024-09-06T19:53:11.818431+020020501121A Network Trojan was detected192.168.2.449759185.196.8.21480TCP
        2024-09-06T19:53:12.173813+020020501121A Network Trojan was detected192.168.2.449759185.196.8.21480TCP
        2024-09-06T19:53:12.998857+020020501121A Network Trojan was detected192.168.2.449760185.196.8.21480TCP
        2024-09-06T19:53:13.823982+020020501121A Network Trojan was detected192.168.2.449761185.196.8.21480TCP
        2024-09-06T19:53:14.646518+020020501121A Network Trojan was detected192.168.2.449762185.196.8.21480TCP
        2024-09-06T19:53:14.999795+020020501121A Network Trojan was detected192.168.2.449762185.196.8.21480TCP
        2024-09-06T19:53:15.950501+020020501121A Network Trojan was detected192.168.2.449763185.196.8.21480TCP
        2024-09-06T19:53:16.771874+020020501121A Network Trojan was detected192.168.2.449764185.196.8.21480TCP
        2024-09-06T19:53:17.125198+020020501121A Network Trojan was detected192.168.2.449764185.196.8.21480TCP
        2024-09-06T19:53:17.928145+020020501121A Network Trojan was detected192.168.2.449765185.196.8.21480TCP
        2024-09-06T19:53:18.286780+020020501121A Network Trojan was detected192.168.2.449765185.196.8.21480TCP
        2024-09-06T19:53:18.635499+020020501121A Network Trojan was detected192.168.2.449765185.196.8.21480TCP
        2024-09-06T19:53:19.450030+020020501121A Network Trojan was detected192.168.2.449766185.196.8.21480TCP
        2024-09-06T19:53:20.294461+020020501121A Network Trojan was detected192.168.2.449767185.196.8.21480TCP
        2024-09-06T19:53:21.113247+020020501121A Network Trojan was detected192.168.2.449768185.196.8.21480TCP
        2024-09-06T19:53:21.463197+020020501121A Network Trojan was detected192.168.2.449768185.196.8.21480TCP
        2024-09-06T19:53:22.299828+020020501121A Network Trojan was detected192.168.2.449769185.196.8.21480TCP
        2024-09-06T19:53:22.652758+020020501121A Network Trojan was detected192.168.2.449769185.196.8.21480TCP
        2024-09-06T19:53:23.631474+020020501121A Network Trojan was detected192.168.2.449770185.196.8.21480TCP
        2024-09-06T19:53:24.452510+020020501121A Network Trojan was detected192.168.2.449771185.196.8.21480TCP
        2024-09-06T19:53:25.263538+020020501121A Network Trojan was detected192.168.2.449772185.196.8.21480TCP
        2024-09-06T19:53:26.133938+020020501121A Network Trojan was detected192.168.2.449773185.196.8.21480TCP
        2024-09-06T19:53:26.481842+020020501121A Network Trojan was detected192.168.2.449773185.196.8.21480TCP
        2024-09-06T19:53:27.307980+020020501121A Network Trojan was detected192.168.2.449774185.196.8.21480TCP
        2024-09-06T19:53:28.168799+020020501121A Network Trojan was detected192.168.2.449775185.196.8.21480TCP
        2024-09-06T19:53:29.023584+020020501121A Network Trojan was detected192.168.2.449776185.196.8.21480TCP
        2024-09-06T19:53:29.374135+020020501121A Network Trojan was detected192.168.2.449776185.196.8.21480TCP
        2024-09-06T19:53:30.210531+020020501121A Network Trojan was detected192.168.2.449777185.196.8.21480TCP
        2024-09-06T19:53:30.560548+020020501121A Network Trojan was detected192.168.2.449777185.196.8.21480TCP
        2024-09-06T19:53:31.404527+020020501121A Network Trojan was detected192.168.2.449778185.196.8.21480TCP
        2024-09-06T19:53:32.227490+020020501121A Network Trojan was detected192.168.2.449779185.196.8.21480TCP
        2024-09-06T19:53:32.586238+020020501121A Network Trojan was detected192.168.2.449779185.196.8.21480TCP
        2024-09-06T19:53:33.431921+020020501121A Network Trojan was detected192.168.2.449780185.196.8.21480TCP
        2024-09-06T19:53:34.255850+020020501121A Network Trojan was detected192.168.2.449781185.196.8.21480TCP
        2024-09-06T19:53:34.601842+020020501121A Network Trojan was detected192.168.2.449781185.196.8.21480TCP
        2024-09-06T19:53:34.946479+020020501121A Network Trojan was detected192.168.2.449781185.196.8.21480TCP
        2024-09-06T19:53:35.295901+020020501121A Network Trojan was detected192.168.2.449781185.196.8.21480TCP
        2024-09-06T19:53:36.174263+020020501121A Network Trojan was detected192.168.2.449782185.196.8.21480TCP
        2024-09-06T19:53:37.052507+020020501121A Network Trojan was detected192.168.2.449783185.196.8.21480TCP
        2024-09-06T19:53:37.968781+020020501121A Network Trojan was detected192.168.2.449784185.196.8.21480TCP
        2024-09-06T19:53:38.795697+020020501121A Network Trojan was detected192.168.2.449785185.196.8.21480TCP
        2024-09-06T19:53:39.678947+020020501121A Network Trojan was detected192.168.2.449786185.196.8.21480TCP
        2024-09-06T19:53:40.521170+020020501121A Network Trojan was detected192.168.2.449787185.196.8.21480TCP
        2024-09-06T19:53:40.867660+020020501121A Network Trojan was detected192.168.2.449787185.196.8.21480TCP
        2024-09-06T19:53:41.222104+020020501121A Network Trojan was detected192.168.2.449787185.196.8.21480TCP
        2024-09-06T19:53:41.668515+020020501121A Network Trojan was detected192.168.2.449787185.196.8.21480TCP
        2024-09-06T19:53:42.512973+020020501121A Network Trojan was detected192.168.2.449788185.196.8.21480TCP
        2024-09-06T19:53:43.341694+020020501121A Network Trojan was detected192.168.2.449789185.196.8.21480TCP
        2024-09-06T19:53:44.163221+020020501121A Network Trojan was detected192.168.2.449790185.196.8.21480TCP
        2024-09-06T19:53:44.509885+020020501121A Network Trojan was detected192.168.2.449790185.196.8.21480TCP
        2024-09-06T19:53:45.559489+020020501121A Network Trojan was detected192.168.2.449791185.196.8.21480TCP
        2024-09-06T19:53:46.395520+020020501121A Network Trojan was detected192.168.2.449792185.196.8.21480TCP
        2024-09-06T19:53:46.747385+020020501121A Network Trojan was detected192.168.2.449792185.196.8.21480TCP
        2024-09-06T19:53:47.556149+020020501121A Network Trojan was detected192.168.2.449793185.196.8.21480TCP
        2024-09-06T19:53:47.898036+020020501121A Network Trojan was detected192.168.2.449793185.196.8.21480TCP
        2024-09-06T19:53:48.758439+020020501121A Network Trojan was detected192.168.2.449794185.196.8.21480TCP
        2024-09-06T19:53:49.568765+020020501121A Network Trojan was detected192.168.2.449795185.196.8.21480TCP
        2024-09-06T19:53:50.371973+020020501121A Network Trojan was detected192.168.2.449796185.196.8.21480TCP
        2024-09-06T19:53:51.189728+020020501121A Network Trojan was detected192.168.2.449797185.196.8.21480TCP
        2024-09-06T19:53:52.774390+020020501121A Network Trojan was detected192.168.2.449798185.196.8.21480TCP
        2024-09-06T19:53:53.594895+020020501121A Network Trojan was detected192.168.2.449799185.196.8.21480TCP
        2024-09-06T19:53:54.430894+020020501121A Network Trojan was detected192.168.2.449800185.196.8.21480TCP
        2024-09-06T19:53:55.250974+020020501121A Network Trojan was detected192.168.2.449801185.196.8.21480TCP
        2024-09-06T19:53:56.067004+020020501121A Network Trojan was detected192.168.2.449802185.196.8.21480TCP
        2024-09-06T19:53:56.918973+020020501121A Network Trojan was detected192.168.2.449803185.196.8.21480TCP
        2024-09-06T19:53:57.757151+020020501121A Network Trojan was detected192.168.2.449804185.196.8.21480TCP
        2024-09-06T19:53:58.592939+020020501121A Network Trojan was detected192.168.2.449805185.196.8.21480TCP
        2024-09-06T19:53:59.457944+020020501121A Network Trojan was detected192.168.2.449806185.196.8.21480TCP
        2024-09-06T19:54:00.293095+020020501121A Network Trojan was detected192.168.2.449807185.196.8.21480TCP
        2024-09-06T19:54:01.148735+020020501121A Network Trojan was detected192.168.2.449808185.196.8.21480TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: ffmpegsmartgui32_64.exe.6936.2.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["aiqorjv.ru"]}
        Source: C:\ProgramData\Core Package LingX 8.26.45\Core Package LingX 8.26.45.exeReversingLabs: Detection: 66%
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeReversingLabs: Detection: 66%
        Source: qgdf1HLJno.exeReversingLabs: Detection: 42%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\ProgramData\Core Package LingX 8.26.45\Core Package LingX 8.26.45.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0045B864 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045B864
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0045B918 ArcFourCrypt,1_2_0045B918
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0045B930 ArcFourCrypt,1_2_0045B930
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeUnpacked PE file: 2.2.ffmpegsmartgui32_64.exe.400000.0.unpack
        Source: qgdf1HLJno.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: Binary string: F:\Temp\openssl-1.1.1t\libssl-1_1.pdb source: is-KQ1E7.tmp.1.dr
        Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: qgdf1HLJno.tmp, 00000001.00000003.1651811495.00000000021D8000.00000004.00001000.00020000.00000000.sdmp, qgdf1HLJno.tmp, 00000001.00000002.2906908503.000000000082E000.00000004.00000020.00020000.00000000.sdmp, qgdf1HLJno.tmp, 00000001.00000003.1651485826.0000000003100000.00000004.00001000.00020000.00000000.sdmp, qgdf1HLJno.tmp, 00000001.00000002.2906894515.0000000000803000.00000002.00000001.01000000.00000006.sdmp, _isdecmp.dll.1.dr
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0047AA8C FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_0047AA8C
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00470D94 FindFirstFileA,FindNextFileA,FindClose,1_2_00470D94
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00451668 FindFirstFileA,GetLastError,1_2_00451668
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00460594 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00460594
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00492950 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00492950
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00478974 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_00478974
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00460A10 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00460A10
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0045F008 FindFirstFileA,FindNextFileA,FindClose,1_2_0045F008
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile opened: C:\Users\userJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49751 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49772 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49775 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49751 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49765 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49765 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49788 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49788 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49794 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49794 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49764 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49764 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49742 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49740 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49740 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49750 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49750 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49746 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49775 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49785 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49767 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49746 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49763 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49767 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49742 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49755 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49744 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49755 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49744 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49761 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49768 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49785 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49763 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49758 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49758 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49741 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49760 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49789 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49789 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49768 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49757 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49757 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49749 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49796 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49793 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49736 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49772 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49748 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49782 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49782 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49786 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49786 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49749 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49761 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49741 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49736 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49784 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49784 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49760 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49753 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49777 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49777 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49759 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49801 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49801 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49796 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49791 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49806 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49806 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49759 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49793 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49791 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49754 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49779 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49779 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49797 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49748 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49754 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49804 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49792 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49804 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49790 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49797 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49790 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49745 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49792 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49778 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49778 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49766 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49766 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49808 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49805 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49805 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49803 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49803 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49743 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49808 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49773 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49773 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49753 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49807 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49743 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49800 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49800 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49752 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49752 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49807 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49781 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49776 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49776 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49798 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49745 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49798 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49769 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49769 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49787 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49781 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49787 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49802 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49762 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49762 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49747 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49756 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49756 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49747 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49802 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49771 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49771 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49780 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49780 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49770 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49770 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49783 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49783 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49774 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49774 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49795 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49795 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49799 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49799 -> 185.196.8.214:80
        Source: Malware configuration extractorURLs: aiqorjv.ru
        Source: global trafficTCP traffic: 192.168.2.4:49737 -> 89.105.201.183:2023
        Source: Joe Sandbox ViewIP Address: 185.196.8.214 185.196.8.214
        Source: Joe Sandbox ViewIP Address: 89.105.201.183 89.105.201.183
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396288fb14c1e893 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownUDP traffic detected without corresponding DNS query: 45.155.250.90
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02B972A7 Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_free,2_2_02B972A7
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396288fb14c1e893 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1Host: aiqorjv.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: aiqorjv.ru
        Source: ffmpegsmartgui32_64.exe, 00000002.00000002.2907659108.0000000003529000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844
        Source: ffmpegsmartgui32_64.exe, 00000002.00000002.2907659108.0000000003520000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df1
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://crl.certum.pl/cscasha2.crl0q
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
        Source: is-KQ1E7.tmp.1.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
        Source: is-KQ1E7.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
        Source: is-KQ1E7.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
        Source: is-KQ1E7.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
        Source: is-KQ1E7.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
        Source: is-KQ1E7.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
        Source: is-KQ1E7.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://cscasha2.ocsp-certum.com04
        Source: is-KQ1E7.tmp.1.drString found in binary or memory: http://ocsp.comodoca.com0
        Source: is-KQ1E7.tmp.1.drString found in binary or memory: http://ocsp.sectigo.com0
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://ocsp.thawte.com0
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://repository.certum.pl/cscasha2.cer0
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://repository.certum.pl/ctnca.cer09
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://s.symcd.com06
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://subca.ocsp-certum.com01
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://www.certum.pl/CPS0
        Source: qgdf1HLJno.tmp, qgdf1HLJno.tmp, 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, qgdf1HLJno.tmp.0.dr, is-AC0D3.tmp.1.drString found in binary or memory: http://www.innosetup.com/
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: http://www.openssl.org/f
        Source: is-OKE2T.tmp.1.drString found in binary or memory: http://www.openssl.org/support/faq.html
        Source: qgdf1HLJno.exe, 00000000.00000003.1650126961.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, qgdf1HLJno.exe, 00000000.00000003.1649956636.0000000002440000.00000004.00001000.00020000.00000000.sdmp, qgdf1HLJno.tmp, qgdf1HLJno.tmp, 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, qgdf1HLJno.tmp.0.dr, is-AC0D3.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
        Source: qgdf1HLJno.exe, 00000000.00000003.1650126961.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, qgdf1HLJno.exe, 00000000.00000003.1649956636.0000000002440000.00000004.00001000.00020000.00000000.sdmp, qgdf1HLJno.tmp, 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, qgdf1HLJno.tmp.0.dr, is-AC0D3.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: https://d.symcb.com/cps0%
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0.
        Source: is-KQ1E7.tmp.1.drString found in binary or memory: https://sectigo.com/CPS0
        Source: is-U4I6A.tmp.1.drString found in binary or memory: https://www.10-strike.ru/
        Source: is-80L2A.tmp.1.drString found in binary or memory: https://www.10-strike.ru/network-diagram/
        Source: is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drString found in binary or memory: https://www.certum.pl/CPS0
        Source: is-KQ1E7.tmp.1.drString found in binary or memory: https://www.openssl.org/H
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0042EEF4 NtdllDefWindowProc_A,1_2_0042EEF4
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00423AF4 NtdllDefWindowProc_A,1_2_00423AF4
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00474050 NtdllDefWindowProc_A,1_2_00474050
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00412548 NtdllDefWindowProc_A,1_2_00412548
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00455800 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_00455800
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0042E6DC: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E6DC
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_0040936C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_0040936C
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00453FD0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_00453FD0
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_004083300_2_00408330
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0046C6D41_2_0046C6D4
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00434CFC1_2_00434CFC
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0047B70B1_2_0047B70B
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00463B8C1_2_00463B8C
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004824941_2_00482494
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004444A41_2_004444A4
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004886381_2_00488638
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0045C87C1_2_0045C87C
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004308A01_2_004308A0
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00444B9C1_2_00444B9C
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00444FA81_2_00444FA8
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004815BC1_2_004815BC
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0043D7841_2_0043D784
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004598501_2_00459850
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00465BDC1_2_00465BDC
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0042FD301_2_0042FD30
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00443EFC1_2_00443EFC
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00433FF81_2_00433FF8
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_008012601_2_00801260
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00801D201_2_00801D20
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_00406C472_2_00406C47
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_004010512_2_00401051
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_00401C262_2_00401C26
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BAE24D2_2_02BAE24D
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02B9F07A2_2_02B9F07A
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BB4EE92_2_02BB4EE9
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BB2E742_2_02BB2E74
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BAE6652_2_02BAE665
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BA9F442_2_02BA9F44
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BAACFA2_2_02BAACFA
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BA85032_2_02BA8503
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BADD592_2_02BADD59
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BCBF802_2_02BCBF80
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BCBF312_2_02BCBF31
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-KQ1E7.tmp 7A16E6ED0C0A49AEB8EA4972600A7A1422C92550602A150634B1C221F79300B4
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: String function: 02BB53F0 appears 138 times
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: String function: 02BA8BA0 appears 37 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 00405964 appears 103 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 00406A2C appears 38 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 0045618C appears 68 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 00403400 appears 59 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 00455F80 appears 95 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 00451F4C appears 88 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 0040785C appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 00408B74 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 00403494 appears 84 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 00445808 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 00445AD8 appears 59 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 00403684 appears 211 times
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: String function: 00433F10 appears 32 times
        Source: qgdf1HLJno.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
        Source: qgdf1HLJno.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: qgdf1HLJno.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
        Source: qgdf1HLJno.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: qgdf1HLJno.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: qgdf1HLJno.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-AC0D3.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-AC0D3.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
        Source: is-AC0D3.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: is-AC0D3.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-AC0D3.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: qgdf1HLJno.exe, 00000000.00000003.1650126961.00000000021C8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs qgdf1HLJno.exe
        Source: qgdf1HLJno.exe, 00000000.00000003.1649956636.0000000002440000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs qgdf1HLJno.exe
        Source: qgdf1HLJno.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: ffmpegsmartgui32_64.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: _RegDLL.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: Core Package LingX 8.26.45.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/42@1/2
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BA08C0 FormatMessageA,GetLastError,FormatMessageA,GetLastError,2_2_02BA08C0
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_0040936C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_0040936C
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00453FD0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_00453FD0
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004547F8 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_004547F8
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: CreateServiceA,2_2_0040257E
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_00409AD0 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409AD0
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_004022ED StartServiceCtrlDispatcherA,2_2_004022ED
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_004022ED StartServiceCtrlDispatcherA,2_2_004022ED
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_004022ED StartServiceCtrlDispatcherA,2_2_004022ED
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\FFmpeg Smart GUIJump to behavior
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeFile created: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: qgdf1HLJno.exeReversingLabs: Detection: 42%
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeFile read: C:\Users\user\Desktop\qgdf1HLJno.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\qgdf1HLJno.exe "C:\Users\user\Desktop\qgdf1HLJno.exe"
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeProcess created: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp "C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp" /SL5="$10412,3558674,54272,C:\Users\user\Desktop\qgdf1HLJno.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpProcess created: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe "C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe" -i
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeProcess created: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp "C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp" /SL5="$10412,3558674,54272,C:\Users\user\Desktop\qgdf1HLJno.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpProcess created: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe "C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe" -iJump to behavior
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: qgdf1HLJno.exeStatic file information: File size 3825775 > 1048576
        Source: Binary string: F:\Temp\openssl-1.1.1t\libssl-1_1.pdb source: is-KQ1E7.tmp.1.dr
        Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: qgdf1HLJno.tmp, 00000001.00000003.1651811495.00000000021D8000.00000004.00001000.00020000.00000000.sdmp, qgdf1HLJno.tmp, 00000001.00000002.2906908503.000000000082E000.00000004.00000020.00020000.00000000.sdmp, qgdf1HLJno.tmp, 00000001.00000003.1651485826.0000000003100000.00000004.00001000.00020000.00000000.sdmp, qgdf1HLJno.tmp, 00000001.00000002.2906894515.0000000000803000.00000002.00000001.01000000.00000006.sdmp, _isdecmp.dll.1.dr

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeUnpacked PE file: 2.2.ffmpegsmartgui32_64.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;_uhead_8:EW; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeUnpacked PE file: 2.2.ffmpegsmartgui32_64.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00447F60 LoadLibraryExA,LoadLibraryA,GetProcAddress,1_2_00447F60
        Source: ffmpegsmartgui32_64.exe.1.drStatic PE information: section name: _uhead_8
        Source: Core Package LingX 8.26.45.exe.2.drStatic PE information: section name: _uhead_8
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_00406518 push 00406555h; ret 0_2_0040654D
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_00408028 push ecx; mov dword ptr [esp], eax0_2_0040802D
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_00408E5C push 00408E8Fh; ret 0_2_00408E87
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004098B4 push 004098F1h; ret 1_2_004098E9
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00456228 push 00456260h; ret 1_2_00456258
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004062CC push ecx; mov dword ptr [esp], eax1_2_004062CD
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0045C574 push ecx; mov dword ptr [esp], eax1_2_0045C579
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00410640 push ecx; mov dword ptr [esp], edx1_2_00410645
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0040A6C8 push esp; retf 1_2_0040A6D1
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0047E828 push 0047E906h; ret 1_2_0047E8FE
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00412898 push 004128FBh; ret 1_2_004128F3
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004308A0 push ecx; mov dword ptr [esp], eax1_2_004308A5
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00442E74 push ecx; mov dword ptr [esp], ecx1_2_00442E78
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00450F04 push 00450F37h; ret 1_2_00450F2F
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0040CF98 push ecx; mov dword ptr [esp], edx1_2_0040CF9A
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0047335C push ecx; mov dword ptr [esp], edx1_2_0047335D
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0040F4F8 push ecx; mov dword ptr [esp], edx1_2_0040F4FA
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00457A94 push 00457AD8h; ret 1_2_00457AD0
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00419B98 push ecx; mov dword ptr [esp], ecx1_2_00419B9D
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0047FE7C push ecx; mov dword ptr [esp], ecx1_2_0047FE81
        Source: ffmpegsmartgui32_64.exe.1.drStatic PE information: section name: .text entropy: 7.682196809329248
        Source: Core Package LingX 8.26.45.exe.2.drStatic PE information: section name: .text entropy: 7.682196809329248

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive02_2_02B9F8A3
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-OKE2T.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeFile created: C:\ProgramData\Core Package LingX 8.26.45\Core Package LingX 8.26.45.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-KQ1E7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\FFmpeg Smart GUI\libssl-1_1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\FFmpeg Smart GUI\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ssleay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\FFmpeg Smart GUI\libeay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_isdecmp.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-AC0D3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile created: C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-PHMU8.tmpJump to dropped file
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeFile created: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeFile created: C:\ProgramData\Core Package LingX 8.26.45\Core Package LingX 8.26.45.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive02_2_02B9F8A3
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_004022ED StartServiceCtrlDispatcherA,2_2_004022ED
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00423B7C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423B7C
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00423B7C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423B7C
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0042414C IsIconic,SetActiveWindow,SetFocus,1_2_0042414C
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00424104 IsIconic,SetActiveWindow,1_2_00424104
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0047E1E4 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_0047E1E4
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004182F4 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_004182F4
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_004227CC SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_004227CC
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00417508 IsIconic,GetCapture,1_2_00417508
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00417C40 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417C40
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00417C3E IsIconic,SetWindowPos,1_2_00417C3E
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0044B08C LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_0044B08C
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_00401B4B
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_02B9F9A7
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeWindow / User API: threadDelayed 380Jump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeWindow / User API: threadDelayed 9475Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-OKE2T.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-KQ1E7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\FFmpeg Smart GUI\libssl-1_1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\FFmpeg Smart GUI\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ssleay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\FFmpeg Smart GUI\libeay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_isdecmp.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-AC0D3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-PHMU8.tmpJump to dropped file
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-6443
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-21502
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe TID: 6960Thread sleep count: 380 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe TID: 6960Thread sleep time: -760000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe TID: 7076Thread sleep count: 76 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe TID: 7076Thread sleep time: -4560000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe TID: 6960Thread sleep count: 9475 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe TID: 6960Thread sleep time: -18950000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0047AA8C FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_0047AA8C
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00470D94 FindFirstFileA,FindNextFileA,FindClose,1_2_00470D94
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00451668 FindFirstFileA,GetLastError,1_2_00451668
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00460594 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00460594
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00492950 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00492950
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00478974 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_00478974
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00460A10 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00460A10
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0045F008 FindFirstFileA,FindNextFileA,FindClose,1_2_0045F008
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_00409A14 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409A14
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeThread delayed: delay time: 60000Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile opened: C:\Users\userJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: qgdf1HLJno.tmp, 00000001.00000002.2906908503.000000000086B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\v
        Source: qgdf1HLJno.tmp, 00000001.00000002.2906908503.000000000086B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: ffmpegsmartgui32_64.exe, 00000002.00000002.2907659108.0000000003523000.00000004.00000020.00020000.00000000.sdmp, ffmpegsmartgui32_64.exe, 00000002.00000002.2906811074.00000000007F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: ffmpegsmartgui32_64.exe, 00000002.00000002.2906811074.000000000071E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeAPI call chain: ExitProcess graph end nodegraph_0-6301
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeAPI call chain: ExitProcess graph end nodegraph_2-21722

        Anti Debugging

        barindex
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_2-18749
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BB01BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02BB01BE
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BB01BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02BB01BE
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00447F60 LoadLibraryExA,LoadLibraryA,GetProcAddress,1_2_00447F60
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02B96487 RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,2_2_02B96487
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BA9528 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_02BA9528
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00473AEC ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00473AEC
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_0045B29C GetVersion,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,AllocateAndInitializeSid,GetLastError,LocalFree,1_2_0045B29C
        Source: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exeCode function: 2_2_02BA806E cpuid 2_2_02BA806E
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: GetLocaleInfoA,0_2_0040515C
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: GetLocaleInfoA,0_2_004051A8
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: GetLocaleInfoA,1_2_004084D0
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: GetLocaleInfoA,1_2_0040851C
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00456D8C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_00456D8C
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmpCode function: 1_2_00453F88 GetUserNameA,1_2_00453F88
        Source: C:\Users\user\Desktop\qgdf1HLJno.exeCode function: 0_2_00405C44 GetVersionExA,0_2_00405C44

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000002.00000002.2907391186.0000000002AEA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ffmpegsmartgui32_64.exe PID: 6936, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000002.00000002.2907391186.0000000002AEA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ffmpegsmartgui32_64.exe PID: 6936, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Service Execution
        4
        Windows Service
        1
        DLL Side-Loading
        3
        Obfuscated Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAt1
        Bootkit
        1
        Access Token Manipulation
        22
        Software Packing
        Security Account Manager3
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook4
        Windows Service
        1
        DLL Side-Loading
        NTDS35
        System Information Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
        Process Injection
        1
        Masquerading
        LSA Secrets241
        Security Software Discovery
        SSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
        Virtualization/Sandbox Evasion
        Cached Domain Credentials121
        Virtualization/Sandbox Evasion
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Access Token Manipulation
        DCSync11
        Application Window Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
        Process Injection
        Proc Filesystem3
        System Owner/User Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Bootkit
        /etc/passwd and /etc/shadow1
        Remote System Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
        System Network Configuration Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        qgdf1HLJno.exe42%ReversingLabsWin32.Trojan.Munp
        SourceDetectionScannerLabelLink
        C:\ProgramData\Core Package LingX 8.26.45\Core Package LingX 8.26.45.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe100%Joe Sandbox ML
        C:\ProgramData\Core Package LingX 8.26.45\Core Package LingX 8.26.45.exe67%ReversingLabsWin32.Infostealer.Tinba
        C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe67%ReversingLabsWin32.Infostealer.Tinba
        C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-AC0D3.tmp4%ReversingLabs
        C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-KQ1E7.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-OKE2T.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-PHMU8.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\FFmpeg Smart GUI\libeay32.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\FFmpeg Smart GUI\libssl-1_1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\FFmpeg Smart GUI\ssleay32.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\FFmpeg Smart GUI\unins000.exe (copy)4%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_iscrypt.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_isdecmp.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_setup64.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-293TP.tmp\_isetup\_shfoldr.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp4%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://repository.certum.pl/cscasha2.cer00%URL Reputationsafe
        http://crl.certum.pl/cscasha2.crl0q0%URL Reputationsafe
        http://cscasha2.ocsp-certum.com040%URL Reputationsafe
        http://aiqorjv.ru/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396288fb14c1e8930%Avira URL Cloudsafe
        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%Avira URL Cloudsafe
        http://ocsp.sectigo.com00%Avira URL Cloudsafe
        http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%Avira URL Cloudsafe
        http://www.innosetup.com/0%Avira URL Cloudsafe
        https://sectigo.com/CPS00%Avira URL Cloudsafe
        http://ocsp.thawte.com00%Avira URL Cloudsafe
        http://repository.certum.pl/ctnca.cer090%Avira URL Cloudsafe
        aiqorjv.ru0%Avira URL Cloudsafe
        http://crl.certum.pl/ctnca.crl0k0%Avira URL Cloudsafe
        http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c8440%Avira URL Cloudsafe
        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%Avira URL Cloudsafe
        https://www.certum.pl/CPS00%Avira URL Cloudsafe
        https://www.10-strike.ru/0%Avira URL Cloudsafe
        http://www.openssl.org/support/faq.html0%Avira URL Cloudsafe
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%Avira URL Cloudsafe
        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%Avira URL Cloudsafe
        http://aiqorjv.ru/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca690%Avira URL Cloudsafe
        http://crl.thawte.com/ThawteTimestampingCA.crl00%Avira URL Cloudsafe
        http://www.remobjects.com/psU0%Avira URL Cloudsafe
        https://www.10-strike.ru/network-diagram/0%Avira URL Cloudsafe
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%Avira URL Cloudsafe
        http://subca.ocsp-certum.com010%Avira URL Cloudsafe
        https://www.openssl.org/H0%Avira URL Cloudsafe
        http://www.openssl.org/f0%Avira URL Cloudsafe
        http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df10%Avira URL Cloudsafe
        http://www.remobjects.com/ps0%Avira URL Cloudsafe
        http://www.certum.pl/CPS00%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        aiqorjv.ru
        185.196.8.214
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://aiqorjv.ru/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396288fb14c1e893true
          • Avira URL Cloud: safe
          unknown
          aiqorjv.rutrue
          • Avira URL Cloud: safe
          unknown
          http://aiqorjv.ru/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69true
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.innosetup.com/qgdf1HLJno.tmp, qgdf1HLJno.tmp, 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, qgdf1HLJno.tmp.0.dr, is-AC0D3.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          https://sectigo.com/CPS0is-KQ1E7.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://repository.certum.pl/ctnca.cer09is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://repository.certum.pl/cscasha2.cer0is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drfalse
          • URL Reputation: safe
          unknown
          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0is-KQ1E7.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://ocsp.sectigo.com0is-KQ1E7.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.certum.pl/ctnca.crl0kis-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://ocsp.thawte.com0is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#is-KQ1E7.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#is-KQ1E7.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.certum.pl/CPS0is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844ffmpegsmartgui32_64.exe, 00000002.00000002.2907659108.0000000003529000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.certum.pl/cscasha2.crl0qis-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drfalse
          • URL Reputation: safe
          unknown
          https://www.10-strike.ru/is-U4I6A.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://cscasha2.ocsp-certum.com04is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drfalse
          • URL Reputation: safe
          unknown
          http://www.openssl.org/support/faq.htmlis-OKE2T.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tis-KQ1E7.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.remobjects.com/psUqgdf1HLJno.exe, 00000000.00000003.1650126961.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, qgdf1HLJno.exe, 00000000.00000003.1649956636.0000000002440000.00000004.00001000.00020000.00000000.sdmp, qgdf1HLJno.tmp, 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, qgdf1HLJno.tmp.0.dr, is-AC0D3.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yis-KQ1E7.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.thawte.com/ThawteTimestampingCA.crl0is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#is-KQ1E7.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.10-strike.ru/network-diagram/is-80L2A.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://subca.ocsp-certum.com01is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.openssl.org/His-KQ1E7.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.remobjects.com/psqgdf1HLJno.exe, 00000000.00000003.1650126961.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, qgdf1HLJno.exe, 00000000.00000003.1649956636.0000000002440000.00000004.00001000.00020000.00000000.sdmp, qgdf1HLJno.tmp, qgdf1HLJno.tmp, 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, qgdf1HLJno.tmp.0.dr, is-AC0D3.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df1ffmpegsmartgui32_64.exe, 00000002.00000002.2907659108.0000000003520000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.openssl.org/fis-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.certum.pl/CPS0is-OKE2T.tmp.1.dr, is-PHMU8.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          185.196.8.214
          aiqorjv.ruSwitzerland
          34888SIMPLECARRER2ITtrue
          89.105.201.183
          unknownNetherlands
          24875NOVOSERVE-ASNLfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1505784
          Start date and time:2024-09-06 19:51:06 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 21s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:qgdf1HLJno.exe
          renamed because original name is a hash value
          Original Sample Name:0b0b4093391e1eb14216f9328dd73e2b.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@5/42@1/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 92%
          • Number of executed functions: 182
          • Number of non-executed functions: 246
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtDeviceIoControlFile calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: qgdf1HLJno.exe
          TimeTypeDescription
          13:52:30API Interceptor704392x Sleep call for process: ffmpegsmartgui32_64.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          185.196.8.214install.exeGet hashmaliciousSocks5SystemzBrowse
            install.exeGet hashmaliciousSocks5SystemzBrowse
              gobEmOm5sr.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                file.exeGet hashmaliciousSocks5SystemzBrowse
                  file.exeGet hashmaliciousSocks5SystemzBrowse
                    install.exeGet hashmaliciousSocks5SystemzBrowse
                      install.exeGet hashmaliciousSocks5SystemzBrowse
                        5xHCJn3q8sqAf98zV4.exeGet hashmaliciousSocks5SystemzBrowse
                          cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                            kqS23MOytx.exeGet hashmaliciousSocks5Systemz, Stealc, Vidar, XWorm, XmrigBrowse
                              89.105.201.183cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                              • 200
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              SIMPLECARRER2ITinstall.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              install.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              gobEmOm5sr.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                              • 185.196.8.214
                              l6cIAWr8jY.exeGet hashmaliciousUnknownBrowse
                              • 185.208.158.114
                              ad7268943386108805516_48334621196_24110768413395_847727572987992881.pdf.vbsGet hashmaliciousRemcosBrowse
                              • 185.208.158.82
                              file.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              file.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              install.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              install.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                              • 185.196.8.239
                              NOVOSERVE-ASNLgobEmOm5sr.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                              • 89.105.201.183
                              file.exeGet hashmaliciousSocks5SystemzBrowse
                              • 89.105.201.183
                              file.exeGet hashmaliciousSocks5SystemzBrowse
                              • 89.105.201.183
                              install.exeGet hashmaliciousSocks5SystemzBrowse
                              • 89.105.201.183
                              cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                              • 89.105.201.183
                              kqS23MOytx.exeGet hashmaliciousSocks5Systemz, Stealc, Vidar, XWorm, XmrigBrowse
                              • 89.105.201.183
                              crt.exeGet hashmaliciousSocks5SystemzBrowse
                              • 89.105.201.183
                              file.exeGet hashmaliciousSocks5SystemzBrowse
                              • 89.105.201.183
                              file.exeGet hashmaliciousCryptbot, NeoreklamiBrowse
                              • 89.105.201.137
                              file.exeGet hashmaliciousSocks5SystemzBrowse
                              • 89.105.201.183
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\user\AppData\Local\FFmpeg Smart GUI\is-KQ1E7.tmpinstall.exeGet hashmaliciousSocks5SystemzBrowse
                                install.exeGet hashmaliciousSocks5SystemzBrowse
                                  gobEmOm5sr.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                    file.exeGet hashmaliciousSocks5SystemzBrowse
                                      file.exeGet hashmaliciousSocks5SystemzBrowse
                                        install.exeGet hashmaliciousSocks5SystemzBrowse
                                          install.exeGet hashmaliciousSocks5SystemzBrowse
                                            5xHCJn3q8sqAf98zV4.exeGet hashmaliciousSocks5SystemzBrowse
                                              kqS23MOytx.exeGet hashmaliciousSocks5Systemz, Stealc, Vidar, XWorm, XmrigBrowse
                                                install.exeGet hashmaliciousSocks5SystemzBrowse
                                                  Process:C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):2687077
                                                  Entropy (8bit):6.235428991868812
                                                  Encrypted:false
                                                  SSDEEP:49152:kZAdTa8/KkGXSYTsro5Z18gDs2veuv1955ehFg+S:kZAdTj/KkGNTsrS8gDs2veuv1955kS
                                                  MD5:096271271557E1A33376E74C764F46EF
                                                  SHA1:38E43638118AA5891932168B540127371E475DD1
                                                  SHA-256:8D12357FA7914A1F7A4801FC505DA008CBE17ABC5E5F96472AEAC5013F6297E3
                                                  SHA-512:62C5067447398241BEBC7A22142B42C928CD01527696D2B119101D7D2B1DF24373220120030E327510954149F49E5B170D46438F7A01355347167973D46FEB55
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 67%
                                                  Reputation:low
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....^F_..........#...............................@..........................@).........................................................8!...........................................................................................................text...Z........................... ..`.rdata..N .......0..................@..@.data...8T... ...0... ..............@....rsrc....0.......0...P..............@..@_uhead_8........e...................a...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  File Type:ISO-8859 text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):8
                                                  Entropy (8bit):2.0
                                                  Encrypted:false
                                                  SSDEEP:3:Nlt:Nlt
                                                  MD5:E6ADC8B8707018C71263EE802957F423
                                                  SHA1:ED9B80D1C0E69268808BA120381B2A0F3A7E82C4
                                                  SHA-256:C09B71CA755C911FE7ACC30F8EF5F883BB533196EBD2298E3F9501A82B78DDEC
                                                  SHA-512:3C2325C4D5533350B6A1534F63BE106D3EB3DE46C265C7C184754C9248463D9D6FF1F8B6E1F5E11636D4E5774BD275EAE4793BEE2FD4A3A89FFF9DBCB4E0DF04
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:xA.f....
                                                  Process:C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  File Type:data
                                                  Category:modified
                                                  Size (bytes):4
                                                  Entropy (8bit):0.8112781244591328
                                                  Encrypted:false
                                                  SSDEEP:3:3:3
                                                  MD5:E7C62CD2306A6B991402DB2098965CBC
                                                  SHA1:33B77B9463AB2010488CDCFC5CE920E05602EE50
                                                  SHA-256:2BAAED212BEBC4EBEEB19752C47FF7C4420ADF7806F577722B487A08B605EE13
                                                  SHA-512:B3D72EE590E359259032335B4BBC2C7C400BAD09492D341C8FC9A20908FC4C96277861C561257399BF3A2C4C88E0E15634B8CB0DEAAFD8A8E21ADB72086A6825
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:`...
                                                  Process:C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):128
                                                  Entropy (8bit):2.9545817380615236
                                                  Encrypted:false
                                                  SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                  MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                  SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                  SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                  SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                  Process:C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):128
                                                  Entropy (8bit):1.2701231977328944
                                                  Encrypted:false
                                                  SSDEEP:3:WAmJuXDz8/:HHzc
                                                  MD5:0D6174E4525CFDED5DD1C9440B9DC1E7
                                                  SHA1:173EF30A035CE666278904625EADCFAE09233A47
                                                  SHA-256:458677CDF0E1A4E87D32AB67D6A5EEA9E67CB3545D79A21A0624E6BB5E1087E7
                                                  SHA-512:86DA96385985A1BA3D67A8676A041CA563838F474DF33D82B6ECD90C101703B30747121A6B7281E025A3C11CE28ACCEDFC94DB4E8D38E391199458056C2CD27A
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:ccddf9e705966c2f471db9..........................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.0, Code page: 1251, Author: Alex M, Last Saved By: , Name of Creating Application: Microsoft Visio, Last Saved Time/Date: Wed Jul 2 10:49:43 2008
                                                  Category:dropped
                                                  Size (bytes):35328
                                                  Entropy (8bit):6.12724692559485
                                                  Encrypted:false
                                                  SSDEEP:768:iWrWvB3jB8UJjRqHNl1g2KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKc:iYW1jCUJjRqtl11
                                                  MD5:5E71266FE44B81057E546A2ADEE49131
                                                  SHA1:3AFBF0D78EE50F6B489572FE1D2C0C9BF8016580
                                                  SHA-256:21889C505A0234524AC95081260329ACEE5100ED2D30278B52399D62D8AA801E
                                                  SHA-512:8287D973C71DB110B092CC99B9908571474409B1818799142651262E8D345EBBACE2066F02354B0966D3DB742EAA9FB41174C17A338074C213C1F78E7857DE87
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Microsoft Visio 2013+
                                                  Category:dropped
                                                  Size (bytes):21075
                                                  Entropy (8bit):7.554305714727671
                                                  Encrypted:false
                                                  SSDEEP:384:mGVjXBTgCjDyjdbBHzh2+lxw2aro4QxkK4jK1uxlBW+0S35:NNgCjujF5DsoDkj70+0Sp
                                                  MD5:C027B58057CB33B7D1EF9B7204B83DF7
                                                  SHA1:1DCD0B9F11886EB3BEAE7E4CC9AA725BAA49342D
                                                  SHA-256:5612A57A73B168840EB7FBBCA3981E244D349A121B082EE6CDD593119E4C8873
                                                  SHA-512:CE5DA3D2D196B5F1FE14FC3F4582171D47E9776996082A46EE01A9F0A3EA9252EA1F078C720FE6880BD160FB037F7D571B561D625D35D4BA0F5E1261BFDD4077
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:PK..........!.L?..f...;.......[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0.E.H...-J...!...%tQ>.._Z.x..;.=/..@.4B.$J.{..u..|o+........g.......|..9.$...wP.. .....C.d.vX.uJ.A.Tk..s...H....J..>...d4.....e......rS%....m...r..N.Y..!TF.DI......#.l.......\.%.#..:..U.....1.JK1..PD...XZD~..j1k49..r+..Jv.@...RQ...|.o.Vg.. &.}.'.T.p./K..o..m.........6g....6.? .....=.$....c<.1.1.<....@...A.!....v.i....I..Es..>.......PK..........!................._rels/.rels ...(...........................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Microsoft Visio 2013+
                                                  Category:dropped
                                                  Size (bytes):796010
                                                  Entropy (8bit):7.990815300175507
                                                  Encrypted:true
                                                  SSDEEP:24576:40vGRPRqM0RpueplpGLpT+DlW3y/E3kd+:40vGRPRqM8lpGLpwlWi3d+
                                                  MD5:20D3CBCE0D291FB238CD046B7BC3744D
                                                  SHA1:F4143CA63D500526B94FA86EA7302749B63CE4C0
                                                  SHA-256:4E6E085089C471B6418195D056D8F32224D45273ACC7ABBA3076D94ED9480434
                                                  SHA-512:763E91636C22BEA80ADA482BFAD3B31F13694A59C9655EA1214A2F1C6F637076A079AE73377E78475438E81798F017B6DF5C270161DBD4B1E0E0484FAFE06649
                                                  Malicious:false
                                                  Preview:PK..........!.V..c............[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................]o.0...'.?D....vmE..>..^.?.J....Ql(..;...1.).....<..<.x~.m.dc.`.+R.....W.-....{v.&!jW..;S./&....../....](.U...c.\.V..w..J..VG../Y.._zi...Y.]4.fq...._M..ML.m..}'........U.....lXa'3.i....:....U.:..]..=.V..........]..8.~.8{[..A..n.w...-V.r.....u.F..2y.....[m.kg..T...].......3:NbHg..2}..8..D..x..k[..D.p.....u...o.....a..=.7..~A..3=D...).......#...5=.jz.....#n.G.N..3...7.....s....8.H...s.....x.........x.........x.
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.0, Code page: 1251, Author: Alex M, Last Saved By: , Name of Creating Application: Microsoft Visio, Last Saved Time/Date: Wed Jul 2 10:49:43 2008
                                                  Category:dropped
                                                  Size (bytes):35328
                                                  Entropy (8bit):6.12724692559485
                                                  Encrypted:false
                                                  SSDEEP:768:iWrWvB3jB8UJjRqHNl1g2KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKc:iYW1jCUJjRqtl11
                                                  MD5:5E71266FE44B81057E546A2ADEE49131
                                                  SHA1:3AFBF0D78EE50F6B489572FE1D2C0C9BF8016580
                                                  SHA-256:21889C505A0234524AC95081260329ACEE5100ED2D30278B52399D62D8AA801E
                                                  SHA-512:8287D973C71DB110B092CC99B9908571474409B1818799142651262E8D345EBBACE2066F02354B0966D3DB742EAA9FB41174C17A338074C213C1F78E7857DE87
                                                  Malicious:false
                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Microsoft Visio 2013+
                                                  Category:dropped
                                                  Size (bytes):21075
                                                  Entropy (8bit):7.554305714727671
                                                  Encrypted:false
                                                  SSDEEP:384:mGVjXBTgCjDyjdbBHzh2+lxw2aro4QxkK4jK1uxlBW+0S35:NNgCjujF5DsoDkj70+0Sp
                                                  MD5:C027B58057CB33B7D1EF9B7204B83DF7
                                                  SHA1:1DCD0B9F11886EB3BEAE7E4CC9AA725BAA49342D
                                                  SHA-256:5612A57A73B168840EB7FBBCA3981E244D349A121B082EE6CDD593119E4C8873
                                                  SHA-512:CE5DA3D2D196B5F1FE14FC3F4582171D47E9776996082A46EE01A9F0A3EA9252EA1F078C720FE6880BD160FB037F7D571B561D625D35D4BA0F5E1261BFDD4077
                                                  Malicious:false
                                                  Preview:PK..........!.L?..f...;.......[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0.E.H...-J...!...%tQ>.._Z.x..;.=/..@.4B.$J.{..u..|o+........g.......|..9.$...wP.. .....C.d.vX.uJ.A.Tk..s...H....J..>...d4.....e......rS%....m...r..N.Y..!TF.DI......#.l.......\.%.#..:..U.....1.JK1..PD...XZD~..j1k49..r+..Jv.@...RQ...|.o.Vg.. &.}.'.T.p./K..o..m.........6g....6.? .....=.$....c<.1.1.<....@...A.!....v.i....I..Es..>.......PK..........!................._rels/.rels ...(...........................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Microsoft Visio 2013+
                                                  Category:dropped
                                                  Size (bytes):33880
                                                  Entropy (8bit):7.741625539763484
                                                  Encrypted:false
                                                  SSDEEP:768:jzhnOhaeVEHYAS/uE126rOUP79Qt5Nu3RTAzj2EkZDwn2R3:jzcseVEHTSGEM6P9QtzuBTAnjko2R3
                                                  MD5:101E481D0031B0B3EC8DA95C90361E5B
                                                  SHA1:67012D9A226EF237E541FADA023AD1794920569A
                                                  SHA-256:59AE6C45A11933363D0EA6797854E09E0D0002D25F634A280467A4F805DAEC3A
                                                  SHA-512:B6BDBA204F3B5245B8F59FD0CB558FAD98B4D37BF8DC9785ED5E9576EDCD8C965C0F2AA8512B7140865F53EFE4B7E93759126BFD21505A8BF410653464841C1D
                                                  Malicious:false
                                                  Preview:PK..........!...j.w...*.......[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0.E.H...-J..(.j.....(.`./.E<.v...eh$P).P6.b..s.^,O.{].-.....0.P.FX..*....dBI..H^X..=@.....typ...M..:F..X.k.<.....z.#~..s\|....`0f..&&.....3.|SD...:.."P.T/,Y....J..I......!.....r..cPv.P...ht.X..$....k....#2i.F.&..>eP..J...PE..2.d......,.......V.T'...G.m-.....6..."P.Q........7....^7...g.5..".=m$..y.1.........q.?.....C..I....B....].+..Gb....N.....n........PK..........!................._rels/.rels ...(..........
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Microsoft Visio 2013+
                                                  Category:dropped
                                                  Size (bytes):10941
                                                  Entropy (8bit):6.980443262363119
                                                  Encrypted:false
                                                  SSDEEP:192:eQ8VBwf7aUxu+Cuj1pCUTB37vLQJgWlYD+hVMdZgOZCKrHGRG41hHFSYz0U:3z7aUHj1pCSRrLwzlYDuMdiOBHGjhHF3
                                                  MD5:3DC27A0A53DAA4A9A26BA4BD4FF6EFC4
                                                  SHA1:67B7A181A16B7F9B0DD6A261F82F60AAE9C55FE4
                                                  SHA-256:FC4EA91C0B13CD0C437450EF1FB39C94C12AF52A0B2B2D5C4C66E8C04D907AFE
                                                  SHA-512:B1FA59214BD60844BD0AEDAC15F02702CE133FA4FF2048C17D944E4A1EC54CDC1B8FC380B35B9B4F0758B1BA03957E74FAC6B7EE307A2896F292E90D2317709E
                                                  Malicious:false
                                                  Preview:PK..........!..`.l]...@.......[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.N.0..#....(q..!...#.P>..'.E...n..8i#Z...K.d..y..v..6.P;[.q1b.X..}...G.a.V..Y(.....7....f..X.U...s.+0.....r..H.a.._b..~4z....6.1q....*..c.....0...sI.d.$..O.~....3...RD.o.:s..\..l..J{.#.(............l.B|......rrmh..:O2j0o0E.....Fh{.vI....y.t..P8-..".sOD.........pAWUZB........r....4=..6=.G..M...]...Z.......o.Un;...r....?........PK..........!..X.%...^......._rels/.rels ...(....................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1251, Author: Alex M, Template: C:\work\NetDiagram\visio\netdiagram.vst, Last Saved By: Alex M, Name of Creating Application: Microsoft Visio, Last Saved Time/Date: Tue Aug 14 11:36:07 2012
                                                  Category:dropped
                                                  Size (bytes):12288
                                                  Entropy (8bit):4.743855635666745
                                                  Encrypted:false
                                                  SSDEEP:192:rgxToQ+gDZlSKcVZRVLClWmELJyZP6aTK3:rgxMnKwLClWmyg6iK
                                                  MD5:78C84AA115E8C391EC7A4117613D7794
                                                  SHA1:C4E3C4B8CA5A3B9E8AE1378E839154E33B394662
                                                  SHA-256:0851AE8F561F49278C8AD81363F15481235EC3DF0CF80C73408D3D226BCC9612
                                                  SHA-512:83E134533BC8C03B8D2DF23E4C9B77DA2236E90BB336F1F565C5C46F6A7495FA2A1AE090B9400CDC44354887FD7D29B3F3EE8D9A3D81A8F2AFB45C9086BFD328
                                                  Malicious:false
                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: Alex M, Name of Creating Application: Microsoft Visio
                                                  Category:dropped
                                                  Size (bytes):54272
                                                  Entropy (8bit):6.5220907812181945
                                                  Encrypted:false
                                                  SSDEEP:768:e4Ojp2NtewXUdPSQ8fgh/1w7UxmSGGGGGGGGGGGGGGGG5GGGGGGGGGGGGG5GvBdl:d2p2TkdKvfgh/1wYpBknOmrRd8
                                                  MD5:21EFB66726A048B081DBE70AF3B49532
                                                  SHA1:64256CF635B71BF886446D24A6C82304AE4DF57E
                                                  SHA-256:CEC8E2D6EEA74362909EDB714B8B9EBFA0E6B6BDE893EB1F3B944A7A5B8310BA
                                                  SHA-512:4DF1CB0EFF47473E033E8C5C58E86D5B8A63DD11A658F1E69941A71C5BFFD80BBCFE77DC6EA5CE6693F1A59D194A1BFC4BE51F0FD9DEDAB8A03406055AB8E886
                                                  Malicious:false
                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Microsoft Visio 2013+
                                                  Category:dropped
                                                  Size (bytes):796010
                                                  Entropy (8bit):7.990815300175507
                                                  Encrypted:true
                                                  SSDEEP:24576:40vGRPRqM0RpueplpGLpT+DlW3y/E3kd+:40vGRPRqM8lpGLpwlWi3d+
                                                  MD5:20D3CBCE0D291FB238CD046B7BC3744D
                                                  SHA1:F4143CA63D500526B94FA86EA7302749B63CE4C0
                                                  SHA-256:4E6E085089C471B6418195D056D8F32224D45273ACC7ABBA3076D94ED9480434
                                                  SHA-512:763E91636C22BEA80ADA482BFAD3B31F13694A59C9655EA1214A2F1C6F637076A079AE73377E78475438E81798F017B6DF5C270161DBD4B1E0E0484FAFE06649
                                                  Malicious:false
                                                  Preview:PK..........!.V..c............[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................]o.0...'.?D....vmE..>..^.?.J....Ql(..;...1.).....<..<.x~.m.dc.`.+R.....W.-....{v.&!jW..;S./&....../....](.U...c.\.V..w..J..VG../Y.._zi...Y.]4.fq...._M..ML.m..}'........U.....lXa'3.i....:....U.:..]..=.V..........]..8.~.8{[..A..n.w...-V.r.....u.F..2y.....[m.kg..T...].......3:NbHg..2}..8..D..x..k[..D.p.....u...o.....a..=.7..~A..3=D...).......#...5=.jz.....#n.G.N..3...7.....s....8.H...s.....x.........x.........x.
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: Alex M, Name of Creating Application: Microsoft Visio
                                                  Category:dropped
                                                  Size (bytes):54272
                                                  Entropy (8bit):6.5220907812181945
                                                  Encrypted:false
                                                  SSDEEP:768:e4Ojp2NtewXUdPSQ8fgh/1w7UxmSGGGGGGGGGGGGGGGG5GGGGGGGGGGGGG5GvBdl:d2p2TkdKvfgh/1wYpBknOmrRd8
                                                  MD5:21EFB66726A048B081DBE70AF3B49532
                                                  SHA1:64256CF635B71BF886446D24A6C82304AE4DF57E
                                                  SHA-256:CEC8E2D6EEA74362909EDB714B8B9EBFA0E6B6BDE893EB1F3B944A7A5B8310BA
                                                  SHA-512:4DF1CB0EFF47473E033E8C5C58E86D5B8A63DD11A658F1E69941A71C5BFFD80BBCFE77DC6EA5CE6693F1A59D194A1BFC4BE51F0FD9DEDAB8A03406055AB8E886
                                                  Malicious:false
                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Microsoft Visio 2013+
                                                  Category:dropped
                                                  Size (bytes):33880
                                                  Entropy (8bit):7.741625539763484
                                                  Encrypted:false
                                                  SSDEEP:768:jzhnOhaeVEHYAS/uE126rOUP79Qt5Nu3RTAzj2EkZDwn2R3:jzcseVEHTSGEM6P9QtzuBTAnjko2R3
                                                  MD5:101E481D0031B0B3EC8DA95C90361E5B
                                                  SHA1:67012D9A226EF237E541FADA023AD1794920569A
                                                  SHA-256:59AE6C45A11933363D0EA6797854E09E0D0002D25F634A280467A4F805DAEC3A
                                                  SHA-512:B6BDBA204F3B5245B8F59FD0CB558FAD98B4D37BF8DC9785ED5E9576EDCD8C965C0F2AA8512B7140865F53EFE4B7E93759126BFD21505A8BF410653464841C1D
                                                  Malicious:false
                                                  Preview:PK..........!...j.w...*.......[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0.E.H...-J..(.j.....(.`./.E<.v...eh$P).P6.b..s.^,O.{].-.....0.P.FX..*....dBI..H^X..=@.....typ...M..:F..X.k.<.....z.#~..s\|....`0f..&&.....3.|SD...:.."P.T/,Y....J..I......!.....r..cPv.P...ht.X..$....k....#2i.F.&..>eP..J...PE..2.d......,.......V.T'...G.m-.....6..."P.Q........7....^7...g.5..".=m$..y.1.........q.?.....C..I....B....].+..Gb....N.....n........PK..........!................._rels/.rels ...(..........
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1251, Author: Alex M, Template: C:\work\NetDiagram\visio\netdiagram.vst, Last Saved By: Alex M, Name of Creating Application: Microsoft Visio, Last Saved Time/Date: Tue Aug 14 11:36:07 2012
                                                  Category:dropped
                                                  Size (bytes):12288
                                                  Entropy (8bit):4.743855635666745
                                                  Encrypted:false
                                                  SSDEEP:192:rgxToQ+gDZlSKcVZRVLClWmELJyZP6aTK3:rgxMnKwLClWmyg6iK
                                                  MD5:78C84AA115E8C391EC7A4117613D7794
                                                  SHA1:C4E3C4B8CA5A3B9E8AE1378E839154E33B394662
                                                  SHA-256:0851AE8F561F49278C8AD81363F15481235EC3DF0CF80C73408D3D226BCC9612
                                                  SHA-512:83E134533BC8C03B8D2DF23E4C9B77DA2236E90BB336F1F565C5C46F6A7495FA2A1AE090B9400CDC44354887FD7D29B3F3EE8D9A3D81A8F2AFB45C9086BFD328
                                                  Malicious:false
                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:Microsoft Visio 2013+
                                                  Category:dropped
                                                  Size (bytes):10941
                                                  Entropy (8bit):6.980443262363119
                                                  Encrypted:false
                                                  SSDEEP:192:eQ8VBwf7aUxu+Cuj1pCUTB37vLQJgWlYD+hVMdZgOZCKrHGRG41hHFSYz0U:3z7aUHj1pCSRrLwzlYDuMdiOBHGjhHF3
                                                  MD5:3DC27A0A53DAA4A9A26BA4BD4FF6EFC4
                                                  SHA1:67B7A181A16B7F9B0DD6A261F82F60AAE9C55FE4
                                                  SHA-256:FC4EA91C0B13CD0C437450EF1FB39C94C12AF52A0B2B2D5C4C66E8C04D907AFE
                                                  SHA-512:B1FA59214BD60844BD0AEDAC15F02702CE133FA4FF2048C17D944E4A1EC54CDC1B8FC380B35B9B4F0758B1BA03957E74FAC6B7EE307A2896F292E90D2317709E
                                                  Malicious:false
                                                  Preview:PK..........!..`.l]...@.......[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.N.0..#....(q..!...#.P>..'.E...n..8i#Z...K.d..y..v..6.P;[.q1b.X..}...G.a.V..Y(.....7....f..X.U...s.+0.....r..H.a.._b..~4z....6.1q....*..c.....0...sI.d.$..O.~....3...RD.o.:s..\..l..J{.#.(............l.B|......rrmh..:O2j0o0E.....Fh{.vI....y.t..P8-..".sOD.........pAWUZB........r....4=..6=.G..M...]...Z.......o.Un;...r....?........PK..........!..X.%...^......._rels/.rels ...(....................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:modified
                                                  Size (bytes):2687077
                                                  Entropy (8bit):6.235428991868812
                                                  Encrypted:false
                                                  SSDEEP:49152:kZAdTa8/KkGXSYTsro5Z18gDs2veuv1955ehFg+S:kZAdTj/KkGNTsrS8gDs2veuv1955kS
                                                  MD5:096271271557E1A33376E74C764F46EF
                                                  SHA1:38E43638118AA5891932168B540127371E475DD1
                                                  SHA-256:8D12357FA7914A1F7A4801FC505DA008CBE17ABC5E5F96472AEAC5013F6297E3
                                                  SHA-512:62C5067447398241BEBC7A22142B42C928CD01527696D2B119101D7D2B1DF24373220120030E327510954149F49E5B170D46438F7A01355347167973D46FEB55
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 67%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....^F_..........#...............................@..........................@).........................................................8!...........................................................................................................text...Z........................... ..`.rdata..N .......0..................@..@.data...8T... ...0... ..............@....rsrc....0.......0...P..............@..@_uhead_8........e...................a...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:ISO-8859 text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):197
                                                  Entropy (8bit):5.4399730864921905
                                                  Encrypted:false
                                                  SSDEEP:6:c+SdoDGi9C9quMc4D+2ZZQTHGdt53D6OL8Qy:U899ZuMcmvGHG5z6VQy
                                                  MD5:5D1F6956165E6F95D80C0EC48C4B7B39
                                                  SHA1:035D8BBF724413EE63BD5E1CA33983552475A650
                                                  SHA-256:CD18B928D2F2F1AAE123C23CC934EF42E89E4CDEAECD2D0961D84A4B2EFF09E7
                                                  SHA-512:5A8317D0A3CA91BD0CDDBA9A846E773F8AD1CE2C42140E8E55307E5AEF812FF06C89E1DFE40230D309E40522CA1DF9D861AB0D551ED2478E272D22314BC70EE0
                                                  Malicious:false
                                                  Preview:"10-......: ..... ...." 3.9............. ... ........ ............... ..........Windows XP/2003/Vista/2008/7/8/2012/10/../2016/2019....(c) 10-Strike Software, 2008-2023..https://www.10-strike.ru/..
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):2687077
                                                  Entropy (8bit):6.235428844337768
                                                  Encrypted:false
                                                  SSDEEP:49152:LZAdTa8/KkGXSYTsro5Z18gDs2veuv1955ehFg+S:LZAdTj/KkGNTsrS8gDs2veuv1955kS
                                                  MD5:65D06FD0D3EE647109CDC3EC1CBA21BD
                                                  SHA1:9DE23FE216016BFCD91BA4ABFD797EF1359369BB
                                                  SHA-256:728F59106A8AF359C9039FA7F606AB341E723879F6969FF7534B1132593AD1CD
                                                  SHA-512:2B4C7236B6A67B176BAA65D5B661C98D34092ED8B36B0E7D7C226A5D8ED2FF92F42D4FEACEFE96D26AD2BE3FA055D7CEE751942855DA146C1A0786D7F7612497
                                                  Malicious:false
                                                  Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....^F_..........#...............................@..........................@).........................................................8!...........................................................................................................text...Z........................... ..`.rdata..N .......0..................@..@.data...8T... ...0... ..............@....rsrc....0.......0...P..............@..@_uhead_8........e...................a...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:ISO-8859 text, with very long lines (584), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):5036
                                                  Entropy (8bit):4.851052909539205
                                                  Encrypted:false
                                                  SSDEEP:96:j0kJ9PfltyDJMJ3dhip+1dvToM7ic/67kZ3okehLeV7cYq7:j4ENhhvMMxeSGr7
                                                  MD5:DC55027FDFFA56D9112D3D0E4F9AEA5E
                                                  SHA1:94B340BB7E649B348F711E692159193C15FFE6B6
                                                  SHA-256:5AF24498951E305FE55378C58808261359DC559CC11BE72A56726AECD1F8676F
                                                  SHA-512:8DCD22BAC7ED110B4511D52B612FFB5748241951F4022D625691A9600138171324BCC69854D6C3AF1DF4ED50B746E803BD5DFF8B8CFC29E2D80A856E79D1E549
                                                  Malicious:false
                                                  Preview:............ .......... (.......) ......................... ............ .......... (.......) ........ ............ (......... .......) . ........ ....... . ... ............ ....... ............. .... (..... - ............ ... .........) ......... ... ... "10-......: ..... ...." (..... .........). ... ............ . ......... ........... .. ........ .... (..... - ............... ... .........) - .......... .............. ............. ......... .... .. ......... ... ... "10-......: ..... ....", ....... ........... ............ . ... . ........ ./... ........... .... - ......... ............ ............ (........ .... ..... ....... ...) ................ ..... .. ............. ........., ............ ...... ........... . ....... ......... . ............ . .............. ......... ........... (.........) ......... . ......... (....... ................ ........)............ ....... ...... (............. ..........)..=================================================........... ...... (....
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:ISO-8859 text, with very long lines (339), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):15866
                                                  Entropy (8bit):5.020543360778776
                                                  Encrypted:false
                                                  SSDEEP:384:Aqw+UCSCoILf3W+RC1L2X3Mnh+Yw/QptSMPWbaQP:Wc4Ir3Wh2DF4p4laQP
                                                  MD5:BF23B0CB3FB4563A8E76D948920310FF
                                                  SHA1:138D3D1C57DD3FF788843BC088B1A5C01F4852AE
                                                  SHA-256:E98378B5F1FB11DE06503B2143B593D1CB66B2B2E8F831FA39472F83AFDAEB26
                                                  SHA-512:D26A7FE7C29DF0D8843218FC2E89D25B2CA85C6CEE53AB454F17B442673006731AF31F49A7EB6EE1A982A6F347BE87E115D86017C5C1E5D8ECD29ECD640C5FD2
                                                  Malicious:false
                                                  Preview: * 10-......: ..... .... *..https://www.10-strike.ru/network-diagram/..(c) 2008-2023, 10-Strike Software..----------------------------.. ... ......:....* 3.9 * ...... 2023..- ........ ..... .. ......... ONVIF . ......... ..... ............... .. ..... . ............ RTSP URL...- ......... ........... ........ ......... .... ........... . ......... ........ .. ........- ........ ..... .. ........ ........ .... . ....... ....... .. ............- ......... ........... .......... ..... .. ........... ......... .........- ......... ........ ...... ...... ..... . Excel...- .......... ............... ......, ..... ...... ........ ..... ...... ... .............* 3.8 * .... 2022..- ......... ...... ......... . "........ ......"...- ....... ........ ..... ...........- ......... ......... ..... ....... ......... . "........ ....."...- ......... ........... ........ ............ ............ . ...... ......... . ............ .. .. ...... ..- ......... .... .............. ....... ............- ..
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):707354
                                                  Entropy (8bit):6.474068861952533
                                                  Encrypted:false
                                                  SSDEEP:12288:i0QfKb7nH5lrPo37AzHTA63I0ihE4qE7prN9cgKARpkoXYnXExy88:SfKbT5lrPo37AzHTA63/cfqAcgKckoIL
                                                  MD5:2CBC97A095CFDD3589BC3F18586DF579
                                                  SHA1:CA367E06F5C1730329B854E7B6D817DCB94FBC9E
                                                  SHA-256:2025A1484B6A579385BA598DD801FA816736E2A99C38EB7C3C46ADC5B0662A54
                                                  SHA-512:7035C4C21DA8887A3DD076B4B9C959CC1942CA3E30DAEEF6D52DD5DFCFB47E86FCF3C4F2374865E02662BCFD7B33FA1D1AFF3549895D219B9ECE300CBA4AA9C0
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                  Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................&...........3.......@....@..............................................@...............................%...`...>..........................................................................................................CODE.....%.......&.................. ..`DATA....<....@.......*..............@...BSS..........`.......<...................idata...%.......&...<..............@....tls.................b...................rdata...............b..............@..P.reloc..0...........................@..P.rsrc....>...`...>...d..............@..P.....................*..............@..P........................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):719720
                                                  Entropy (8bit):6.620042925263483
                                                  Encrypted:false
                                                  SSDEEP:12288:ST+z0ucMr64M+yiwUqfWY/EThHzgOXfpwN9Cu66vLHL1e13XYFU8HtUDsMBPxtFe:FPAeKLL1e6kpqsookesEiU1xJycD4R1z
                                                  MD5:20B6B06BBD211A8ACFE51193653E4167
                                                  SHA1:817D442B46DD6F35FD9641E0C7262C934ED76848
                                                  SHA-256:7A16E6ED0C0A49AEB8EA4972600A7A1422C92550602A150634B1C221F79300B4
                                                  SHA-512:0F0C31D46E7274F28F62AFBBB4A172CB088AF40F6C71A56297B08D83D16548C0A4FDA4CF5F4A29C1445EEDF15FE81FC405E2EB8680F92C744406D031A05A72C8
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Joe Sandbox View:
                                                  • Filename: install.exe, Detection: malicious, Browse
                                                  • Filename: install.exe, Detection: malicious, Browse
                                                  • Filename: gobEmOm5sr.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: install.exe, Detection: malicious, Browse
                                                  • Filename: install.exe, Detection: malicious, Browse
                                                  • Filename: 5xHCJn3q8sqAf98zV4.exe, Detection: malicious, Browse
                                                  • Filename: kqS23MOytx.exe, Detection: malicious, Browse
                                                  • Filename: install.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+X?|o9Q/o9Q/o9Q/{RR.e9Q/{RT..9Q/{RU.}9Q/{RP.m9Q/=QT.r9Q/=QU.`9Q/=QR.z9Q/.PP.l9Q/o9P/j;Q/.PU.C9Q/.PQ.n9Q/.P./n9Q/.PS.n9Q/Richo9Q/................PE..L...3..c...........!.....d...~......Z........................................ .......9....@.............................4@...)..<.......................h).......S..@...T...............................@............................................text...Lb.......d.................. ..`.rdata...............h..............@..@.data...`I...`...6...D..............@....rsrc................z..............@..@.reloc...S.......T...~..............@..B........................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1471856
                                                  Entropy (8bit):6.8308189184145665
                                                  Encrypted:false
                                                  SSDEEP:24576:6PQ+KpPa3kPjWWJy+0PX7PM6ZB9In8QmMMWwI6/I+no9R2aFVWKZxPo89/xc3lRc:brWW0jnMVpUBuwemQnGP8RqYr1mpbk3
                                                  MD5:A236287C42F921D109475D47E9DCAC2B
                                                  SHA1:6D7C177A0AC3076383669BCE46608EB4B6B787EC
                                                  SHA-256:63AA600A7C914C2D59280069169CC93E750E42C9A1146E238C9128E073D578FD
                                                  SHA-512:C325B12235AD77937E3799F1406EB6AA3BC5479BFDFF0EA2F2178FE243E63689AC37BB539ADCBB326B0DE6C09B884771AD57F59184A5B69065682855382ADD8A
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A.W.A.W.A.W.%.V.A.W.%.VeA.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.A.WUA.W.A.W.A.W2%.V.C.W2%.V.A.W2%.W.A.W2%.V.A.WRich.A.W................PE..L.....r^...........!.....v...............................................................@..........................r......H*..x.......X............B..p3..........@e..............................`e..@............................................text....u.......v.................. ..`.rdata..............z..............@..@.data........@...j... ..............@....rsrc...X...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):392048
                                                  Entropy (8bit):6.542831007177094
                                                  Encrypted:false
                                                  SSDEEP:6144:1eIwnft+S34NVSTjMFR+oVbKQfbno1/1oz6i2EDSD4I+XdtQXGMiFcoOjAWcIhbl:1eIwnft+S34NVSTQD+oVbKQfrC/1ct25
                                                  MD5:EE856A00410ECED8CC609936D01F954E
                                                  SHA1:705D378626AEC86FECFDF04C86244006BC3AF431
                                                  SHA-256:B6192300D3C1476EF3C25A368D055AA401035E78F9F6DBE5F93C84D36EF1FA62
                                                  SHA-512:666D731247DAEAE4B57925DFA8CAE845327FD34E0F6B9AAD1BCF471D1800D7E8AF5642A5FB6E0EC58BA3AC7DD98A6D3FE0B473F34C16FFB9985621C98C0463EF
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../.v[N.%[N.%[N.%4*.$QN.%4*.$.N.%4*.$IN.%4*.$YN.%.*.$HN.%.*.$GN.%.*.$KN.%.*.$XN.%[N.%.O.%.*.$iN.%.*.$ZN.%.*e%ZN.%.*.$ZN.%Rich[N.%........PE..L...D.r^...........!.....8..........^7.......P......................................'.....@..........................6..<)..L_..<.......X...............p3.......3..@,..............................`,..@............P...............................text....7.......8.................. ..`.rdata..l....P.......<..............@..@.data....?...p...6...X..............@....rsrc...X...........................@..@.reloc...3.......4..................@..B................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:ISO-8859 text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):197
                                                  Entropy (8bit):5.4399730864921905
                                                  Encrypted:false
                                                  SSDEEP:6:c+SdoDGi9C9quMc4D+2ZZQTHGdt53D6OL8Qy:U899ZuMcmvGHG5z6VQy
                                                  MD5:5D1F6956165E6F95D80C0EC48C4B7B39
                                                  SHA1:035D8BBF724413EE63BD5E1CA33983552475A650
                                                  SHA-256:CD18B928D2F2F1AAE123C23CC934EF42E89E4CDEAECD2D0961D84A4B2EFF09E7
                                                  SHA-512:5A8317D0A3CA91BD0CDDBA9A846E773F8AD1CE2C42140E8E55307E5AEF812FF06C89E1DFE40230D309E40522CA1DF9D861AB0D551ED2478E272D22314BC70EE0
                                                  Malicious:false
                                                  Preview:"10-......: ..... ...." 3.9............. ... ........ ............... ..........Windows XP/2003/Vista/2008/7/8/2012/10/../2016/2019....(c) 10-Strike Software, 2008-2023..https://www.10-strike.ru/..
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1471856
                                                  Entropy (8bit):6.8308189184145665
                                                  Encrypted:false
                                                  SSDEEP:24576:6PQ+KpPa3kPjWWJy+0PX7PM6ZB9In8QmMMWwI6/I+no9R2aFVWKZxPo89/xc3lRc:brWW0jnMVpUBuwemQnGP8RqYr1mpbk3
                                                  MD5:A236287C42F921D109475D47E9DCAC2B
                                                  SHA1:6D7C177A0AC3076383669BCE46608EB4B6B787EC
                                                  SHA-256:63AA600A7C914C2D59280069169CC93E750E42C9A1146E238C9128E073D578FD
                                                  SHA-512:C325B12235AD77937E3799F1406EB6AA3BC5479BFDFF0EA2F2178FE243E63689AC37BB539ADCBB326B0DE6C09B884771AD57F59184A5B69065682855382ADD8A
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A.W.A.W.A.W.%.V.A.W.%.VeA.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.A.WUA.W.A.W.A.W2%.V.C.W2%.V.A.W2%.W.A.W2%.V.A.WRich.A.W................PE..L.....r^...........!.....v...............................................................@..........................r......H*..x.......X............B..p3..........@e..............................`e..@............................................text....u.......v.................. ..`.rdata..............z..............@..@.data........@...j... ..............@....rsrc...X...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):719720
                                                  Entropy (8bit):6.620042925263483
                                                  Encrypted:false
                                                  SSDEEP:12288:ST+z0ucMr64M+yiwUqfWY/EThHzgOXfpwN9Cu66vLHL1e13XYFU8HtUDsMBPxtFe:FPAeKLL1e6kpqsookesEiU1xJycD4R1z
                                                  MD5:20B6B06BBD211A8ACFE51193653E4167
                                                  SHA1:817D442B46DD6F35FD9641E0C7262C934ED76848
                                                  SHA-256:7A16E6ED0C0A49AEB8EA4972600A7A1422C92550602A150634B1C221F79300B4
                                                  SHA-512:0F0C31D46E7274F28F62AFBBB4A172CB088AF40F6C71A56297B08D83D16548C0A4FDA4CF5F4A29C1445EEDF15FE81FC405E2EB8680F92C744406D031A05A72C8
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+X?|o9Q/o9Q/o9Q/{RR.e9Q/{RT..9Q/{RU.}9Q/{RP.m9Q/=QT.r9Q/=QU.`9Q/=QR.z9Q/.PP.l9Q/o9P/j;Q/.PU.C9Q/.PQ.n9Q/.P./n9Q/.PS.n9Q/Richo9Q/................PE..L...3..c...........!.....d...~......Z........................................ .......9....@.............................4@...)..<.......................h).......S..@...T...............................@............................................text...Lb.......d.................. ..`.rdata...............h..............@..@.data...`I...`...6...D..............@....rsrc................z..............@..@.reloc...S.......T...~..............@..B........................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:ISO-8859 text, with very long lines (584), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):5036
                                                  Entropy (8bit):4.851052909539205
                                                  Encrypted:false
                                                  SSDEEP:96:j0kJ9PfltyDJMJ3dhip+1dvToM7ic/67kZ3okehLeV7cYq7:j4ENhhvMMxeSGr7
                                                  MD5:DC55027FDFFA56D9112D3D0E4F9AEA5E
                                                  SHA1:94B340BB7E649B348F711E692159193C15FFE6B6
                                                  SHA-256:5AF24498951E305FE55378C58808261359DC559CC11BE72A56726AECD1F8676F
                                                  SHA-512:8DCD22BAC7ED110B4511D52B612FFB5748241951F4022D625691A9600138171324BCC69854D6C3AF1DF4ED50B746E803BD5DFF8B8CFC29E2D80A856E79D1E549
                                                  Malicious:false
                                                  Preview:............ .......... (.......) ......................... ............ .......... (.......) ........ ............ (......... .......) . ........ ....... . ... ............ ....... ............. .... (..... - ............ ... .........) ......... ... ... "10-......: ..... ...." (..... .........). ... ............ . ......... ........... .. ........ .... (..... - ............... ... .........) - .......... .............. ............. ......... .... .. ......... ... ... "10-......: ..... ....", ....... ........... ............ . ... . ........ ./... ........... .... - ......... ............ ............ (........ .... ..... ....... ...) ................ ..... .. ............. ........., ............ ...... ........... . ....... ......... . ............ . .............. ......... ........... (.........) ......... . ......... (....... ................ ........)............ ....... ...... (............. ..........)..=================================================........... ...... (....
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):392048
                                                  Entropy (8bit):6.542831007177094
                                                  Encrypted:false
                                                  SSDEEP:6144:1eIwnft+S34NVSTjMFR+oVbKQfbno1/1oz6i2EDSD4I+XdtQXGMiFcoOjAWcIhbl:1eIwnft+S34NVSTQD+oVbKQfrC/1ct25
                                                  MD5:EE856A00410ECED8CC609936D01F954E
                                                  SHA1:705D378626AEC86FECFDF04C86244006BC3AF431
                                                  SHA-256:B6192300D3C1476EF3C25A368D055AA401035E78F9F6DBE5F93C84D36EF1FA62
                                                  SHA-512:666D731247DAEAE4B57925DFA8CAE845327FD34E0F6B9AAD1BCF471D1800D7E8AF5642A5FB6E0EC58BA3AC7DD98A6D3FE0B473F34C16FFB9985621C98C0463EF
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../.v[N.%[N.%[N.%4*.$QN.%4*.$.N.%4*.$IN.%4*.$YN.%.*.$HN.%.*.$GN.%.*.$KN.%.*.$XN.%[N.%.O.%.*.$iN.%.*.$ZN.%.*e%ZN.%.*.$ZN.%Rich[N.%........PE..L...D.r^...........!.....8..........^7.......P......................................'.....@..........................6..<)..L_..<.......X...............p3.......3..@,..............................`,..@............P...............................text....7.......8.................. ..`.rdata..l....P.......<..............@..@.data....?...p...6...X..............@....rsrc...X...........................@..@.reloc...3.......4..................@..B................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:InnoSetup Log FFmpeg Smart GUI, version 0x30, 5045 bytes, 347688\user, "C:\Users\user\AppData\Local\FFmpeg Smart GUI"
                                                  Category:dropped
                                                  Size (bytes):5045
                                                  Entropy (8bit):4.752957722664591
                                                  Encrypted:false
                                                  SSDEEP:96:M6dWr38cpXyH29/+eOIhWb4cVSQs0LL0KKTui:M6dWr33pXyfHIhlcVSQ1L0KDi
                                                  MD5:FB96BDE4929B0AF04F7C9ED8E35F8C66
                                                  SHA1:D12342004BFBCC2C1FC38032BCFBF1F06EE011F6
                                                  SHA-256:6376C06436C6BBCF6B2309F339FA0EB0E4DC1493E79DCE36BD86668A9D7A6277
                                                  SHA-512:0EDCE368D9C77F2E422A5EFB576499726E785AAA1FEB3AF3CB7F916C291802ACCED80E66F5469DA94CCD53D03F2AC743C1F823E6293D63091503A15CB83A5BF4
                                                  Malicious:false
                                                  Preview:Inno Setup Uninstall Log (b)....................................FFmpeg Smart GUI................................................................................................................FFmpeg Smart GUI................................................................................................................0...........%..............................................................................................................................K......M....347688.user-C:\Users\user\AppData\Local\FFmpeg Smart GUI...........3.7./.. .....X......IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User32.dl
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):707354
                                                  Entropy (8bit):6.474068861952533
                                                  Encrypted:false
                                                  SSDEEP:12288:i0QfKb7nH5lrPo37AzHTA63I0ihE4qE7prN9cgKARpkoXYnXExy88:SfKbT5lrPo37AzHTA63/cfqAcgKckoIL
                                                  MD5:2CBC97A095CFDD3589BC3F18586DF579
                                                  SHA1:CA367E06F5C1730329B854E7B6D817DCB94FBC9E
                                                  SHA-256:2025A1484B6A579385BA598DD801FA816736E2A99C38EB7C3C46ADC5B0662A54
                                                  SHA-512:7035C4C21DA8887A3DD076B4B9C959CC1942CA3E30DAEEF6D52DD5DFCFB47E86FCF3C4F2374865E02662BCFD7B33FA1D1AFF3549895D219B9ECE300CBA4AA9C0
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                  Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................&...........3.......@....@..............................................@...............................%...`...>..........................................................................................................CODE.....%.......&.................. ..`DATA....<....@.......*..............@...BSS..........`.......<...................idata...%.......&...<..............@....tls.................b...................rdata...............b..............@..P.reloc..0...........................@..P.rsrc....>...`...>...d..............@..P.....................*..............@..P........................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:ISO-8859 text, with very long lines (339), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):15866
                                                  Entropy (8bit):5.020543360778776
                                                  Encrypted:false
                                                  SSDEEP:384:Aqw+UCSCoILf3W+RC1L2X3Mnh+Yw/QptSMPWbaQP:Wc4Ir3Wh2DF4p4laQP
                                                  MD5:BF23B0CB3FB4563A8E76D948920310FF
                                                  SHA1:138D3D1C57DD3FF788843BC088B1A5C01F4852AE
                                                  SHA-256:E98378B5F1FB11DE06503B2143B593D1CB66B2B2E8F831FA39472F83AFDAEB26
                                                  SHA-512:D26A7FE7C29DF0D8843218FC2E89D25B2CA85C6CEE53AB454F17B442673006731AF31F49A7EB6EE1A982A6F347BE87E115D86017C5C1E5D8ECD29ECD640C5FD2
                                                  Malicious:false
                                                  Preview: * 10-......: ..... .... *..https://www.10-strike.ru/network-diagram/..(c) 2008-2023, 10-Strike Software..----------------------------.. ... ......:....* 3.9 * ...... 2023..- ........ ..... .. ......... ONVIF . ......... ..... ............... .. ..... . ............ RTSP URL...- ......... ........... ........ ......... .... ........... . ......... ........ .. ........- ........ ..... .. ........ ........ .... . ....... ....... .. ............- ......... ........... .......... ..... .. ........... ......... .........- ......... ........ ...... ...... ..... . Excel...- .......... ............... ......, ..... ...... ........ ..... ...... ... .............* 3.8 * .... 2022..- ......... ...... ......... . "........ ......"...- ....... ........ ..... ...........- ......... ......... ..... ....... ......... . "........ ....."...- ......... ........... ........ ............ ............ . ...... ......... . ............ .. .. ...... ..- ......... .... .............. ....... ............- ..
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4096
                                                  Entropy (8bit):4.026670007889822
                                                  Encrypted:false
                                                  SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                                  MD5:0EE914C6F0BB93996C75941E1AD629C6
                                                  SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                                  SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                                  SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):2560
                                                  Entropy (8bit):2.8818118453929262
                                                  Encrypted:false
                                                  SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                  MD5:A69559718AB506675E907FE49DEB71E9
                                                  SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                  SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                  SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):13312
                                                  Entropy (8bit):5.745960477552938
                                                  Encrypted:false
                                                  SSDEEP:384:BXvhMwoSitz/bjx7yxnbdn+EHvbsHoOODCg:BZ7FEAbd+EDsIO
                                                  MD5:A813D18268AFFD4763DDE940246DC7E5
                                                  SHA1:C7366E1FD925C17CC6068001BD38EAEF5B42852F
                                                  SHA-256:E19781AABE466DD8779CB9C8FA41BBB73375447066BB34E876CF388A6ED63C64
                                                  SHA-512:B310ED4CD2E94381C00A6A370FCB7CC867EBE425D705B69CAAAAFFDAFBAB91F72D357966916053E72E68ECF712F2AF7585500C58BB53EC3E1D539179FCB45FB4
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(............................@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):6144
                                                  Entropy (8bit):4.215994423157539
                                                  Encrypted:false
                                                  SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                  MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                  SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                  SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                  SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):23312
                                                  Entropy (8bit):4.596242908851566
                                                  Encrypted:false
                                                  SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                  MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                  SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                  SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                  SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\qgdf1HLJno.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):696832
                                                  Entropy (8bit):6.465953981327079
                                                  Encrypted:false
                                                  SSDEEP:12288:q0QfKb7nH5lrPo37AzHTA63I0ihE4qE7prN9cgKARpkoXYnXExy8:qfKbT5lrPo37AzHTA63/cfqAcgKckoI0
                                                  MD5:77DCBC20C2F217DC78610C5795A55F30
                                                  SHA1:CF161416FF301B77F68629C9B6E98E1AF3E71B05
                                                  SHA-256:10E670B0832ECFF6B1AAF49D596007FD43F0D6C4B6C00F7D354629931522F63E
                                                  SHA-512:AA2B5A08FBE9664D3BB528B313DD50E7C59E94772D7531A2CB538E8F8FE1F74DD09C12AD6A99CEC422FFE4D0186D7A3D96FB070412168F30C80CE7FCC800131A
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................&...........3.......@....@..............................................@...............................%...`...>..........................................................................................................CODE.....%.......&.................. ..`DATA....<....@.......*..............@...BSS..........`.......<...................idata...%.......&...<..............@....tls.................b...................rdata...............b..............@..P.reloc..0...........................@..P.rsrc....>...`...>...d..............@..P.....................*..............@..P........................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.9980541651063675
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 98.86%
                                                  • Inno Setup installer (109748/4) 1.08%
                                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  File name:qgdf1HLJno.exe
                                                  File size:3'825'775 bytes
                                                  MD5:0b0b4093391e1eb14216f9328dd73e2b
                                                  SHA1:4ecb8b2e427c8d22eaa2c77dfef134210f38fc07
                                                  SHA256:b57bf92cf01f32b1df6b540fea73cabcfda60e1cc2111d644521f6db42eac39f
                                                  SHA512:77f79ddd30900cbe4473ec5453a81f40200ffab4020c5ee1c1fd30ccbe2c663a9f0cb700b6313e4180e6297c44df0261c025c6743d2bef675be707c0ab1665c2
                                                  SSDEEP:98304:CDEhtMt58JIikgTf2XasArxC46ohlgcBZ:9t4ADzWVAH6ohlgcBZ
                                                  TLSH:A1063366C906D4BCE143D070543FD03B8473BBA5A8322ED5A35CAC5FEFBB0914AA6617
                                                  File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                  Icon Hash:2d2e3797b32b2b99
                                                  Entrypoint:0x409b24
                                                  Entrypoint Section:CODE
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:1
                                                  OS Version Minor:0
                                                  File Version Major:1
                                                  File Version Minor:0
                                                  Subsystem Version Major:1
                                                  Subsystem Version Minor:0
                                                  Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                  Instruction
                                                  push ebp
                                                  mov ebp, esp
                                                  add esp, FFFFFFC4h
                                                  push ebx
                                                  push esi
                                                  push edi
                                                  xor eax, eax
                                                  mov dword ptr [ebp-10h], eax
                                                  mov dword ptr [ebp-24h], eax
                                                  call 00007FE85114BDA7h
                                                  call 00007FE85114CFAEh
                                                  call 00007FE85114F1D9h
                                                  call 00007FE85114F220h
                                                  call 00007FE851151B13h
                                                  call 00007FE851151C7Ah
                                                  xor eax, eax
                                                  push ebp
                                                  push 0040A1DBh
                                                  push dword ptr fs:[eax]
                                                  mov dword ptr fs:[eax], esp
                                                  xor edx, edx
                                                  push ebp
                                                  push 0040A1A4h
                                                  push dword ptr fs:[edx]
                                                  mov dword ptr fs:[edx], esp
                                                  mov eax, dword ptr [0040C014h]
                                                  call 00007FE8511526A0h
                                                  call 00007FE851152207h
                                                  lea edx, dword ptr [ebp-10h]
                                                  xor eax, eax
                                                  call 00007FE85114F809h
                                                  mov edx, dword ptr [ebp-10h]
                                                  mov eax, 0040CDE8h
                                                  call 00007FE85114BE58h
                                                  push 00000002h
                                                  push 00000000h
                                                  push 00000001h
                                                  mov ecx, dword ptr [0040CDE8h]
                                                  mov dl, 01h
                                                  mov eax, 004072ECh
                                                  call 00007FE851150098h
                                                  mov dword ptr [0040CDECh], eax
                                                  xor edx, edx
                                                  push ebp
                                                  push 0040A15Ch
                                                  push dword ptr fs:[edx]
                                                  mov dword ptr fs:[edx], esp
                                                  call 00007FE851152710h
                                                  mov dword ptr [0040CDF4h], eax
                                                  mov eax, dword ptr [0040CDF4h]
                                                  cmp dword ptr [eax+0Ch], 01h
                                                  jne 00007FE85115284Ah
                                                  mov eax, dword ptr [0040CDF4h]
                                                  mov edx, 00000028h
                                                  call 00007FE851150499h
                                                  mov edx, dword ptr [0040CDF4h]
                                                  cmp eax, dword ptr [edx+00h]
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  CODE0x10000x92440x940017a0c4d24a1239a8a2bbe3c33bac361dFalse0.6100612331081081data6.530868468219414IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  DATA0xb0000x24c0x400d3419c24ef413c593dd41762aea29e19False0.3076171875data2.7354399295454255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  BSS0xc0000xe4c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                  .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                  .rsrc0x110000x2c000x2c00719d70ee7ef72b93a3db280a91819bccFalse0.32270951704545453data4.4586330003979375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                  RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                  RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                  RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                  RT_STRING0x125740x2f2data0.35543766578249336
                                                  RT_STRING0x128680x30cdata0.3871794871794872
                                                  RT_STRING0x12b740x2cedata0.42618384401114207
                                                  RT_STRING0x12e440x68data0.75
                                                  RT_STRING0x12eac0xb4data0.6277777777777778
                                                  RT_STRING0x12f600xaedata0.5344827586206896
                                                  RT_RCDATA0x130100x2cdata1.1818181818181819
                                                  RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                  RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.27483443708609273
                                                  RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                  DLLImport
                                                  kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                  user32.dllMessageBoxA
                                                  oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                  advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                  kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                  user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                  comctl32.dllInitCommonControls
                                                  advapi32.dllAdjustTokenPrivileges
                                                  Language of compilation systemCountry where language is spokenMap
                                                  DutchNetherlands
                                                  EnglishUnited States
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-09-06T19:52:49.782928+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449736185.196.8.21480TCP
                                                  2024-09-06T19:52:49.782928+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449736185.196.8.21480TCP
                                                  2024-09-06T19:52:52.693625+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449736185.196.8.21480TCP
                                                  2024-09-06T19:52:52.693625+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449736185.196.8.21480TCP
                                                  2024-09-06T19:52:53.044490+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449736185.196.8.21480TCP
                                                  2024-09-06T19:52:53.044490+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449736185.196.8.21480TCP
                                                  2024-09-06T19:52:53.867346+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449740185.196.8.21480TCP
                                                  2024-09-06T19:52:53.867346+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449740185.196.8.21480TCP
                                                  2024-09-06T19:52:54.220857+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449740185.196.8.21480TCP
                                                  2024-09-06T19:52:54.220857+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449740185.196.8.21480TCP
                                                  2024-09-06T19:52:55.025750+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449741185.196.8.21480TCP
                                                  2024-09-06T19:52:55.025750+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449741185.196.8.21480TCP
                                                  2024-09-06T19:52:55.841500+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449742185.196.8.21480TCP
                                                  2024-09-06T19:52:55.841500+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449742185.196.8.21480TCP
                                                  2024-09-06T19:52:56.671160+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449743185.196.8.21480TCP
                                                  2024-09-06T19:52:56.671160+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449743185.196.8.21480TCP
                                                  2024-09-06T19:52:57.630991+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449744185.196.8.21480TCP
                                                  2024-09-06T19:52:57.630991+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449744185.196.8.21480TCP
                                                  2024-09-06T19:52:57.979664+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449744185.196.8.21480TCP
                                                  2024-09-06T19:52:57.979664+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449744185.196.8.21480TCP
                                                  2024-09-06T19:52:58.795934+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449745185.196.8.21480TCP
                                                  2024-09-06T19:52:58.795934+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449745185.196.8.21480TCP
                                                  2024-09-06T19:52:59.636862+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449746185.196.8.21480TCP
                                                  2024-09-06T19:52:59.636862+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449746185.196.8.21480TCP
                                                  2024-09-06T19:53:00.471051+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449747185.196.8.21480TCP
                                                  2024-09-06T19:53:00.471051+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449747185.196.8.21480TCP
                                                  2024-09-06T19:53:01.286711+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449748185.196.8.21480TCP
                                                  2024-09-06T19:53:01.286711+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449748185.196.8.21480TCP
                                                  2024-09-06T19:53:01.646691+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449748185.196.8.21480TCP
                                                  2024-09-06T19:53:01.646691+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449748185.196.8.21480TCP
                                                  2024-09-06T19:53:02.477744+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449749185.196.8.21480TCP
                                                  2024-09-06T19:53:02.477744+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449749185.196.8.21480TCP
                                                  2024-09-06T19:53:03.308477+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449750185.196.8.21480TCP
                                                  2024-09-06T19:53:03.308477+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449750185.196.8.21480TCP
                                                  2024-09-06T19:53:04.154627+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449751185.196.8.21480TCP
                                                  2024-09-06T19:53:04.154627+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449751185.196.8.21480TCP
                                                  2024-09-06T19:53:04.959648+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449752185.196.8.21480TCP
                                                  2024-09-06T19:53:04.959648+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449752185.196.8.21480TCP
                                                  2024-09-06T19:53:05.314692+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449752185.196.8.21480TCP
                                                  2024-09-06T19:53:05.314692+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449752185.196.8.21480TCP
                                                  2024-09-06T19:53:06.179803+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449753185.196.8.21480TCP
                                                  2024-09-06T19:53:06.179803+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449753185.196.8.21480TCP
                                                  2024-09-06T19:53:07.000725+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449754185.196.8.21480TCP
                                                  2024-09-06T19:53:07.000725+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449754185.196.8.21480TCP
                                                  2024-09-06T19:53:07.812218+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449755185.196.8.21480TCP
                                                  2024-09-06T19:53:07.812218+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449755185.196.8.21480TCP
                                                  2024-09-06T19:53:08.631133+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449756185.196.8.21480TCP
                                                  2024-09-06T19:53:08.631133+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449756185.196.8.21480TCP
                                                  2024-09-06T19:53:08.978513+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449756185.196.8.21480TCP
                                                  2024-09-06T19:53:08.978513+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449756185.196.8.21480TCP
                                                  2024-09-06T19:53:09.798632+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449757185.196.8.21480TCP
                                                  2024-09-06T19:53:09.798632+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449757185.196.8.21480TCP
                                                  2024-09-06T19:53:10.630206+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449758185.196.8.21480TCP
                                                  2024-09-06T19:53:10.630206+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449758185.196.8.21480TCP
                                                  2024-09-06T19:53:10.979197+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449758185.196.8.21480TCP
                                                  2024-09-06T19:53:10.979197+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449758185.196.8.21480TCP
                                                  2024-09-06T19:53:11.818431+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449759185.196.8.21480TCP
                                                  2024-09-06T19:53:11.818431+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449759185.196.8.21480TCP
                                                  2024-09-06T19:53:12.173813+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449759185.196.8.21480TCP
                                                  2024-09-06T19:53:12.173813+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449759185.196.8.21480TCP
                                                  2024-09-06T19:53:12.998857+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449760185.196.8.21480TCP
                                                  2024-09-06T19:53:12.998857+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449760185.196.8.21480TCP
                                                  2024-09-06T19:53:13.823982+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449761185.196.8.21480TCP
                                                  2024-09-06T19:53:13.823982+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449761185.196.8.21480TCP
                                                  2024-09-06T19:53:14.646518+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449762185.196.8.21480TCP
                                                  2024-09-06T19:53:14.646518+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449762185.196.8.21480TCP
                                                  2024-09-06T19:53:14.999795+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449762185.196.8.21480TCP
                                                  2024-09-06T19:53:14.999795+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449762185.196.8.21480TCP
                                                  2024-09-06T19:53:15.950501+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449763185.196.8.21480TCP
                                                  2024-09-06T19:53:15.950501+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449763185.196.8.21480TCP
                                                  2024-09-06T19:53:16.771874+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449764185.196.8.21480TCP
                                                  2024-09-06T19:53:16.771874+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449764185.196.8.21480TCP
                                                  2024-09-06T19:53:17.125198+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449764185.196.8.21480TCP
                                                  2024-09-06T19:53:17.125198+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449764185.196.8.21480TCP
                                                  2024-09-06T19:53:17.928145+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449765185.196.8.21480TCP
                                                  2024-09-06T19:53:17.928145+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449765185.196.8.21480TCP
                                                  2024-09-06T19:53:18.286780+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449765185.196.8.21480TCP
                                                  2024-09-06T19:53:18.286780+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449765185.196.8.21480TCP
                                                  2024-09-06T19:53:18.635499+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449765185.196.8.21480TCP
                                                  2024-09-06T19:53:18.635499+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449765185.196.8.21480TCP
                                                  2024-09-06T19:53:19.450030+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449766185.196.8.21480TCP
                                                  2024-09-06T19:53:19.450030+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449766185.196.8.21480TCP
                                                  2024-09-06T19:53:20.294461+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449767185.196.8.21480TCP
                                                  2024-09-06T19:53:20.294461+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449767185.196.8.21480TCP
                                                  2024-09-06T19:53:21.113247+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449768185.196.8.21480TCP
                                                  2024-09-06T19:53:21.113247+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449768185.196.8.21480TCP
                                                  2024-09-06T19:53:21.463197+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449768185.196.8.21480TCP
                                                  2024-09-06T19:53:21.463197+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449768185.196.8.21480TCP
                                                  2024-09-06T19:53:22.299828+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449769185.196.8.21480TCP
                                                  2024-09-06T19:53:22.299828+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449769185.196.8.21480TCP
                                                  2024-09-06T19:53:22.652758+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449769185.196.8.21480TCP
                                                  2024-09-06T19:53:22.652758+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449769185.196.8.21480TCP
                                                  2024-09-06T19:53:23.631474+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449770185.196.8.21480TCP
                                                  2024-09-06T19:53:23.631474+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449770185.196.8.21480TCP
                                                  2024-09-06T19:53:24.452510+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449771185.196.8.21480TCP
                                                  2024-09-06T19:53:24.452510+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449771185.196.8.21480TCP
                                                  2024-09-06T19:53:25.263538+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449772185.196.8.21480TCP
                                                  2024-09-06T19:53:25.263538+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449772185.196.8.21480TCP
                                                  2024-09-06T19:53:26.133938+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449773185.196.8.21480TCP
                                                  2024-09-06T19:53:26.133938+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449773185.196.8.21480TCP
                                                  2024-09-06T19:53:26.481842+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449773185.196.8.21480TCP
                                                  2024-09-06T19:53:26.481842+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449773185.196.8.21480TCP
                                                  2024-09-06T19:53:27.307980+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449774185.196.8.21480TCP
                                                  2024-09-06T19:53:27.307980+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449774185.196.8.21480TCP
                                                  2024-09-06T19:53:28.168799+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449775185.196.8.21480TCP
                                                  2024-09-06T19:53:28.168799+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449775185.196.8.21480TCP
                                                  2024-09-06T19:53:29.023584+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449776185.196.8.21480TCP
                                                  2024-09-06T19:53:29.023584+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449776185.196.8.21480TCP
                                                  2024-09-06T19:53:29.374135+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449776185.196.8.21480TCP
                                                  2024-09-06T19:53:29.374135+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449776185.196.8.21480TCP
                                                  2024-09-06T19:53:30.210531+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449777185.196.8.21480TCP
                                                  2024-09-06T19:53:30.210531+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449777185.196.8.21480TCP
                                                  2024-09-06T19:53:30.560548+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449777185.196.8.21480TCP
                                                  2024-09-06T19:53:30.560548+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449777185.196.8.21480TCP
                                                  2024-09-06T19:53:31.404527+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449778185.196.8.21480TCP
                                                  2024-09-06T19:53:31.404527+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449778185.196.8.21480TCP
                                                  2024-09-06T19:53:32.227490+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449779185.196.8.21480TCP
                                                  2024-09-06T19:53:32.227490+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449779185.196.8.21480TCP
                                                  2024-09-06T19:53:32.586238+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449779185.196.8.21480TCP
                                                  2024-09-06T19:53:32.586238+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449779185.196.8.21480TCP
                                                  2024-09-06T19:53:33.431921+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449780185.196.8.21480TCP
                                                  2024-09-06T19:53:33.431921+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449780185.196.8.21480TCP
                                                  2024-09-06T19:53:34.255850+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449781185.196.8.21480TCP
                                                  2024-09-06T19:53:34.255850+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449781185.196.8.21480TCP
                                                  2024-09-06T19:53:34.601842+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449781185.196.8.21480TCP
                                                  2024-09-06T19:53:34.601842+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449781185.196.8.21480TCP
                                                  2024-09-06T19:53:34.946479+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449781185.196.8.21480TCP
                                                  2024-09-06T19:53:34.946479+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449781185.196.8.21480TCP
                                                  2024-09-06T19:53:35.295901+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449781185.196.8.21480TCP
                                                  2024-09-06T19:53:35.295901+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449781185.196.8.21480TCP
                                                  2024-09-06T19:53:36.174263+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449782185.196.8.21480TCP
                                                  2024-09-06T19:53:36.174263+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449782185.196.8.21480TCP
                                                  2024-09-06T19:53:37.052507+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449783185.196.8.21480TCP
                                                  2024-09-06T19:53:37.052507+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449783185.196.8.21480TCP
                                                  2024-09-06T19:53:37.968781+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449784185.196.8.21480TCP
                                                  2024-09-06T19:53:37.968781+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449784185.196.8.21480TCP
                                                  2024-09-06T19:53:38.795697+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449785185.196.8.21480TCP
                                                  2024-09-06T19:53:38.795697+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449785185.196.8.21480TCP
                                                  2024-09-06T19:53:39.678947+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449786185.196.8.21480TCP
                                                  2024-09-06T19:53:39.678947+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449786185.196.8.21480TCP
                                                  2024-09-06T19:53:40.521170+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449787185.196.8.21480TCP
                                                  2024-09-06T19:53:40.521170+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449787185.196.8.21480TCP
                                                  2024-09-06T19:53:40.867660+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449787185.196.8.21480TCP
                                                  2024-09-06T19:53:40.867660+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449787185.196.8.21480TCP
                                                  2024-09-06T19:53:41.222104+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449787185.196.8.21480TCP
                                                  2024-09-06T19:53:41.222104+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449787185.196.8.21480TCP
                                                  2024-09-06T19:53:41.668515+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449787185.196.8.21480TCP
                                                  2024-09-06T19:53:41.668515+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449787185.196.8.21480TCP
                                                  2024-09-06T19:53:42.512973+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449788185.196.8.21480TCP
                                                  2024-09-06T19:53:42.512973+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449788185.196.8.21480TCP
                                                  2024-09-06T19:53:43.341694+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449789185.196.8.21480TCP
                                                  2024-09-06T19:53:43.341694+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449789185.196.8.21480TCP
                                                  2024-09-06T19:53:44.163221+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449790185.196.8.21480TCP
                                                  2024-09-06T19:53:44.163221+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449790185.196.8.21480TCP
                                                  2024-09-06T19:53:44.509885+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449790185.196.8.21480TCP
                                                  2024-09-06T19:53:44.509885+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449790185.196.8.21480TCP
                                                  2024-09-06T19:53:45.559489+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449791185.196.8.21480TCP
                                                  2024-09-06T19:53:45.559489+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449791185.196.8.21480TCP
                                                  2024-09-06T19:53:46.395520+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449792185.196.8.21480TCP
                                                  2024-09-06T19:53:46.395520+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449792185.196.8.21480TCP
                                                  2024-09-06T19:53:46.747385+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449792185.196.8.21480TCP
                                                  2024-09-06T19:53:46.747385+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449792185.196.8.21480TCP
                                                  2024-09-06T19:53:47.556149+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449793185.196.8.21480TCP
                                                  2024-09-06T19:53:47.556149+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449793185.196.8.21480TCP
                                                  2024-09-06T19:53:47.898036+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449793185.196.8.21480TCP
                                                  2024-09-06T19:53:47.898036+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449793185.196.8.21480TCP
                                                  2024-09-06T19:53:48.758439+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449794185.196.8.21480TCP
                                                  2024-09-06T19:53:48.758439+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449794185.196.8.21480TCP
                                                  2024-09-06T19:53:49.568765+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449795185.196.8.21480TCP
                                                  2024-09-06T19:53:49.568765+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449795185.196.8.21480TCP
                                                  2024-09-06T19:53:50.371973+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449796185.196.8.21480TCP
                                                  2024-09-06T19:53:50.371973+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449796185.196.8.21480TCP
                                                  2024-09-06T19:53:51.189728+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449797185.196.8.21480TCP
                                                  2024-09-06T19:53:51.189728+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449797185.196.8.21480TCP
                                                  2024-09-06T19:53:52.774390+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449798185.196.8.21480TCP
                                                  2024-09-06T19:53:52.774390+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449798185.196.8.21480TCP
                                                  2024-09-06T19:53:53.594895+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449799185.196.8.21480TCP
                                                  2024-09-06T19:53:53.594895+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449799185.196.8.21480TCP
                                                  2024-09-06T19:53:54.430894+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449800185.196.8.21480TCP
                                                  2024-09-06T19:53:54.430894+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449800185.196.8.21480TCP
                                                  2024-09-06T19:53:55.250974+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449801185.196.8.21480TCP
                                                  2024-09-06T19:53:55.250974+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449801185.196.8.21480TCP
                                                  2024-09-06T19:53:56.067004+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449802185.196.8.21480TCP
                                                  2024-09-06T19:53:56.067004+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449802185.196.8.21480TCP
                                                  2024-09-06T19:53:56.918973+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449803185.196.8.21480TCP
                                                  2024-09-06T19:53:56.918973+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449803185.196.8.21480TCP
                                                  2024-09-06T19:53:57.757151+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449804185.196.8.21480TCP
                                                  2024-09-06T19:53:57.757151+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449804185.196.8.21480TCP
                                                  2024-09-06T19:53:58.592939+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449805185.196.8.21480TCP
                                                  2024-09-06T19:53:58.592939+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449805185.196.8.21480TCP
                                                  2024-09-06T19:53:59.457944+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449806185.196.8.21480TCP
                                                  2024-09-06T19:53:59.457944+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449806185.196.8.21480TCP
                                                  2024-09-06T19:54:00.293095+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449807185.196.8.21480TCP
                                                  2024-09-06T19:54:00.293095+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449807185.196.8.21480TCP
                                                  2024-09-06T19:54:01.148735+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449808185.196.8.21480TCP
                                                  2024-09-06T19:54:01.148735+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449808185.196.8.21480TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Sep 6, 2024 19:52:49.079766035 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:49.084764957 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:49.084944010 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:49.085020065 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:49.089967966 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:49.782748938 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:49.782927990 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:49.784508944 CEST497372023192.168.2.489.105.201.183
                                                  Sep 6, 2024 19:52:49.789330006 CEST20234973789.105.201.183192.168.2.4
                                                  Sep 6, 2024 19:52:49.789401054 CEST497372023192.168.2.489.105.201.183
                                                  Sep 6, 2024 19:52:49.789480925 CEST497372023192.168.2.489.105.201.183
                                                  Sep 6, 2024 19:52:49.794285059 CEST20234973789.105.201.183192.168.2.4
                                                  Sep 6, 2024 19:52:49.794347048 CEST497372023192.168.2.489.105.201.183
                                                  Sep 6, 2024 19:52:49.799309969 CEST20234973789.105.201.183192.168.2.4
                                                  Sep 6, 2024 19:52:50.437813044 CEST20234973789.105.201.183192.168.2.4
                                                  Sep 6, 2024 19:52:50.487401962 CEST497372023192.168.2.489.105.201.183
                                                  Sep 6, 2024 19:52:52.444286108 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:52.449273109 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:52.693248987 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:52.693624973 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:52.803230047 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:52.808130026 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:53.044408083 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:53.044490099 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:53.045173883 CEST497392023192.168.2.489.105.201.183
                                                  Sep 6, 2024 19:52:53.050015926 CEST20234973989.105.201.183192.168.2.4
                                                  Sep 6, 2024 19:52:53.050100088 CEST497392023192.168.2.489.105.201.183
                                                  Sep 6, 2024 19:52:53.050117970 CEST497392023192.168.2.489.105.201.183
                                                  Sep 6, 2024 19:52:53.050194979 CEST497392023192.168.2.489.105.201.183
                                                  Sep 6, 2024 19:52:53.054899931 CEST20234973989.105.201.183192.168.2.4
                                                  Sep 6, 2024 19:52:53.098653078 CEST20234973989.105.201.183192.168.2.4
                                                  Sep 6, 2024 19:52:53.162897110 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:53.163207054 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:53.168081045 CEST8049740185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:53.168167114 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:53.168327093 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:53.168339968 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:53.168390989 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:53.173168898 CEST8049740185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:53.482340097 CEST20234973989.105.201.183192.168.2.4
                                                  Sep 6, 2024 19:52:53.485074043 CEST497392023192.168.2.489.105.201.183
                                                  Sep 6, 2024 19:52:53.867274046 CEST8049740185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:53.867346048 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:53.975682974 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:53.980474949 CEST8049740185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:54.220685959 CEST8049740185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:54.220856905 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:54.334774971 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:54.335107088 CEST4974180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:54.340166092 CEST8049740185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:54.340229034 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:54.340693951 CEST8049741185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:54.340764999 CEST4974180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:54.340873003 CEST4974180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:54.345984936 CEST8049741185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:55.025700092 CEST8049741185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:55.025749922 CEST4974180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:55.147384882 CEST4974180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:55.147715092 CEST4974280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:55.152822018 CEST8049741185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:55.152837992 CEST8049742185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:55.152903080 CEST4974180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:55.152946949 CEST4974280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:55.153103113 CEST4974280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:55.158175945 CEST8049742185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:55.841356039 CEST8049742185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:55.841500044 CEST4974280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:55.959788084 CEST4974280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:55.960092068 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:55.968513012 CEST8049743185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:55.968650103 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:55.968792915 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:55.970695019 CEST8049742185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:55.970761061 CEST4974280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:55.978805065 CEST8049743185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:56.671056032 CEST8049743185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:56.671159983 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:56.788584948 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:56.788965940 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:56.794908047 CEST8049743185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:56.794967890 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:56.795115948 CEST8049744185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:56.795172930 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:56.795521021 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:56.800331116 CEST8049744185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:57.630801916 CEST8049744185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:57.630990982 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:57.741108894 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:57.746984959 CEST8049744185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:57.979610920 CEST8049744185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:57.979664087 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:58.100491047 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:58.100796938 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:58.105864048 CEST8049744185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:58.105931997 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:58.106379986 CEST8049745185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:58.106442928 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:58.106549978 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:58.111763000 CEST8049745185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:58.795861006 CEST8049745185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:58.795933962 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:58.921050072 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:58.921372890 CEST4974680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:58.926192999 CEST8049745185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:58.926246881 CEST8049746185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:58.926261902 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:58.926312923 CEST4974680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:58.926428080 CEST4974680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:58.931627035 CEST8049746185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:59.636647940 CEST8049746185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:59.636862040 CEST4974680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:59.756577015 CEST4974680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:59.757028103 CEST4974780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:59.762175083 CEST8049746185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:59.762269974 CEST4974680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:59.762430906 CEST8049747185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:52:59.762495995 CEST4974780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:59.762630939 CEST4974780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:52:59.767486095 CEST8049747185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:00.470765114 CEST8049747185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:00.471050978 CEST4974780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:00.585571051 CEST4974780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:00.585891008 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:00.590929031 CEST8049747185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:00.591041088 CEST4974780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:00.591254950 CEST8049748185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:00.591334105 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:00.591512918 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:00.596532106 CEST8049748185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:01.286617994 CEST8049748185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:01.286710978 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:01.396786928 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:01.401699066 CEST8049748185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:01.646595955 CEST8049748185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:01.646691084 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:01.771948099 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:01.772269964 CEST4974980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:01.778634071 CEST8049749185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:01.778709888 CEST4974980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:01.778858900 CEST4974980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:01.778882980 CEST8049748185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:01.778934002 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:01.783644915 CEST8049749185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:02.477649927 CEST8049749185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:02.477744102 CEST4974980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:02.602483034 CEST4974980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:02.602823973 CEST4975080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:02.607584953 CEST8049749185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:02.607640028 CEST4974980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:02.608175039 CEST8049750185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:02.608237982 CEST4975080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:02.608370066 CEST4975080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:02.613392115 CEST8049750185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:03.308399916 CEST8049750185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:03.308476925 CEST4975080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:03.428375006 CEST4975080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:03.428766012 CEST4975180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:03.433746099 CEST8049751185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:03.433834076 CEST4975180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:03.433885098 CEST8049750185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:03.433938980 CEST4975080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:03.434063911 CEST4975180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:03.438854933 CEST8049751185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:04.154558897 CEST8049751185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:04.154627085 CEST4975180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:04.271755934 CEST4975180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:04.272087097 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:04.276870012 CEST8049751185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:04.276936054 CEST4975180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:04.276998997 CEST8049752185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:04.277060032 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:04.277194977 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:04.282243013 CEST8049752185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:04.959594965 CEST8049752185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:04.959647894 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:05.069289923 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:05.074515104 CEST8049752185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:05.314501047 CEST8049752185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:05.314692020 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:05.450340986 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:05.450805902 CEST4975380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:05.456182957 CEST8049752185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:05.456249952 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:05.456291914 CEST8049753185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:05.456352949 CEST4975380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:05.456614971 CEST4975380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:05.461421013 CEST8049753185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:06.179740906 CEST8049753185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:06.179802895 CEST4975380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:06.305315018 CEST4975380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:06.305638075 CEST4975480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:06.311295033 CEST8049753185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:06.311364889 CEST4975380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:06.311397076 CEST8049754185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:06.311456919 CEST4975480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:06.311554909 CEST4975480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:06.317048073 CEST8049754185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:06.998514891 CEST8049754185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:07.000725031 CEST4975480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:07.115828037 CEST4975480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:07.116118908 CEST4975580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:07.120930910 CEST8049755185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:07.121028900 CEST4975580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:07.121053934 CEST8049754185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:07.121193886 CEST4975580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:07.121217966 CEST4975480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:07.126027107 CEST8049755185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:07.811575890 CEST8049755185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:07.812217951 CEST4975580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:07.928280115 CEST4975580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:07.928561926 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:07.933938026 CEST8049756185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:07.934001923 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:07.934103966 CEST8049755185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:07.934107065 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:07.934139967 CEST4975580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:07.938987970 CEST8049756185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:08.630929947 CEST8049756185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:08.631133080 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:08.741211891 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:08.746136904 CEST8049756185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:08.978399038 CEST8049756185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:08.978513002 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:09.100105047 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:09.100503922 CEST4975780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:09.105240107 CEST8049756185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:09.105305910 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:09.105345964 CEST8049757185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:09.105403900 CEST4975780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:09.105511904 CEST4975780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:09.110270977 CEST8049757185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:09.798482895 CEST8049757185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:09.798631907 CEST4975780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:09.912333012 CEST4975780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:09.912724972 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:09.917599916 CEST8049757185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:09.917669058 CEST4975780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:09.917702913 CEST8049758185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:09.917759895 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:09.917918921 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:09.922977924 CEST8049758185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:10.630003929 CEST8049758185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:10.630206108 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:10.742038965 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:10.746974945 CEST8049758185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:10.979027987 CEST8049758185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:10.979197025 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:11.100419044 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:11.100703955 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:11.105586052 CEST8049758185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:11.105648041 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:11.105906010 CEST8049759185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:11.105961084 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:11.106107950 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:11.111160040 CEST8049759185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:11.818267107 CEST8049759185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:11.818430901 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:11.928738117 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:11.933588982 CEST8049759185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:12.173638105 CEST8049759185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:12.173813105 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:12.294013023 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:12.294193029 CEST4976080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:12.298990965 CEST8049760185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:12.299019098 CEST8049759185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:12.299077988 CEST4976080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:12.299117088 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:12.299267054 CEST4976080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:12.303992987 CEST8049760185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:12.998796940 CEST8049760185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:12.998857021 CEST4976080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:13.116236925 CEST4976080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:13.116578102 CEST4976180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:13.122879028 CEST8049761185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:13.122941017 CEST4976180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:13.123116970 CEST4976180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:13.124914885 CEST8049760185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:13.124964952 CEST4976080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:13.127892971 CEST8049761185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:13.823774099 CEST8049761185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:13.823982000 CEST4976180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:13.944051027 CEST4976180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:13.944343090 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:13.949453115 CEST8049762185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:13.949517965 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:13.949609041 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:13.949666023 CEST8049761185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:13.949713945 CEST4976180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:13.954329967 CEST8049762185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:14.646404028 CEST8049762185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:14.646517992 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:14.756583929 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:14.761456013 CEST8049762185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:14.999496937 CEST8049762185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:14.999794960 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:15.121479034 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:15.121794939 CEST4976380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:15.126646042 CEST8049762185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:15.126658916 CEST8049763185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:15.126709938 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:15.126740932 CEST4976380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:15.126890898 CEST4976380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:15.131623983 CEST8049763185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:15.950406075 CEST8049763185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:15.950500965 CEST4976380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:16.068952084 CEST4976380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:16.069258928 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:16.074198008 CEST8049763185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:16.074259043 CEST4976380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:16.074337006 CEST8049764185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:16.074403048 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:16.074553967 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:16.079365969 CEST8049764185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:16.771805048 CEST8049764185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:16.771873951 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:16.881501913 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:16.886903048 CEST8049764185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:17.125122070 CEST8049764185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:17.125197887 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:17.241738081 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:17.242048025 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:17.246982098 CEST8049765185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:17.247061968 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:17.247327089 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:17.247795105 CEST8049764185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:17.247855902 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:17.252219915 CEST8049765185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:17.928080082 CEST8049765185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:17.928144932 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:18.044274092 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:18.049164057 CEST8049765185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:18.286614895 CEST8049765185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:18.286780119 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:18.400106907 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:18.404978037 CEST8049765185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:18.635317087 CEST8049765185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:18.635499001 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:18.756531954 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:18.756829977 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:18.761616945 CEST8049766185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:18.761689901 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:18.761749029 CEST8049765185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:18.761786938 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:18.761795998 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:18.766494036 CEST8049766185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:19.449875116 CEST8049766185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:19.450030088 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:19.569473982 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:19.569798946 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:19.574666023 CEST8049767185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:19.574740887 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:19.574784040 CEST8049766185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:19.574832916 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:19.574832916 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:19.579677105 CEST8049767185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:20.294404984 CEST8049767185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:20.294461012 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:20.413214922 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:20.413536072 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:20.418363094 CEST8049768185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:20.418384075 CEST8049767185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:20.418421030 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:20.418447971 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:20.418642044 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:20.423427105 CEST8049768185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:21.113152027 CEST8049768185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:21.113246918 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:21.226210117 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:21.232120037 CEST8049768185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:21.463126898 CEST8049768185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:21.463196993 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:21.588159084 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:21.588493109 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:21.593312025 CEST8049769185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:21.593394041 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:21.593413115 CEST8049768185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:21.593503952 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:21.593528986 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:21.598306894 CEST8049769185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:22.299714088 CEST8049769185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:22.299828053 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:22.412945986 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:22.418047905 CEST8049769185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:22.652405024 CEST8049769185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:22.652757883 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:22.772610903 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:22.773037910 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:22.902411938 CEST8049770185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:22.902461052 CEST8049769185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:22.902600050 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:22.902600050 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:22.902693033 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:22.907557011 CEST8049770185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:23.631412983 CEST8049770185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:23.631474018 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:23.756500959 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:23.756699085 CEST4977180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:23.761614084 CEST8049771185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:23.761682987 CEST4977180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:23.761765003 CEST4977180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:23.762257099 CEST8049770185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:23.762311935 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:23.766849995 CEST8049771185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:24.452347040 CEST8049771185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:24.452510118 CEST4977180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:24.569035053 CEST4977180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:24.569216967 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:24.574187994 CEST8049772185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:24.574256897 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:24.574340105 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:24.574534893 CEST8049771185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:24.574585915 CEST4977180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:24.579574108 CEST8049772185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:25.263470888 CEST8049772185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:25.263537884 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:25.382288933 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:25.382580042 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:25.388355017 CEST8049772185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:25.388381004 CEST8049773185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:25.388407946 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:25.388452053 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:25.388591051 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:25.393371105 CEST8049773185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:26.133775949 CEST8049773185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:26.133938074 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:26.240880013 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:26.245719910 CEST8049773185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:26.481769085 CEST8049773185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:26.481842041 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:26.600738049 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:26.601017952 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:26.605921984 CEST8049774185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:26.605987072 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:26.606122017 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:26.606645107 CEST8049773185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:26.606693983 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:26.611342907 CEST8049774185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:27.307913065 CEST8049774185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:27.307980061 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:27.434533119 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:27.434853077 CEST4977580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:27.440042973 CEST8049774185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:27.440089941 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:27.442806005 CEST8049775185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:27.442866087 CEST4977580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:27.442982912 CEST4977580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:27.453912973 CEST8049775185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:28.167548895 CEST8049775185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:28.168798923 CEST4977580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:28.288021088 CEST4977580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:28.288314104 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:28.293350935 CEST8049776185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:28.293422937 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:28.293422937 CEST8049775185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:28.293463945 CEST4977580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:28.293613911 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:28.298657894 CEST8049776185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:29.023473978 CEST8049776185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:29.023583889 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:29.131834030 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:29.136882067 CEST8049776185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:29.374074936 CEST8049776185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:29.374135017 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:29.496581078 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:29.496922970 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:29.501743078 CEST8049777185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:29.501806974 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:29.501935959 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:29.501971006 CEST8049776185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:29.502012968 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:29.506753922 CEST8049777185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:30.210444927 CEST8049777185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:30.210530996 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:30.319087982 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:30.325700998 CEST8049777185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:30.560468912 CEST8049777185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:30.560548067 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:30.678422928 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:30.678729057 CEST4977880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:30.683567047 CEST8049777185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:30.683623075 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:30.683689117 CEST8049778185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:30.683758974 CEST4977880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:30.683859110 CEST4977880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:30.688580036 CEST8049778185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:31.404457092 CEST8049778185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:31.404526949 CEST4977880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:31.522295952 CEST4977880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:31.522584915 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:31.527420044 CEST8049779185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:31.527466059 CEST8049778185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:31.527491093 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:31.527508974 CEST4977880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:31.527690887 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:31.532413006 CEST8049779185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:32.227411032 CEST8049779185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:32.227489948 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:32.334685087 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:32.339602947 CEST8049779185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:32.586016893 CEST8049779185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:32.586237907 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:32.709716082 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:32.710012913 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:32.714898109 CEST8049779185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:32.714968920 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:32.714972973 CEST8049780185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:32.715054035 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:32.715157032 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:32.720309973 CEST8049780185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:33.431858063 CEST8049780185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:33.431921005 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:33.555627108 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:33.555924892 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:33.560868025 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:33.560883045 CEST8049780185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:33.560925007 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:33.560954094 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:33.561083078 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:33.566679001 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:34.255778074 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:34.255850077 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:34.366211891 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:34.371140003 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:34.601666927 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:34.601841927 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:34.709650040 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:34.714610100 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:34.946309090 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:34.946479082 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:35.053533077 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:35.058406115 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:35.295737028 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:35.295901060 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:35.412811041 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:35.413391113 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:35.418045998 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:35.418100119 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:35.418175936 CEST8049782185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:35.418239117 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:35.418382883 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:35.423372984 CEST8049782185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:36.174201012 CEST8049782185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:36.174263000 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:36.287816048 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:36.288156986 CEST4978380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:36.293016911 CEST8049783185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:36.293087006 CEST4978380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:36.293194056 CEST4978380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:36.293256044 CEST8049782185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:36.293302059 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:36.298140049 CEST8049783185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:37.052386999 CEST8049783185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:37.052506924 CEST4978380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:37.177948952 CEST4978380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:37.178226948 CEST4978480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:37.183496952 CEST8049783185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:37.183563948 CEST4978380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:37.184012890 CEST8049784185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:37.184083939 CEST4978480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:37.184228897 CEST4978480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:37.189567089 CEST8049784185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:37.968543053 CEST8049784185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:37.968780994 CEST4978480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:38.084975958 CEST4978480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:38.085258007 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:38.090054989 CEST8049785185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:38.090126991 CEST8049784185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:38.090194941 CEST4978480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:38.090204000 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:38.090342999 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:38.095117092 CEST8049785185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:38.795629978 CEST8049785185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:38.795696974 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:38.912775993 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:38.913037062 CEST4978680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:38.917850971 CEST8049786185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:38.917943001 CEST4978680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:38.917989016 CEST8049785185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:38.918036938 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:38.918122053 CEST4978680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:38.922842979 CEST8049786185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:39.678875923 CEST8049786185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:39.678946972 CEST4978680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:39.821940899 CEST4978680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:39.822225094 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:39.827142000 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:39.827225924 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:39.827416897 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:39.827537060 CEST8049786185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:39.827584028 CEST4978680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:39.832395077 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:40.520989895 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:40.521169901 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:40.631932020 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:40.636859894 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:40.867592096 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:40.867660046 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:40.975372076 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:40.980261087 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:41.222038031 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:41.222104073 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:41.334275961 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:41.339231968 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:41.668416977 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:41.668514967 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:41.790493965 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:41.790991068 CEST4978880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:41.795749903 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:41.795814991 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:41.795895100 CEST8049788185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:41.795952082 CEST4978880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:41.796087027 CEST4978880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:41.800921917 CEST8049788185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:42.512911081 CEST8049788185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:42.512973070 CEST4978880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:42.633685112 CEST4978880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:42.633995056 CEST4978980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:42.638957977 CEST8049788185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:42.639018059 CEST4978880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:42.642667055 CEST8049789185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:42.642751932 CEST4978980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:42.642846107 CEST4978980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:42.647655964 CEST8049789185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:43.341497898 CEST8049789185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:43.341694117 CEST4978980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:43.459680080 CEST4978980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:43.459959030 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:43.464850903 CEST8049790185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:43.464919090 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:43.465013981 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:43.465080976 CEST8049789185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:43.465131998 CEST4978980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:43.469857931 CEST8049790185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:44.163163900 CEST8049790185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:44.163220882 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:44.272402048 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:44.277559042 CEST8049790185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:44.509818077 CEST8049790185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:44.509885073 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:44.636507988 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:44.636842966 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:44.641835928 CEST8049790185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:44.641865015 CEST8049791185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:44.641915083 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:44.641967058 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:44.642132044 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:44.647005081 CEST8049791185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:45.559396029 CEST8049791185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:45.559489012 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:45.560313940 CEST8049791185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:45.560364008 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:45.678951025 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:45.679254055 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:45.684230089 CEST8049791185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:45.684299946 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:45.684362888 CEST8049792185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:45.684423923 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:45.684576035 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:45.689476013 CEST8049792185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:46.395437956 CEST8049792185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:46.395519972 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:46.506608009 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:46.511646032 CEST8049792185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:46.747319937 CEST8049792185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:46.747385025 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:46.866027117 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:46.866328001 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:46.871068954 CEST8049792185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:46.871133089 CEST8049793185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:46.871133089 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:46.871201038 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:46.871309042 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:46.876084089 CEST8049793185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:47.556087017 CEST8049793185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:47.556149006 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:47.662938118 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:47.667809010 CEST8049793185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:47.897965908 CEST8049793185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:47.898036003 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:48.006905079 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:48.007206917 CEST4979480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:48.012046099 CEST8049794185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:48.012116909 CEST4979480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:48.012171984 CEST8049793185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:48.012217999 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:48.012269974 CEST4979480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:48.017151117 CEST8049794185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:48.758353949 CEST8049794185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:48.758439064 CEST4979480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:48.866095066 CEST4979480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:48.866386890 CEST4979580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:48.871217966 CEST8049795185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:48.871293068 CEST4979580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:48.871398926 CEST4979580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:48.873203039 CEST8049794185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:48.873256922 CEST4979480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:48.876215935 CEST8049795185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:49.568669081 CEST8049795185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:49.568764925 CEST4979580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:49.678415060 CEST4979580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:49.678683996 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:49.683657885 CEST8049796185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:49.683743954 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:49.683840990 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:49.683912039 CEST8049795185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:49.683959007 CEST4979580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:49.688652039 CEST8049796185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:50.371845961 CEST8049796185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:50.371973038 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:50.493885040 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:50.494189978 CEST4979780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:50.499119997 CEST8049797185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:50.499150038 CEST8049796185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:50.499186039 CEST4979780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:50.499208927 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:50.499321938 CEST4979780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:50.504134893 CEST8049797185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:51.189485073 CEST8049797185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:51.189728022 CEST4979780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:51.303174973 CEST4979780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:51.303466082 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:51.308789015 CEST8049798185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:51.308881044 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:51.309046984 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:51.309343100 CEST8049797185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:51.309398890 CEST4979780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:51.313831091 CEST8049798185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:52.774333000 CEST8049798185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:52.774389982 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:52.774656057 CEST8049798185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:52.774701118 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:52.774971962 CEST8049798185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:52.775012016 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:52.887161016 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:52.887518883 CEST4979980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:52.892935038 CEST8049799185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:52.892992020 CEST8049798185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:52.893033981 CEST4979980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:52.893052101 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:52.893205881 CEST4979980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:52.898334026 CEST8049799185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:53.593961000 CEST8049799185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:53.594894886 CEST4979980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:53.710937023 CEST4979980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:53.711188078 CEST4980080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:53.716001034 CEST8049800185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:53.716077089 CEST4980080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:53.716206074 CEST4980080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:53.716466904 CEST8049799185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:53.716511011 CEST4979980192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:53.721353054 CEST8049800185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:54.430325031 CEST8049800185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:54.430893898 CEST4980080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:54.555092096 CEST4980080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:54.555394888 CEST4980180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:54.560249090 CEST8049800185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:54.560264111 CEST8049801185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:54.560338020 CEST4980080192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:54.560338020 CEST4980180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:54.560456991 CEST4980180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:54.565387964 CEST8049801185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:55.250921965 CEST8049801185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:55.250973940 CEST4980180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:55.369297981 CEST4980180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:55.369698048 CEST4980280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:55.374635935 CEST8049801185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:55.374690056 CEST4980180192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:55.374697924 CEST8049802185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:55.374752998 CEST4980280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:55.374855042 CEST4980280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:55.380659103 CEST8049802185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:56.064913988 CEST8049802185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:56.067003965 CEST4980280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:56.211281061 CEST4980280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:56.214865923 CEST4980380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:56.217442036 CEST8049802185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:56.218888998 CEST4980280192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:56.219933033 CEST8049803185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:56.220051050 CEST4980380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:56.220168114 CEST4980380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:56.225210905 CEST8049803185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:56.916500092 CEST8049803185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:56.918972969 CEST4980380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:57.061222076 CEST4980380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:57.061605930 CEST4980480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:57.066643000 CEST8049803185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:57.066658020 CEST8049804185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:57.066689014 CEST4980380192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:57.066729069 CEST4980480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:57.066860914 CEST4980480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:57.071851969 CEST8049804185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:57.757098913 CEST8049804185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:57.757150888 CEST4980480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:57.873414993 CEST4980480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:57.873661041 CEST4980580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:57.878902912 CEST8049804185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:57.878972054 CEST8049805185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:57.878973007 CEST4980480192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:57.879028082 CEST4980580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:57.887480974 CEST4980580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:57.892323017 CEST8049805185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:58.590462923 CEST8049805185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:58.592938900 CEST4980580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:58.731939077 CEST4980580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:58.737231970 CEST8049805185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:58.743046045 CEST4980580192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:58.743737936 CEST4980680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:58.748560905 CEST8049806185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:58.748811007 CEST4980680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:58.749058962 CEST4980680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:58.754095078 CEST8049806185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:59.457881927 CEST8049806185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:59.457943916 CEST4980680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:59.570812941 CEST4980680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:59.571105003 CEST4980780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:59.575885057 CEST8049806185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:59.575916052 CEST8049807185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:53:59.576059103 CEST4980680192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:59.576093912 CEST4980780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:59.576236010 CEST4980780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:53:59.580959082 CEST8049807185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:54:00.289488077 CEST8049807185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:54:00.293095112 CEST4980780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:54:00.430179119 CEST4980780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:54:00.432882071 CEST4980880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:54:00.435664892 CEST8049807185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:54:00.435895920 CEST4980780192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:54:00.437809944 CEST8049808185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:54:00.441235065 CEST4980880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:54:00.445024967 CEST4980880192.168.2.4185.196.8.214
                                                  Sep 6, 2024 19:54:00.450051069 CEST8049808185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:54:01.148674965 CEST8049808185.196.8.214192.168.2.4
                                                  Sep 6, 2024 19:54:01.148735046 CEST4980880192.168.2.4185.196.8.214
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Sep 6, 2024 19:52:48.995115995 CEST5783253192.168.2.445.155.250.90
                                                  Sep 6, 2024 19:52:49.029162884 CEST535783245.155.250.90192.168.2.4
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Sep 6, 2024 19:52:48.995115995 CEST192.168.2.445.155.250.900x8eb3Standard query (0)aiqorjv.ruA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Sep 6, 2024 19:52:49.029162884 CEST45.155.250.90192.168.2.40x8eb3No error (0)aiqorjv.ru185.196.8.214A (IP address)IN (0x0001)false
                                                  • aiqorjv.ru
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.449736185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:52:49.085020065 CEST313OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396288fb14c1e893 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:52:49.782748938 CEST576INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:52:49 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 31 37 30 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 63 38 31 63 34 35 39 66 65 38 62 64 32 65 39 31 66 31 65 66 35 61 32 35 63 65 39 31 35 38 35 62 63 63 66 62 35 66 62 63 34 30 61 64 39 30 38 38 62 65 38 64 65 32 32 36 36 65 32 30 38 61 36 62 62 39 64 35 39 32 64 65 30 37 33 34 36 61 63 37 30 66 65 37 39 61 62 33 37 35 33 64 65 66 66 64 34 30 30 63 61 34 36 63 64 37 64 62 62 31 33 66 65 32 64 38 38 32 37 65 30 30 65 61 37 36 33 63 32 34 64 62 38 65 32 34 34 65 62 35 61 37 66 34 33 65 37 32 63 36 66 38 62 33 33 36 37 39 30 66 65 31 34 63 30 66 31 39 34 39 61 33 38 63 37 36 39 39 36 31 36 64 38 35 62 38 63 32 62 61 38 35 62 62 32 65 64 34 31 32 30 65 38 37 63 63 63 66 66 37 62 62 66 38 35 65 63 64 35 34 61 65 36 33 35 63 38 31 65 33 30 34 33 35 62 32 34 65 32 33 62 37 34 30 62 37 38 62 30 65 36 38 65 66 65 38 36 32 64 34 37 62 37 31 39 33 66 37 39 39 31 37 36 30 32 61 30 61 35 62 39 38 31 65 63 36 66 33 65 65 30 62 35 32 38 64 32 64 35 62 38 33 39 32 61 30 [TRUNCATED]
                                                  Data Ascii: 17067b68a8a3203a77b0418f55f677c81c459fe8bd2e91f1ef5a25ce91585bccfb5fbc40ad9088be8de2266e208a6bb9d592de07346ac70fe79ab3753deffd400ca46cd7dbb13fe2d8827e00ea763c24db8e244eb5a7f43e72c6f8b336790fe14c0f1949a38c7699616d85b8c2ba85bb2ed4120e87cccff7bbf85ecd54ae635c81e30435b24e23b740b78b0e68efe862d47b7193f79917602a0a5b981ec6f3ee0b528d2d5b8392a05ef34b0cb90bf67d460012e346fa55ecbed0
                                                  Sep 6, 2024 19:52:52.444286108 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:52:52.693248987 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:52:52 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:52:52.803230047 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:52:53.044408083 CEST431INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:52:52 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 30 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 37 38 61 64 32 65 61 31 61 31 37 66 35 61 31 35 30 65 63 31 64 64 35 66 65 38 33 65 37 39 31 38 37 34 64 38 62 34 66 64 32 66 62 64 63 33 35 33 33 62 39 34 64 66 62 64 33 64 61 31 61 32 31 65 33 37 31 35 38 61 64 37 35 66 64 36 66 61 31 32 64 35 64 63 30 65 30 64 32 30 64 63 30 35 64 63 63 37 64 62 33 31 61 66 39 33 33 38 61 32 36 65 66 31 33 61 37 37 38 63 37 35 32 62 66 66 64 34 66 65 38 35 64 36 31 34 31 65 65 32 32 36 64 39 36 33 62 36 37 38 65 66 34 31 30 63 38 65 61 38 62 39 62 33 66 63 63 37 31 39 30 31 35 63 36 35 39 38 35 32 39 62 36 35 39 62 33 64 39 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e067b69c953804b26b565fe95b321bd19a55f78ad2ea1a17f5a150ec1dd5fe83e791874d8b4fd2fbdc3533b94dfbd3da1a21e37158ad75fd6fa12d5dc0e0d20dc05dcc7db31af9338a26ef13a778c752bffd4fe85d6141ee226d963b678ef410c8ea8b9b3fcc719015c6598529b659b3d90


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.449740185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:52:53.168327093 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:52:53.867274046 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:52:53 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:52:53.975682974 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:52:54.220685959 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:52:54 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.449741185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:52:54.340873003 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:52:55.025700092 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:52:54 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.449742185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:52:55.153103113 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:52:55.841356039 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:52:55 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.449743185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:52:55.968792915 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:52:56.671056032 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:52:56 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.449744185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:52:56.795521021 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:52:57.630801916 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:52:57 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:52:57.741108894 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:52:57.979610920 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:52:57 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.449745185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:52:58.106549978 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:52:58.795861006 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:52:58 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  7192.168.2.449746185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:52:58.926428080 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:52:59.636647940 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:52:59 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  8192.168.2.449747185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:52:59.762630939 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:00.470765114 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:00 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  9192.168.2.449748185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:00.591512918 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:01.286617994 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:01 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:01.396786928 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:01.646595955 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:01 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  10192.168.2.449749185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:01.778858900 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:02.477649927 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:02 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  11192.168.2.449750185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:02.608370066 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:03.308399916 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:03 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  12192.168.2.449751185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:03.434063911 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:04.154558897 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:04 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  13192.168.2.449752185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:04.277194977 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:04.959594965 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:04 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:05.069289923 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:05.314501047 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:05 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  14192.168.2.449753185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:05.456614971 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:06.179740906 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:06 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  15192.168.2.449754185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:06.311554909 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:06.998514891 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:06 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  16192.168.2.449755185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:07.121193886 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:07.811575890 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:07 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  17192.168.2.449756185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:07.934107065 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:08.630929947 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:08 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:08.741211891 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:08.978399038 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:08 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  18192.168.2.449757185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:09.105511904 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:09.798482895 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:09 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  19192.168.2.449758185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:09.917918921 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:10.630003929 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:10 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:10.742038965 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:10.979027987 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:10 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  20192.168.2.449759185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:11.106107950 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:11.818267107 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:11 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:11.928738117 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:12.173638105 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:12 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  21192.168.2.449760185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:12.299267054 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:12.998796940 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:12 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  22192.168.2.449761185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:13.123116970 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:13.823774099 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:13 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  23192.168.2.449762185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:13.949609041 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:14.646404028 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:14 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:14.756583929 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:14.999496937 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:14 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  24192.168.2.449763185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:15.126890898 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:15.950406075 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:15 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  25192.168.2.449764185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:16.074553967 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:16.771805048 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:16 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:16.881501913 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:17.125122070 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:17 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  26192.168.2.449765185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:17.247327089 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:17.928080082 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:17 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:18.044274092 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:18.286614895 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:18 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:18.400106907 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:18.635317087 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:18 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  27192.168.2.449766185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:18.761786938 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:19.449875116 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:19 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  28192.168.2.449767185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:19.574832916 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:20.294404984 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:20 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  29192.168.2.449768185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:20.418642044 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:21.113152027 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:21 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:21.226210117 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:21.463126898 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:21 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  30192.168.2.449769185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:21.593503952 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:22.299714088 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:22 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:22.412945986 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:22.652405024 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:22 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  31192.168.2.449770185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:22.902693033 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:23.631412983 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:23 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  32192.168.2.449771185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:23.761765003 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:24.452347040 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:24 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  33192.168.2.449772185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:24.574340105 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:25.263470888 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:25 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  34192.168.2.449773185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:25.388591051 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:26.133775949 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:26 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:26.240880013 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:26.481769085 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:26 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  35192.168.2.449774185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:26.606122017 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:27.307913065 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:27 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  36192.168.2.449775185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:27.442982912 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:28.167548895 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:28 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  37192.168.2.449776185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:28.293613911 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:29.023473978 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:28 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:29.131834030 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:29.374074936 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:29 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  38192.168.2.449777185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:29.501935959 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:30.210444927 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:30 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:30.319087982 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:30.560468912 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:30 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  39192.168.2.449778185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:30.683859110 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:31.404457092 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:31 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  40192.168.2.449779185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:31.527690887 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:32.227411032 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:32 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:32.334685087 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:32.586016893 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:32 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  41192.168.2.449780185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:32.715157032 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:33.431858063 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:33 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  42192.168.2.449781185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:33.561083078 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:34.255778074 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:34 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:34.366211891 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:34.601666927 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:34 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:34.709650040 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:34.946309090 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:34 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:35.053533077 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:35.295737028 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:35 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  43192.168.2.449782185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:35.418382883 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:36.174201012 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:36 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  44192.168.2.449783185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:36.293194056 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:37.052386999 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:36 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  45192.168.2.449784185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:37.184228897 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:37.968543053 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:37 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  46192.168.2.449785185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:38.090342999 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:38.795629978 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:38 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  47192.168.2.449786185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:38.918122053 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:39.678875923 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:39 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  48192.168.2.449787185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:39.827416897 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:40.520989895 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:40 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:40.631932020 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:40.867592096 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:40 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:40.975372076 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:41.222038031 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:41 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:41.334275961 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:41.668416977 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:41 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  49192.168.2.449788185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:41.796087027 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:42.512911081 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:42 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  50192.168.2.449789185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:42.642846107 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:43.341497898 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:43 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  51192.168.2.449790185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:43.465013981 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:44.163163900 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:44 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:44.272402048 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:44.509818077 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:44 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  52192.168.2.449791185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:44.642132044 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:45.559396029 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:45 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:45.560313940 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:45 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  53192.168.2.449792185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:45.684576035 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:46.395437956 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:46 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:46.506608009 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:46.747319937 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:46 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  54192.168.2.449793185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:46.871309042 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:47.556087017 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:47 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:47.662938118 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:47.897965908 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:47 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  55192.168.2.449794185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:48.012269974 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:48.758353949 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:48 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  56192.168.2.449795185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:48.871398926 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:49.568669081 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:49 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  57192.168.2.449796185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:49.683840990 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:50.371845961 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:50 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  58192.168.2.449797185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:50.499321938 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:51.189485073 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:51 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  59192.168.2.449798185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:51.309046984 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:52.774333000 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:51 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:52.774656057 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:51 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 6, 2024 19:53:52.774971962 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:51 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  60192.168.2.449799185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:52.893205881 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:53.593961000 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:53 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  61192.168.2.449800185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:53.716206074 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:54.430325031 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:54 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  62192.168.2.449801185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:54.560456991 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:55.250921965 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:55 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  63192.168.2.449802185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:55.374855042 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:56.064913988 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:55 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  64192.168.2.449803185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:56.220168114 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:56.916500092 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:56 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  65192.168.2.449804185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:57.066860914 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:57.757098913 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:57 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  66192.168.2.449805185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:57.887480974 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:58.590462923 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:58 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  67192.168.2.449806185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:58.749058962 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:53:59.457881927 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:53:59 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  68192.168.2.449807185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:53:59.576236010 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:54:00.289488077 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:54:00 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  69192.168.2.449808185.196.8.214806936C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 6, 2024 19:54:00.445024967 CEST321OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ec9c844f895a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff813c5e9919f3aca69 HTTP/1.1
                                                  Host: aiqorjv.ru
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 6, 2024 19:54:01.148674965 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Fri, 06 Sep 2024 17:54:01 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:13:51:54
                                                  Start date:06/09/2024
                                                  Path:C:\Users\user\Desktop\qgdf1HLJno.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\qgdf1HLJno.exe"
                                                  Imagebase:0x400000
                                                  File size:3'825'775 bytes
                                                  MD5 hash:0B0B4093391E1EB14216F9328DD73E2B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:false

                                                  Target ID:1
                                                  Start time:13:51:55
                                                  Start date:06/09/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\is-4FV6A.tmp\qgdf1HLJno.tmp" /SL5="$10412,3558674,54272,C:\Users\user\Desktop\qgdf1HLJno.exe"
                                                  Imagebase:0x400000
                                                  File size:696'832 bytes
                                                  MD5 hash:77DCBC20C2F217DC78610C5795A55F30
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 4%, ReversingLabs
                                                  Reputation:low
                                                  Has exited:false

                                                  Target ID:2
                                                  Start time:13:51:55
                                                  Start date:06/09/2024
                                                  Path:C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe" -i
                                                  Imagebase:0x400000
                                                  File size:2'687'077 bytes
                                                  MD5 hash:096271271557E1A33376E74C764F46EF
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2907391186.0000000002AEA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  Antivirus matches:
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 67%, ReversingLabs
                                                  Reputation:low
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:21.1%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:2.3%
                                                    Total number of Nodes:1514
                                                    Total number of Limit Nodes:21
                                                    execution_graph 5096 409d41 5133 409984 5096->5133 5098 409d46 5140 402f24 5098->5140 5100 409d4b 5101 4096e8 15 API calls 5100->5101 5104 409d50 5101->5104 5102 409da3 5103 4026c4 GetSystemTime 5102->5103 5105 409da8 5103->5105 5104->5102 5107 408cfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5104->5107 5106 409254 32 API calls 5105->5106 5108 409db0 5106->5108 5110 409d7f 5107->5110 5109 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5108->5109 5111 409dbd 5109->5111 5112 409d87 MessageBoxA 5110->5112 5113 406888 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 5111->5113 5112->5102 5115 409d94 5112->5115 5114 409dca 5113->5114 5116 406620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 5114->5116 5117 4057b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5115->5117 5118 409dda 5116->5118 5117->5102 5119 406598 LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 5118->5119 5120 409deb 5119->5120 5121 403340 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5120->5121 5122 409df9 5121->5122 5123 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5122->5123 5124 409e09 5123->5124 5125 407440 23 API calls 5124->5125 5126 409e48 5125->5126 5127 402594 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5126->5127 5128 409e68 5127->5128 5129 40794c LocalAlloc TlsSetValue TlsGetValue TlsGetValue InterlockedExchange 5128->5129 5130 409eaa 5129->5130 5131 407bdc 23 API calls 5130->5131 5132 409ed1 5131->5132 5134 4099a5 5133->5134 5135 40998d 5133->5135 5137 4057e0 4 API calls 5134->5137 5145 4057e0 5135->5145 5139 4099b6 5137->5139 5138 40999f 5138->5098 5139->5098 5141 403154 4 API calls 5140->5141 5142 402f29 5141->5142 5181 402bcc 5142->5181 5144 402f51 5144->5144 5146 4057e7 5145->5146 5149 4031e8 5146->5149 5150 4031ec 5149->5150 5151 4031fc 5149->5151 5150->5151 5155 403254 5150->5155 5152 403228 5151->5152 5160 4025ac 5151->5160 5152->5138 5156 403274 5155->5156 5157 403258 5155->5157 5156->5151 5164 402594 5157->5164 5159 403261 5159->5151 5161 4025b0 5160->5161 5162 4025ba 5160->5162 5161->5162 5163 403154 4 API calls 5161->5163 5162->5152 5162->5162 5163->5162 5165 4025a2 5164->5165 5166 402598 5164->5166 5165->5159 5165->5165 5166->5165 5168 403154 5166->5168 5169 403164 5168->5169 5170 40318c TlsGetValue 5168->5170 5169->5165 5171 403196 5170->5171 5172 40316f 5170->5172 5171->5165 5176 40310c 5172->5176 5174 403174 TlsGetValue 5175 403184 5174->5175 5175->5165 5177 403120 LocalAlloc 5176->5177 5178 403116 5176->5178 5179 40313e TlsSetValue 5177->5179 5180 403132 5177->5180 5178->5177 5179->5180 5180->5174 5182 402bd5 RaiseException 5181->5182 5183 402be6 5181->5183 5182->5183 5183->5144 6182 408f42 6183 408f34 6182->6183 6184 408ed0 Wow64RevertWow64FsRedirection 6183->6184 6185 408f3c 6184->6185 6186 408f44 SetLastError 6187 408f4d 6186->6187 6188 402b48 RaiseException 6195 40294a 6196 402952 6195->6196 6197 403554 4 API calls 6196->6197 6198 402967 6196->6198 6197->6196 6199 403f4a 6200 403f53 6199->6200 6201 403f5c 6199->6201 6203 403f07 6200->6203 6206 403f09 6203->6206 6205 403f3c 6205->6201 6208 403e9c 6206->6208 6209 403154 4 API calls 6206->6209 6214 403f3d 6206->6214 6226 403e9c 6206->6226 6207 403ef2 6211 402674 4 API calls 6207->6211 6208->6205 6208->6207 6212 403ea9 6208->6212 6217 403e8e 6208->6217 6209->6206 6215 403ecf 6211->6215 6212->6215 6216 402674 4 API calls 6212->6216 6214->6201 6215->6201 6216->6215 6218 403e4c 6217->6218 6219 403e67 6218->6219 6220 403e62 6218->6220 6221 403e7b 6218->6221 6224 403e78 6219->6224 6225 402674 4 API calls 6219->6225 6222 403cc8 4 API calls 6220->6222 6223 402674 4 API calls 6221->6223 6222->6219 6223->6224 6224->6207 6224->6212 6225->6224 6227 403ed7 6226->6227 6231 403ea9 6226->6231 6228 403ef2 6227->6228 6229 403e8e 4 API calls 6227->6229 6230 402674 4 API calls 6228->6230 6232 403ee6 6229->6232 6233 403ecf 6230->6233 6231->6233 6234 402674 4 API calls 6231->6234 6232->6228 6232->6231 6233->6206 6234->6233 5884 403a52 5885 403a74 5884->5885 5886 403a5a WriteFile 5884->5886 5886->5885 5887 403a78 GetLastError 5886->5887 5887->5885 5888 402654 5889 403154 4 API calls 5888->5889 5890 402614 5889->5890 5891 402632 5890->5891 5892 403154 4 API calls 5890->5892 5892->5891 5893 408e54 5896 408d20 5893->5896 5897 408d29 5896->5897 5898 403198 4 API calls 5897->5898 5899 408d37 5897->5899 5898->5897 6239 40755a GetFileSize 6240 407586 6239->6240 6241 407576 GetLastError 6239->6241 6241->6240 6242 40757f 6241->6242 6243 4073ec 21 API calls 6242->6243 6243->6240 6244 406f5b 6245 406f68 SetErrorMode 6244->6245 6250 40a161 6251 40a0d3 6250->6251 6252 4093fc 9 API calls 6251->6252 6254 40a0ff 6251->6254 6252->6254 6253 40a118 6255 40a121 73A25CF0 6253->6255 6256 40a12c 6253->6256 6254->6253 6257 40a112 RemoveDirectoryA 6254->6257 6255->6256 6258 40a154 6256->6258 6259 40357c 4 API calls 6256->6259 6257->6253 6260 40a14a 6259->6260 6261 4025ac 4 API calls 6260->6261 6261->6258 5904 402e64 5905 402e69 5904->5905 5906 402e7a RtlUnwind 5905->5906 5907 402e5e 5905->5907 5908 402e9d 5906->5908 6266 40a168 6267 40a16f 6266->6267 6269 40a19a 6266->6269 6276 40936c 6267->6276 6270 403198 4 API calls 6269->6270 6272 40a1d2 6270->6272 6271 40a174 6271->6269 6273 40a192 MessageBoxA 6271->6273 6274 403198 4 API calls 6272->6274 6273->6269 6275 40a1da 6274->6275 6277 4093d3 ExitWindowsEx 6276->6277 6278 409378 GetCurrentProcess OpenProcessToken 6276->6278 6280 40938a 6277->6280 6279 40938e LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6278->6279 6278->6280 6279->6277 6279->6280 6280->6271 5676 406f77 5677 406f68 SetErrorMode 5676->5677 6293 403f7d 6294 403fa2 6293->6294 6297 403f84 6293->6297 6296 403e8e 4 API calls 6294->6296 6294->6297 6295 403f8c 6296->6297 6297->6295 6298 402674 4 API calls 6297->6298 6299 403fca 6298->6299 6300 403d02 6307 403d12 6300->6307 6301 403ddf ExitProcess 6302 403db8 6303 403cc8 4 API calls 6302->6303 6305 403dc2 6303->6305 6304 403dea 6306 403cc8 4 API calls 6305->6306 6308 403dcc 6306->6308 6307->6301 6307->6302 6307->6304 6307->6307 6310 403da4 6307->6310 6311 403d8f MessageBoxA 6307->6311 6320 4019dc 6308->6320 6316 403fe4 6310->6316 6311->6302 6312 403dd1 6312->6301 6312->6304 6317 403fe8 6316->6317 6318 403f07 4 API calls 6317->6318 6319 404006 6318->6319 6321 401abb 6320->6321 6322 4019ed 6320->6322 6321->6312 6323 401a04 RtlEnterCriticalSection 6322->6323 6324 401a0e LocalFree 6322->6324 6323->6324 6325 401a41 6324->6325 6326 401a2f VirtualFree 6325->6326 6327 401a49 6325->6327 6326->6325 6328 401a70 LocalFree 6327->6328 6329 401a87 6327->6329 6328->6328 6328->6329 6330 401aa9 RtlDeleteCriticalSection 6329->6330 6331 401a9f RtlLeaveCriticalSection 6329->6331 6330->6312 6331->6330 5917 404206 5918 4041cc 5917->5918 5921 40420a 5917->5921 5919 404282 5920 403154 4 API calls 5922 404323 5920->5922 5921->5919 5921->5920 5923 402c08 5924 402c82 5923->5924 5927 402c19 5923->5927 5925 402c56 RtlUnwind 5926 403154 4 API calls 5925->5926 5926->5924 5927->5924 5927->5925 5930 402b28 5927->5930 5931 402b31 RaiseException 5930->5931 5932 402b47 5930->5932 5931->5932 5932->5925 6342 409f0b 6343 409984 4 API calls 6342->6343 6344 409f10 6343->6344 6345 409f15 6344->6345 6346 402f24 5 API calls 6344->6346 6347 407878 InterlockedExchange 6345->6347 6346->6345 6348 409f3f 6347->6348 6349 409f4f 6348->6349 6350 409984 4 API calls 6348->6350 6351 40760c 22 API calls 6349->6351 6350->6349 6352 409f6b 6351->6352 6353 4025ac 4 API calls 6352->6353 6354 409fa2 6353->6354 5864 40760c SetEndOfFile 5865 407623 5864->5865 5866 40761c 5864->5866 5867 4073ec 21 API calls 5866->5867 5867->5865 5933 403018 5934 403025 5933->5934 5938 403070 5933->5938 5935 40302a RtlUnwind 5934->5935 5936 40304e 5935->5936 5939 402f78 5936->5939 5940 402be8 5936->5940 5941 402bf1 RaiseException 5940->5941 5942 402c04 5940->5942 5941->5942 5942->5938 5947 407c23 5950 407c29 5947->5950 5948 40322c 4 API calls 5949 407cc1 5948->5949 5951 4032fc 4 API calls 5949->5951 5950->5948 5952 407ccb 5951->5952 5953 4057e0 4 API calls 5952->5953 5954 407cda 5953->5954 5955 403198 4 API calls 5954->5955 5956 407cf4 5955->5956 5184 407524 SetFilePointer 5185 407557 5184->5185 5186 407547 GetLastError 5184->5186 5186->5185 5187 407550 5186->5187 5189 4073ec GetLastError 5187->5189 5192 40734c 5189->5192 5201 4071e4 FormatMessageA 5192->5201 5195 407394 5197 4057e0 4 API calls 5195->5197 5198 4073a3 5197->5198 5208 403198 5198->5208 5202 40720a 5201->5202 5212 403278 5202->5212 5205 4050e4 5217 4050f8 5205->5217 5209 4031b7 5208->5209 5210 40319e 5208->5210 5209->5185 5210->5209 5211 4025ac 4 API calls 5210->5211 5211->5209 5213 403254 4 API calls 5212->5213 5214 403288 5213->5214 5215 403198 4 API calls 5214->5215 5216 4032a0 5215->5216 5216->5195 5216->5205 5218 405115 5217->5218 5225 404da8 5218->5225 5221 405141 5223 403278 4 API calls 5221->5223 5224 4050f3 5223->5224 5224->5195 5228 404dc3 5225->5228 5226 404dd5 5226->5221 5230 404b34 5226->5230 5228->5226 5233 404eca 5228->5233 5240 404d9c 5228->5240 5331 405890 5230->5331 5232 404b45 5232->5221 5234 404edb 5233->5234 5236 404f29 5233->5236 5234->5236 5237 404faf 5234->5237 5239 404f47 5236->5239 5243 404d44 5236->5243 5237->5239 5247 404d88 5237->5247 5239->5228 5241 403198 4 API calls 5240->5241 5242 404da6 5241->5242 5242->5228 5244 404d52 5243->5244 5250 404b4c 5244->5250 5246 404d80 5246->5236 5270 4039a4 5247->5270 5253 405900 5250->5253 5252 404b65 5252->5246 5254 40590e 5253->5254 5263 404c2c LoadStringA 5254->5263 5257 4050e4 19 API calls 5258 405946 5257->5258 5259 4031e8 4 API calls 5258->5259 5260 405951 5259->5260 5266 4031b8 5260->5266 5264 403278 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5263->5264 5265 404c59 5264->5265 5265->5257 5268 4031be 5266->5268 5267 4031e3 5267->5252 5268->5267 5269 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5268->5269 5269->5268 5271 4039ab 5270->5271 5276 4038b4 5271->5276 5273 4039cb 5274 403198 4 API calls 5273->5274 5275 4039d2 5274->5275 5275->5239 5277 4038d5 5276->5277 5278 4038c8 5276->5278 5280 403934 5277->5280 5281 4038db 5277->5281 5304 403780 5278->5304 5282 403993 5280->5282 5283 40393b 5280->5283 5285 4038e1 5281->5285 5286 4038ee 5281->5286 5289 4037f4 3 API calls 5282->5289 5290 403941 5283->5290 5291 40394b 5283->5291 5284 4038d0 5284->5273 5311 403894 5285->5311 5288 403894 6 API calls 5286->5288 5293 4038fc 5288->5293 5289->5284 5326 403864 5290->5326 5292 4037f4 3 API calls 5291->5292 5295 40395d 5292->5295 5316 4037f4 5293->5316 5297 403864 9 API calls 5295->5297 5299 403976 5297->5299 5298 403917 5322 40374c 5298->5322 5301 40374c VariantClear 5299->5301 5303 40398b 5301->5303 5302 40392c 5302->5273 5303->5273 5305 4037f0 5304->5305 5306 403744 5304->5306 5305->5284 5306->5304 5307 403793 VariantClear 5306->5307 5308 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5306->5308 5309 4037dc VariantCopyInd 5306->5309 5310 4037ab 5306->5310 5307->5306 5308->5306 5309->5305 5309->5306 5310->5284 5312 4036b8 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5311->5312 5313 4038a0 5312->5313 5314 40374c VariantClear 5313->5314 5315 4038a9 5314->5315 5315->5284 5317 403845 VariantChangeTypeEx 5316->5317 5318 40380a VariantChangeTypeEx 5316->5318 5321 403832 5317->5321 5319 403826 5318->5319 5320 40374c VariantClear 5319->5320 5320->5321 5321->5298 5323 403766 5322->5323 5324 403759 5322->5324 5323->5302 5324->5323 5325 403779 VariantClear 5324->5325 5325->5302 5327 40369c 8 API calls 5326->5327 5328 40387b 5327->5328 5329 40374c VariantClear 5328->5329 5330 403882 5329->5330 5330->5284 5332 40589c 5331->5332 5333 404c2c 5 API calls 5332->5333 5334 4058c2 5333->5334 5335 4031e8 4 API calls 5334->5335 5336 4058cd 5335->5336 5337 403198 4 API calls 5336->5337 5338 4058e2 5337->5338 5338->5232 5339 409b24 5378 4030dc 5339->5378 5341 409b3a 5381 4042e8 5341->5381 5343 409b3f 5384 406518 5343->5384 5347 409b49 5394 408fc8 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5347->5394 5356 4031e8 4 API calls 5357 409b95 5356->5357 5430 407440 5357->5430 5362 409984 4 API calls 5364 409c22 5362->5364 5450 407400 5364->5450 5366 409be4 5366->5362 5366->5364 5367 409c63 5454 40794c 5367->5454 5368 409c48 5368->5367 5369 409984 4 API calls 5368->5369 5369->5367 5371 409c88 5464 408a2c 5371->5464 5375 408a2c 23 API calls 5377 409cce 5375->5377 5376 409d07 5377->5375 5377->5376 5486 403094 5378->5486 5380 4030e1 GetModuleHandleA GetCommandLineA 5380->5341 5382 403154 4 API calls 5381->5382 5383 404323 5381->5383 5382->5383 5383->5343 5487 405bf8 5384->5487 5393 406564 6F571CD0 5393->5347 5395 40901b 5394->5395 5577 406f00 SetErrorMode 5395->5577 5398 4071e4 5 API calls 5399 40904b 5398->5399 5400 403198 4 API calls 5399->5400 5401 409060 5400->5401 5402 409a14 GetSystemInfo VirtualQuery 5401->5402 5403 409ac8 5402->5403 5406 409a3e 5402->5406 5408 409580 5403->5408 5404 409aa9 VirtualQuery 5404->5403 5404->5406 5405 409a68 VirtualProtect 5405->5406 5406->5403 5406->5404 5406->5405 5407 409a97 VirtualProtect 5406->5407 5407->5404 5583 406b30 GetCommandLineA 5408->5583 5410 40963d 5411 4031b8 4 API calls 5410->5411 5413 409657 5411->5413 5412 406b8c 6 API calls 5415 40959d 5412->5415 5416 406b8c 5413->5416 5414 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5414->5415 5415->5410 5415->5412 5415->5414 5417 406bb3 GetModuleFileNameA 5416->5417 5418 406bd7 GetCommandLineA 5416->5418 5419 403278 4 API calls 5417->5419 5422 406bdc 5418->5422 5420 406bd5 5419->5420 5424 406c04 5420->5424 5421 406be1 5425 403198 4 API calls 5421->5425 5422->5421 5423 406a50 4 API calls 5422->5423 5426 406be9 5422->5426 5423->5422 5427 403198 4 API calls 5424->5427 5425->5426 5428 40322c 4 API calls 5426->5428 5429 406c19 5427->5429 5428->5424 5429->5356 5431 40744a 5430->5431 5604 4074d6 5431->5604 5607 4074d8 5431->5607 5432 407476 5433 40748a 5432->5433 5434 4073ec 21 API calls 5432->5434 5437 409ad0 FindResourceA 5433->5437 5434->5433 5438 409ae5 5437->5438 5439 409aea SizeofResource 5437->5439 5440 409984 4 API calls 5438->5440 5441 409af7 5439->5441 5442 409afc LoadResource 5439->5442 5440->5439 5443 409984 4 API calls 5441->5443 5444 409b0a 5442->5444 5445 409b0f LockResource 5442->5445 5443->5442 5446 409984 4 API calls 5444->5446 5447 409b20 5445->5447 5448 409b1b 5445->5448 5446->5445 5447->5366 5480 407878 5447->5480 5449 409984 4 API calls 5448->5449 5449->5447 5451 407414 5450->5451 5452 407424 5451->5452 5453 40734c 20 API calls 5451->5453 5452->5368 5453->5452 5455 407959 5454->5455 5456 4057e0 4 API calls 5455->5456 5457 4079ad 5455->5457 5456->5457 5458 407878 InterlockedExchange 5457->5458 5459 4079bf 5458->5459 5460 4057e0 4 API calls 5459->5460 5461 4079d5 5459->5461 5460->5461 5462 407a18 5461->5462 5463 4057e0 4 API calls 5461->5463 5462->5371 5463->5462 5468 408a5d 5464->5468 5479 408aa6 5464->5479 5465 408af1 5619 407bdc 5465->5619 5466 407bdc 23 API calls 5466->5468 5467 407bdc 23 API calls 5467->5479 5468->5466 5475 403420 4 API calls 5468->5475 5476 4031e8 4 API calls 5468->5476 5468->5479 5610 4034f0 5468->5610 5471 408b08 5473 4031b8 4 API calls 5471->5473 5472 4034f0 4 API calls 5472->5479 5474 408b22 5473->5474 5483 404b70 5474->5483 5475->5468 5476->5468 5477 403420 4 API calls 5477->5479 5478 4031e8 4 API calls 5478->5479 5479->5465 5479->5467 5479->5472 5479->5477 5479->5478 5672 407824 5480->5672 5484 402594 4 API calls 5483->5484 5485 404b7b 5484->5485 5485->5377 5486->5380 5488 405890 5 API calls 5487->5488 5489 405c09 5488->5489 5490 4051d0 GetSystemDefaultLCID 5489->5490 5493 405206 5490->5493 5491 404c2c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5491->5493 5492 40515c LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5492->5493 5493->5491 5493->5492 5494 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5493->5494 5498 405268 5493->5498 5494->5493 5495 404c2c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5495->5498 5496 40515c LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5496->5498 5497 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5497->5498 5498->5495 5498->5496 5498->5497 5499 4052eb 5498->5499 5500 4031b8 4 API calls 5499->5500 5501 405305 5500->5501 5502 405314 GetSystemDefaultLCID 5501->5502 5559 40515c GetLocaleInfoA 5502->5559 5505 4031e8 4 API calls 5506 405354 5505->5506 5507 40515c 5 API calls 5506->5507 5508 405369 5507->5508 5509 40515c 5 API calls 5508->5509 5510 40538d 5509->5510 5565 4051a8 GetLocaleInfoA 5510->5565 5513 4051a8 GetLocaleInfoA 5514 4053bd 5513->5514 5515 40515c 5 API calls 5514->5515 5516 4053d7 5515->5516 5517 4051a8 GetLocaleInfoA 5516->5517 5518 4053f4 5517->5518 5519 40515c 5 API calls 5518->5519 5520 40540e 5519->5520 5521 4031e8 4 API calls 5520->5521 5522 40541b 5521->5522 5523 40515c 5 API calls 5522->5523 5524 405430 5523->5524 5525 4031e8 4 API calls 5524->5525 5526 40543d 5525->5526 5527 4051a8 GetLocaleInfoA 5526->5527 5528 40544b 5527->5528 5529 40515c 5 API calls 5528->5529 5530 405465 5529->5530 5531 4031e8 4 API calls 5530->5531 5532 405472 5531->5532 5533 40515c 5 API calls 5532->5533 5534 405487 5533->5534 5535 4031e8 4 API calls 5534->5535 5536 405494 5535->5536 5537 40515c 5 API calls 5536->5537 5538 4054a9 5537->5538 5539 4054c6 5538->5539 5540 4054b7 5538->5540 5542 40322c 4 API calls 5539->5542 5573 40322c 5540->5573 5543 4054c4 5542->5543 5544 40515c 5 API calls 5543->5544 5545 4054e8 5544->5545 5546 405505 5545->5546 5547 4054f6 5545->5547 5549 403198 4 API calls 5546->5549 5548 40322c 4 API calls 5547->5548 5550 405503 5548->5550 5549->5550 5567 4033b4 5550->5567 5552 405527 5553 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5552->5553 5554 405541 5553->5554 5555 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5554->5555 5556 40555b 5555->5556 5557 405c44 GetVersionExA 5556->5557 5558 405c5b 5557->5558 5558->5393 5560 405183 5559->5560 5561 405195 5559->5561 5562 403278 4 API calls 5560->5562 5563 40322c 4 API calls 5561->5563 5564 405193 5562->5564 5563->5564 5564->5505 5566 4051c4 5565->5566 5566->5513 5568 4033bc 5567->5568 5569 403254 4 API calls 5568->5569 5570 4033cf 5569->5570 5571 4031e8 4 API calls 5570->5571 5572 4033f7 5571->5572 5575 403230 5573->5575 5574 403252 5574->5543 5575->5574 5576 4025ac 4 API calls 5575->5576 5576->5574 5581 403414 5577->5581 5580 406f4e 5580->5398 5582 403418 LoadLibraryA 5581->5582 5582->5580 5590 406a50 5583->5590 5585 406b53 5586 406b65 5585->5586 5587 406a50 4 API calls 5585->5587 5588 403198 4 API calls 5586->5588 5587->5585 5589 406b7a 5588->5589 5589->5415 5591 406a7c 5590->5591 5592 403278 4 API calls 5591->5592 5593 406a89 5592->5593 5600 403420 5593->5600 5595 406a91 5596 4031e8 4 API calls 5595->5596 5597 406aa9 5596->5597 5598 403198 4 API calls 5597->5598 5599 406acb 5598->5599 5599->5585 5601 403426 5600->5601 5603 403437 5600->5603 5602 403254 4 API calls 5601->5602 5601->5603 5602->5603 5603->5595 5605 4074d8 5604->5605 5606 407517 CreateFileA 5605->5606 5606->5432 5608 403414 5607->5608 5609 407517 CreateFileA 5608->5609 5609->5432 5611 4034fd 5610->5611 5618 40352d 5610->5618 5613 403526 5611->5613 5615 403509 5611->5615 5612 403198 4 API calls 5614 403517 5612->5614 5616 403254 4 API calls 5613->5616 5614->5468 5627 4025c4 5615->5627 5616->5618 5618->5612 5620 407bf7 5619->5620 5621 407bec 5619->5621 5642 407b80 5620->5642 5631 407dfc 5621->5631 5623 407bf5 5623->5471 5625 4057e0 4 API calls 5625->5623 5628 4025ca 5627->5628 5629 4025dc 5628->5629 5630 403154 4 API calls 5628->5630 5629->5614 5630->5629 5632 407e11 5631->5632 5634 407e20 5632->5634 5649 407d14 5632->5649 5635 407e5a 5634->5635 5637 407d14 19 API calls 5634->5637 5636 407e6e 5635->5636 5638 407d14 19 API calls 5635->5638 5641 407e9a 5636->5641 5646 407da4 5636->5646 5637->5635 5638->5636 5641->5623 5643 407bd3 5642->5643 5644 407b94 5642->5644 5643->5623 5643->5625 5644->5643 5660 407ad0 5644->5660 5647 407db3 VirtualFree 5646->5647 5648 407dc5 VirtualAlloc 5646->5648 5647->5648 5648->5641 5652 405814 5649->5652 5651 407d36 5651->5634 5653 405820 5652->5653 5654 4050e4 19 API calls 5653->5654 5655 40584d 5654->5655 5656 4031e8 4 API calls 5655->5656 5657 405858 5656->5657 5658 403198 4 API calls 5657->5658 5659 40586d 5658->5659 5659->5651 5661 407aec 5660->5661 5662 407adb 5660->5662 5664 407400 20 API calls 5661->5664 5663 4057e0 4 API calls 5662->5663 5663->5661 5665 407b00 5664->5665 5666 407400 20 API calls 5665->5666 5667 407b21 5666->5667 5668 407878 InterlockedExchange 5667->5668 5669 407b36 5668->5669 5670 407b4c 5669->5670 5671 4057e0 4 API calls 5669->5671 5670->5644 5671->5670 5673 407836 5672->5673 5674 407847 5672->5674 5675 40783b InterlockedExchange 5673->5675 5674->5366 5675->5674 5957 405a24 5958 405a34 5957->5958 5959 405a2c 5957->5959 5960 405a32 5959->5960 5961 405a3b 5959->5961 5964 40599c 5960->5964 5962 405890 5 API calls 5961->5962 5962->5958 5965 4059a4 5964->5965 5966 4059be 5965->5966 5967 403154 4 API calls 5965->5967 5968 4059c3 5966->5968 5969 4059da 5966->5969 5967->5965 5970 405890 5 API calls 5968->5970 5971 403154 4 API calls 5969->5971 5973 4059d6 5970->5973 5972 4059df 5971->5972 5974 405900 19 API calls 5972->5974 5975 403154 4 API calls 5973->5975 5974->5973 5976 405a08 5975->5976 5977 403154 4 API calls 5976->5977 5978 405a16 5977->5978 5978->5958 6363 409d26 6364 409d4b 6363->6364 6415 4096e8 6364->6415 6366 409da3 6443 4026c4 GetSystemTime 6366->6443 6368 409d50 6368->6366 6436 408cfc 6368->6436 6369 409da8 6397 409254 6369->6397 6373 409d7f 6376 409d87 MessageBoxA 6373->6376 6374 4031e8 4 API calls 6375 409dbd 6374->6375 6444 406888 6375->6444 6376->6366 6379 409d94 6376->6379 6439 4057b4 6379->6439 6384 409deb 6471 403340 6384->6471 6386 409df9 6387 4031e8 4 API calls 6386->6387 6388 409e09 6387->6388 6389 407440 23 API calls 6388->6389 6390 409e48 6389->6390 6391 402594 4 API calls 6390->6391 6392 409e68 6391->6392 6393 40794c 5 API calls 6392->6393 6394 409eaa 6393->6394 6395 407bdc 23 API calls 6394->6395 6396 409ed1 6395->6396 6406 409274 6397->6406 6400 409299 CreateDirectoryA 6401 409311 6400->6401 6402 4092a3 GetLastError 6400->6402 6403 40322c 4 API calls 6401->6403 6402->6406 6404 40931b 6403->6404 6408 4031b8 4 API calls 6404->6408 6405 408cfc 4 API calls 6405->6406 6406->6400 6406->6405 6407 404be4 19 API calls 6406->6407 6411 4071e4 5 API calls 6406->6411 6413 408ccc 4 API calls 6406->6413 6414 4057e0 4 API calls 6406->6414 6486 406c54 6406->6486 6509 409148 6406->6509 6407->6406 6409 409335 6408->6409 6410 4031b8 4 API calls 6409->6410 6412 409342 6410->6412 6411->6406 6412->6374 6413->6406 6414->6406 6416 409731 6415->6416 6422 4096f5 6415->6422 6417 40973a 6416->6417 6418 40973e 6416->6418 6419 409747 GetUserDefaultLangID 6417->6419 6428 40973c 6417->6428 6615 406f84 GetModuleHandleA GetProcAddress 6418->6615 6419->6428 6422->6416 6425 409721 6422->6425 6423 4097ef 6424 40969c 5 API calls 6423->6424 6426 409728 6424->6426 6427 40969c 5 API calls 6425->6427 6426->6368 6427->6426 6428->6423 6429 409791 6428->6429 6430 409787 GetACP 6428->6430 6431 40979e 6428->6431 6432 40969c 5 API calls 6429->6432 6430->6428 6430->6429 6431->6423 6433 4097e2 6431->6433 6434 4097d8 GetACP 6431->6434 6432->6426 6435 40969c 5 API calls 6433->6435 6434->6431 6434->6433 6435->6426 6437 408ccc 4 API calls 6436->6437 6438 408d18 6437->6438 6438->6373 6440 4057b9 6439->6440 6441 405890 5 API calls 6440->6441 6442 4057cb 6441->6442 6442->6442 6443->6369 6659 406780 6444->6659 6447 403454 4 API calls 6448 4068aa 6447->6448 6449 406620 6448->6449 6664 406844 6449->6664 6452 406650 6454 403340 4 API calls 6452->6454 6453 40665e 6455 403454 4 API calls 6453->6455 6456 40665c 6454->6456 6457 406671 6455->6457 6459 403198 4 API calls 6456->6459 6458 403340 4 API calls 6457->6458 6458->6456 6460 406693 6459->6460 6461 406598 6460->6461 6462 4065a2 6461->6462 6463 4065c5 6461->6463 6670 4068b0 6462->6670 6464 40322c 4 API calls 6463->6464 6466 4065ce 6464->6466 6466->6384 6467 4065a9 6467->6463 6468 4065b4 6467->6468 6469 403340 4 API calls 6468->6469 6470 4065c2 6469->6470 6470->6384 6472 403344 6471->6472 6473 4033a5 6471->6473 6474 4031e8 6472->6474 6475 40334c 6472->6475 6476 4031fc 6474->6476 6480 403254 4 API calls 6474->6480 6475->6473 6478 40335b 6475->6478 6479 4031e8 4 API calls 6475->6479 6477 403228 6476->6477 6482 4025ac 4 API calls 6476->6482 6477->6386 6481 403254 4 API calls 6478->6481 6479->6478 6480->6476 6483 403375 6481->6483 6482->6477 6484 4031e8 4 API calls 6483->6484 6485 4033a1 6484->6485 6485->6386 6528 4069b8 6486->6528 6489 406c86 6491 4069b8 5 API calls 6489->6491 6493 406cd2 6489->6493 6492 406c96 6491->6492 6494 406ca2 6492->6494 6496 406994 7 API calls 6492->6496 6536 4067e8 6493->6536 6494->6493 6497 406cc7 6494->6497 6500 4069b8 5 API calls 6494->6500 6496->6494 6497->6493 6548 406c28 GetWindowsDirectoryA 6497->6548 6502 406cbb 6500->6502 6501 406598 5 API calls 6503 406ce7 6501->6503 6502->6497 6504 406994 7 API calls 6502->6504 6505 40322c 4 API calls 6503->6505 6504->6497 6506 406cf1 6505->6506 6507 4031b8 4 API calls 6506->6507 6508 406d0b 6507->6508 6508->6406 6510 409168 6509->6510 6511 406598 5 API calls 6510->6511 6512 409181 6511->6512 6513 40322c 4 API calls 6512->6513 6514 40918c 6513->6514 6515 4068d8 6 API calls 6514->6515 6517 408cfc 4 API calls 6514->6517 6518 4033b4 4 API calls 6514->6518 6519 4057e0 4 API calls 6514->6519 6521 409208 6514->6521 6588 4090d4 6514->6588 6596 408f58 6514->6596 6515->6514 6517->6514 6518->6514 6519->6514 6522 40322c 4 API calls 6521->6522 6523 409213 6522->6523 6524 4031b8 4 API calls 6523->6524 6525 40922d 6524->6525 6526 403198 4 API calls 6525->6526 6527 409235 6526->6527 6527->6406 6529 4034f0 4 API calls 6528->6529 6530 4069cb 6529->6530 6531 4069e2 GetEnvironmentVariableA 6530->6531 6535 4069f5 6530->6535 6550 406d4c 6530->6550 6531->6530 6532 4069ee 6531->6532 6534 403198 4 API calls 6532->6534 6534->6535 6535->6489 6545 406994 6535->6545 6537 403414 6536->6537 6538 40680b GetFullPathNameA 6537->6538 6539 406817 6538->6539 6540 40682e 6538->6540 6539->6540 6541 40681f 6539->6541 6542 40322c 4 API calls 6540->6542 6543 403278 4 API calls 6541->6543 6544 40682c 6542->6544 6543->6544 6544->6501 6554 40693c 6545->6554 6549 406c49 6548->6549 6549->6493 6551 406d5a 6550->6551 6552 4034f0 4 API calls 6551->6552 6553 406d68 6552->6553 6553->6530 6561 4068d8 6554->6561 6556 40695e 6557 406966 GetFileAttributesA 6556->6557 6558 40697b 6557->6558 6559 403198 4 API calls 6558->6559 6560 406983 6559->6560 6560->6489 6571 4066a4 6561->6571 6563 4068e9 6565 406910 6563->6565 6578 4068d0 CharPrevA 6563->6578 6566 406926 6565->6566 6567 40691b 6565->6567 6579 403454 6566->6579 6568 40322c 4 API calls 6567->6568 6570 406924 6568->6570 6570->6556 6574 4066b5 6571->6574 6572 406719 6573 4065e0 IsDBCSLeadByte 6572->6573 6575 406714 6572->6575 6573->6575 6574->6572 6577 4066d3 6574->6577 6575->6563 6577->6575 6586 4065e0 IsDBCSLeadByte 6577->6586 6578->6563 6580 403486 6579->6580 6581 403459 6579->6581 6582 403198 4 API calls 6580->6582 6581->6580 6584 40346d 6581->6584 6583 40347c 6582->6583 6583->6570 6585 403278 4 API calls 6584->6585 6585->6583 6587 4065f4 6586->6587 6587->6577 6589 403198 4 API calls 6588->6589 6591 4090f5 6589->6591 6593 409122 6591->6593 6605 4032a8 6591->6605 6608 403494 6591->6608 6594 403198 4 API calls 6593->6594 6595 409137 6594->6595 6595->6514 6597 408e94 2 API calls 6596->6597 6598 408f6e 6597->6598 6599 408f72 6598->6599 6612 4069a8 6598->6612 6599->6514 6602 408fa5 6603 408ed0 Wow64RevertWow64FsRedirection 6602->6603 6604 408fad 6603->6604 6604->6514 6606 403278 4 API calls 6605->6606 6607 4032b5 6606->6607 6607->6591 6609 403498 6608->6609 6611 4034c3 6608->6611 6610 4034f0 4 API calls 6609->6610 6610->6611 6611->6591 6613 40693c 7 API calls 6612->6613 6614 4069b2 GetLastError 6613->6614 6614->6602 6616 406fc7 6615->6616 6634 406fbe 6615->6634 6617 406fd0 6616->6617 6618 407008 6616->6618 6636 406ec8 6617->6636 6619 406ec8 RegOpenKeyExA 6618->6619 6621 407021 6619->6621 6623 40703e 6621->6623 6625 406ebc 6 API calls 6621->6625 6622 406fe9 6622->6623 6639 406ebc 6622->6639 6626 40322c 4 API calls 6623->6626 6629 407035 RegCloseKey 6625->6629 6630 40704b 6626->6630 6627 403198 4 API calls 6631 407080 6627->6631 6629->6623 6632 4032fc 4 API calls 6630->6632 6633 403198 4 API calls 6631->6633 6632->6634 6635 407088 6633->6635 6634->6627 6635->6428 6637 406ed3 6636->6637 6638 406ed9 RegOpenKeyExA 6636->6638 6637->6638 6638->6622 6642 406d70 6639->6642 6643 406d96 RegQueryValueExA 6642->6643 6644 406db9 6643->6644 6657 406ddb 6643->6657 6645 406dd3 6644->6645 6649 403278 4 API calls 6644->6649 6650 403420 4 API calls 6644->6650 6644->6657 6647 403198 4 API calls 6645->6647 6646 403198 4 API calls 6648 406ea7 RegCloseKey 6646->6648 6647->6657 6648->6623 6649->6644 6651 406e10 RegQueryValueExA 6650->6651 6651->6643 6652 406e2c 6651->6652 6653 4034f0 4 API calls 6652->6653 6652->6657 6654 406e6e 6653->6654 6655 406e80 6654->6655 6658 403420 4 API calls 6654->6658 6656 4031e8 4 API calls 6655->6656 6656->6657 6657->6646 6658->6655 6660 4066a4 IsDBCSLeadByte 6659->6660 6662 406795 6660->6662 6661 4067df 6661->6447 6662->6661 6663 4065e0 IsDBCSLeadByte 6662->6663 6663->6662 6665 406853 6664->6665 6666 406780 IsDBCSLeadByte 6665->6666 6669 40685e 6666->6669 6667 40664a 6667->6452 6667->6453 6668 4065e0 IsDBCSLeadByte 6668->6669 6669->6667 6669->6668 6671 4068b7 6670->6671 6672 4068bb 6670->6672 6671->6467 6675 4068d0 CharPrevA 6672->6675 6674 4068cc 6674->6467 6675->6674 5678 407628 WriteFile 5679 407648 5678->5679 5682 40764f 5678->5682 5680 4073ec 21 API calls 5679->5680 5680->5682 5681 407660 5682->5681 5683 40734c 20 API calls 5682->5683 5683->5681 5979 403a28 ReadFile 5980 403a46 5979->5980 5981 403a49 GetLastError 5979->5981 6680 403932 6681 403924 6680->6681 6682 40374c VariantClear 6681->6682 6683 40392c 6682->6683 6684 408b34 6685 408b3b 6684->6685 6686 403198 4 API calls 6685->6686 6692 408bd5 6686->6692 6687 408c00 6688 4031b8 4 API calls 6687->6688 6690 408c8d 6688->6690 6689 408bec 6693 4032fc 4 API calls 6689->6693 6691 403278 4 API calls 6691->6692 6692->6687 6692->6689 6692->6691 6694 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6692->6694 6693->6687 6694->6692 5988 407ec0 5989 407ee8 5988->5989 5991 407eef 5988->5991 5990 407dfc 21 API calls 5989->5990 5990->5991 5992 407f16 5991->5992 5993 407f18 5991->5993 5997 407f22 5991->5997 5998 4050e4 19 API calls 5992->5998 5994 407d14 19 API calls 5993->5994 5994->5997 5995 407d14 19 API calls 5996 407f57 5995->5996 5999 403198 4 API calls 5996->5999 5997->5995 5997->5996 6000 407f3e 5998->6000 6001 407f6c 5999->6001 6003 407c9c 6000->6003 6004 407c9f 6003->6004 6005 40322c 4 API calls 6004->6005 6006 407cc1 6005->6006 6007 4032fc 4 API calls 6006->6007 6008 407ccb 6007->6008 6009 4057e0 4 API calls 6008->6009 6010 407cda 6009->6010 6011 403198 4 API calls 6010->6011 6012 407cf4 6011->6012 6012->5997 5868 4075cc SetFilePointer 5869 407603 5868->5869 5870 4075f3 GetLastError 5868->5870 5870->5869 5871 4075fc 5870->5871 5872 4073ec 21 API calls 5871->5872 5872->5869 6017 402ccc 6020 402cfe 6017->6020 6021 402cdd 6017->6021 6018 402d88 RtlUnwind 6019 403154 4 API calls 6018->6019 6019->6020 6021->6018 6021->6020 6022 402b28 RaiseException 6021->6022 6023 402d7f 6022->6023 6023->6018 6703 403fcd 6704 403f07 4 API calls 6703->6704 6705 403fd6 6704->6705 6706 403e9c 4 API calls 6705->6706 6707 403fe2 6706->6707 4914 4024d0 4915 4024e4 4914->4915 4916 4024f7 4914->4916 4953 401918 RtlInitializeCriticalSection 4915->4953 4917 402518 4916->4917 4918 40250e RtlEnterCriticalSection 4916->4918 4930 402300 4917->4930 4918->4917 4922 4024ed 4924 402525 4926 402581 4924->4926 4927 402577 RtlLeaveCriticalSection 4924->4927 4927->4926 4928 402531 4928->4924 4960 40215c 4928->4960 4931 402314 4930->4931 4933 4023b8 4931->4933 4934 402335 4931->4934 4932 402344 4932->4924 4940 401fd4 4932->4940 4933->4932 4938 402455 4933->4938 4977 401d80 4933->4977 4985 401e84 4933->4985 4934->4932 4974 401b74 4934->4974 4938->4932 4981 401d00 4938->4981 4941 401fe8 4940->4941 4942 401ffb 4940->4942 4944 401918 4 API calls 4941->4944 4943 402012 RtlEnterCriticalSection 4942->4943 4947 40201c 4942->4947 4943->4947 4945 401fed 4944->4945 4945->4942 4946 401ff1 4945->4946 4952 402052 4946->4952 4947->4952 5067 401ee0 4947->5067 4950 402147 4950->4928 4951 40213d RtlLeaveCriticalSection 4951->4950 4952->4928 4954 40193c RtlEnterCriticalSection 4953->4954 4955 401946 4953->4955 4954->4955 4956 401964 LocalAlloc 4955->4956 4957 40197e 4956->4957 4958 4019c3 RtlLeaveCriticalSection 4957->4958 4959 4019cd 4957->4959 4958->4959 4959->4916 4959->4922 4961 40217a 4960->4961 4962 402175 4960->4962 4964 4021b5 4961->4964 4965 4021ab RtlEnterCriticalSection 4961->4965 4966 40217e 4961->4966 4963 401918 4 API calls 4962->4963 4963->4961 4967 402244 4964->4967 4970 4021c1 4964->4970 4972 402270 4964->4972 4965->4964 4966->4924 4967->4966 4971 401d80 7 API calls 4967->4971 4968 4022e3 RtlLeaveCriticalSection 4969 4022ed 4968->4969 4969->4924 4970->4968 4970->4969 4971->4966 4972->4970 4973 401d00 7 API calls 4972->4973 4973->4970 4975 40215c 9 API calls 4974->4975 4976 401b95 4975->4976 4976->4932 4978 401d89 4977->4978 4980 401d92 4977->4980 4979 401b74 9 API calls 4978->4979 4978->4980 4979->4980 4980->4933 4982 401d4e 4981->4982 4983 401d1e 4981->4983 4982->4983 4990 401c68 4982->4990 4983->4932 5045 401768 4985->5045 4987 401e99 4989 401ea6 4987->4989 5056 401dcc 4987->5056 4989->4933 4991 401c7a 4990->4991 4992 401c9d 4991->4992 4993 401caf 4991->4993 5003 40188c 4992->5003 4995 40188c 3 API calls 4993->4995 4996 401cad 4995->4996 4997 401cc5 4996->4997 5013 401b44 4996->5013 4997->4983 4999 401cd4 5000 401cee 4999->5000 5018 401b98 4999->5018 5023 4013a0 5000->5023 5004 4018b2 5003->5004 5005 40190b 5003->5005 5027 401658 5004->5027 5005->4996 5010 4018e6 5010->5005 5012 4013a0 LocalAlloc 5010->5012 5012->5005 5014 401b61 5013->5014 5015 401b52 5013->5015 5014->4999 5016 401d00 9 API calls 5015->5016 5017 401b5f 5016->5017 5017->4999 5019 401bab 5018->5019 5020 401b9d 5018->5020 5019->5000 5021 401b74 9 API calls 5020->5021 5022 401baa 5021->5022 5022->5000 5024 4013ab 5023->5024 5025 4013c6 5024->5025 5026 4012e4 LocalAlloc 5024->5026 5025->4997 5026->5025 5029 40168f 5027->5029 5028 4016cf 5031 40132c 5028->5031 5029->5028 5030 4016a9 VirtualFree 5029->5030 5030->5029 5032 401348 5031->5032 5039 4012e4 5032->5039 5035 40150c 5037 40153b 5035->5037 5036 401594 5036->5010 5037->5036 5038 401568 VirtualFree 5037->5038 5038->5037 5042 40128c 5039->5042 5043 401298 LocalAlloc 5042->5043 5044 4012aa 5042->5044 5043->5044 5044->5010 5044->5035 5046 401787 5045->5046 5047 40183b 5046->5047 5048 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5046->5048 5050 40132c LocalAlloc 5046->5050 5051 401821 5046->5051 5053 4017d6 5046->5053 5054 4017e7 5047->5054 5063 4015c4 5047->5063 5048->5046 5050->5046 5052 40150c VirtualFree 5051->5052 5052->5054 5055 40150c VirtualFree 5053->5055 5054->4987 5055->5054 5057 401d80 9 API calls 5056->5057 5058 401de0 5057->5058 5059 40132c LocalAlloc 5058->5059 5061 401df0 5059->5061 5060 401df8 5060->4989 5061->5060 5062 401b44 9 API calls 5061->5062 5062->5060 5064 40160a 5063->5064 5065 401626 VirtualAlloc 5064->5065 5066 40163a 5064->5066 5065->5064 5065->5066 5066->5054 5070 401ef0 5067->5070 5068 401f1c 5069 401d00 9 API calls 5068->5069 5072 401f40 5068->5072 5069->5072 5070->5068 5070->5072 5073 401e58 5070->5073 5072->4950 5072->4951 5078 4016d8 5073->5078 5076 401e75 5076->5070 5077 401dcc 9 API calls 5077->5076 5082 4016f4 5078->5082 5079 4016fe 5081 4015c4 VirtualAlloc 5079->5081 5083 40170a 5081->5083 5082->5079 5084 40132c LocalAlloc 5082->5084 5085 40174f 5082->5085 5087 40175b 5082->5087 5088 401430 5082->5088 5083->5087 5084->5082 5086 40150c VirtualFree 5085->5086 5086->5087 5087->5076 5087->5077 5089 40143f VirtualAlloc 5088->5089 5091 40146c 5089->5091 5092 40148f 5089->5092 5093 4012e4 LocalAlloc 5091->5093 5092->5082 5094 401478 5093->5094 5094->5092 5095 40147c VirtualFree 5094->5095 5095->5092 6028 4028d2 6029 4028da 6028->6029 6030 403554 4 API calls 6029->6030 6031 4028ef 6029->6031 6030->6029 6032 4025ac 4 API calls 6031->6032 6033 4028f4 6032->6033 6708 4019d3 6709 4019ba 6708->6709 6710 4019c3 RtlLeaveCriticalSection 6709->6710 6711 4019cd 6709->6711 6710->6711 5687 409fd8 5718 409460 GetLastError 5687->5718 5690 402f24 5 API calls 5691 409fe4 5690->5691 5692 409fee CreateWindowExA SetWindowLongA 5691->5692 5693 4050e4 19 API calls 5692->5693 5694 40a071 5693->5694 5731 4032fc 5694->5731 5696 40a07f 5697 4032fc 4 API calls 5696->5697 5698 40a08c 5697->5698 5745 406adc GetCommandLineA 5698->5745 5701 4032fc 4 API calls 5702 40a0a1 5701->5702 5750 409888 5702->5750 5706 40a0c6 5707 40a0e6 5706->5707 5708 40a0ff 5706->5708 5772 4093fc 5707->5772 5710 40a118 5708->5710 5713 40a112 RemoveDirectoryA 5708->5713 5711 40a121 73A25CF0 5710->5711 5712 40a12c 5710->5712 5711->5712 5714 40a154 5712->5714 5780 40357c 5712->5780 5713->5710 5716 40a14a 5717 4025ac 4 API calls 5716->5717 5717->5714 5793 404be4 5718->5793 5721 4071e4 5 API calls 5722 4094b7 5721->5722 5796 408ccc 5722->5796 5725 4057e0 4 API calls 5726 4094db 5725->5726 5727 4031b8 4 API calls 5726->5727 5728 4094fa 5727->5728 5729 403198 4 API calls 5728->5729 5730 409502 5729->5730 5730->5690 5732 403300 5731->5732 5733 40333f 5731->5733 5734 4031e8 5732->5734 5735 40330a 5732->5735 5733->5696 5738 4031fc 5734->5738 5742 403254 4 API calls 5734->5742 5736 403334 5735->5736 5737 40331d 5735->5737 5741 4034f0 4 API calls 5736->5741 5739 4034f0 4 API calls 5737->5739 5740 403228 5738->5740 5743 4025ac 4 API calls 5738->5743 5744 403322 5739->5744 5740->5696 5741->5744 5742->5738 5743->5740 5744->5696 5746 406a50 4 API calls 5745->5746 5747 406b01 5746->5747 5748 403198 4 API calls 5747->5748 5749 406b1f 5748->5749 5749->5701 5751 4033b4 4 API calls 5750->5751 5752 4098c3 5751->5752 5753 4098f5 CreateProcessA 5752->5753 5754 409901 5753->5754 5755 409908 CloseHandle 5753->5755 5756 409460 21 API calls 5754->5756 5757 409911 5755->5757 5756->5755 5810 40985c 5757->5810 5760 40992d 5761 40985c 3 API calls 5760->5761 5762 409932 GetExitCodeProcess CloseHandle 5761->5762 5763 409952 5762->5763 5764 403198 4 API calls 5763->5764 5765 40995a 5764->5765 5765->5706 5766 40969c 5765->5766 5767 4096a4 5766->5767 5771 4096de 5766->5771 5768 403420 4 API calls 5767->5768 5767->5771 5769 4096d8 5768->5769 5814 408da4 5769->5814 5771->5706 5773 409456 5772->5773 5777 40940f 5772->5777 5773->5708 5774 409417 Sleep 5774->5777 5775 409427 Sleep 5775->5777 5777->5773 5777->5774 5777->5775 5778 40943e GetLastError 5777->5778 5830 408ee0 5777->5830 5778->5773 5779 409448 GetLastError 5778->5779 5779->5773 5779->5777 5781 403591 5780->5781 5782 4035a0 5780->5782 5783 4035b6 5781->5783 5787 4035d0 5781->5787 5788 40359b 5781->5788 5784 4035b1 5782->5784 5785 4035b8 5782->5785 5783->5716 5789 403198 4 API calls 5784->5789 5786 4031b8 4 API calls 5785->5786 5786->5783 5787->5783 5790 40357c 4 API calls 5787->5790 5788->5782 5792 4035ec 5788->5792 5789->5783 5790->5787 5792->5783 5847 403554 5792->5847 5794 4050f8 19 API calls 5793->5794 5795 404c02 5794->5795 5795->5721 5797 408cec 5796->5797 5800 408ba4 5797->5800 5801 403198 4 API calls 5800->5801 5809 408bd5 5800->5809 5801->5809 5802 408c00 5803 4031b8 4 API calls 5802->5803 5805 408c8d 5803->5805 5804 408bec 5807 4032fc 4 API calls 5804->5807 5805->5725 5806 403278 4 API calls 5806->5809 5807->5802 5808 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5808->5809 5809->5802 5809->5804 5809->5806 5809->5808 5811 409870 PeekMessageA 5810->5811 5812 409882 MsgWaitForMultipleObjects 5811->5812 5813 409864 TranslateMessage DispatchMessageA 5811->5813 5812->5757 5812->5760 5813->5811 5815 408db2 5814->5815 5817 408dca 5815->5817 5827 408d3c 5815->5827 5818 408d3c 4 API calls 5817->5818 5819 408dee 5817->5819 5818->5819 5820 407878 InterlockedExchange 5819->5820 5821 408e09 5820->5821 5822 408d3c 4 API calls 5821->5822 5824 408e1c 5821->5824 5822->5824 5823 408d3c 4 API calls 5823->5824 5824->5823 5825 403278 4 API calls 5824->5825 5826 408e4b 5824->5826 5825->5824 5826->5771 5828 4057e0 4 API calls 5827->5828 5829 408d4d 5828->5829 5829->5817 5838 408e94 5830->5838 5832 408ef6 5833 408efa 5832->5833 5834 408f16 DeleteFileA GetLastError 5832->5834 5833->5777 5835 408f34 5834->5835 5844 408ed0 5835->5844 5839 408ea2 5838->5839 5840 408e9e 5838->5840 5841 408ec4 SetLastError 5839->5841 5842 408eab Wow64DisableWow64FsRedirection 5839->5842 5840->5832 5843 408ebf 5841->5843 5842->5843 5843->5832 5845 408ed5 Wow64RevertWow64FsRedirection 5844->5845 5846 408edf 5844->5846 5845->5846 5846->5777 5848 403566 5847->5848 5850 403578 5848->5850 5851 403604 5848->5851 5850->5792 5852 40357c 5851->5852 5853 4035a0 5852->5853 5857 4035d0 5852->5857 5858 40359b 5852->5858 5860 4035b6 5852->5860 5854 4035b1 5853->5854 5855 4035b8 5853->5855 5859 403198 4 API calls 5854->5859 5856 4031b8 4 API calls 5855->5856 5856->5860 5857->5860 5862 40357c 4 API calls 5857->5862 5858->5853 5861 4035ec 5858->5861 5859->5860 5860->5848 5861->5860 5863 403554 4 API calls 5861->5863 5862->5857 5863->5861 6715 4065dc IsDBCSLeadByte 6716 4065f4 6715->6716 6727 402be9 RaiseException 6728 402c04 6727->6728 6038 409ef0 6039 409f15 6038->6039 6040 407878 InterlockedExchange 6039->6040 6041 409f3f 6040->6041 6042 409f4f 6041->6042 6043 409984 4 API calls 6041->6043 6048 40760c SetEndOfFile 6042->6048 6043->6042 6045 409f6b 6046 4025ac 4 API calls 6045->6046 6047 409fa2 6046->6047 6049 407623 6048->6049 6050 40761c 6048->6050 6049->6045 6051 4073ec 21 API calls 6050->6051 6051->6049 6052 402af2 6053 402afe 6052->6053 6056 402ed0 6053->6056 6057 403154 4 API calls 6056->6057 6059 402ee0 6057->6059 6058 402b03 6059->6058 6061 402b0c 6059->6061 6062 402b25 6061->6062 6063 402b15 RaiseException 6061->6063 6062->6058 6063->6062 6064 405af2 6066 405af4 6064->6066 6065 405b30 6068 405890 5 API calls 6065->6068 6066->6065 6067 405b2a 6066->6067 6069 405b47 6066->6069 6067->6065 6070 405b9c 6067->6070 6071 405b43 6068->6071 6073 404c2c 5 API calls 6069->6073 6072 405900 19 API calls 6070->6072 6074 403198 4 API calls 6071->6074 6072->6071 6075 405b70 6073->6075 6076 405bd6 6074->6076 6077 405900 19 API calls 6075->6077 6077->6071 6729 402dfa 6730 402e26 6729->6730 6731 402e0d 6729->6731 6733 402ba4 6731->6733 6734 402bc9 6733->6734 6735 402bad 6733->6735 6734->6730 6736 402bb5 RaiseException 6735->6736 6736->6734 6737 4097fc 6738 40980b 6737->6738 6740 409815 6737->6740 6739 40983a CallWindowProcA 6738->6739 6738->6740 6739->6740 6100 403a80 CloseHandle 6101 403a90 6100->6101 6102 403a91 GetLastError 6100->6102 6103 404283 6104 4042c3 6103->6104 6105 403154 4 API calls 6104->6105 6106 404323 6105->6106 6745 404185 6746 4041ff 6745->6746 6747 4041cc 6746->6747 6748 403154 4 API calls 6746->6748 6749 404323 6748->6749 6107 403e87 6108 403e4c 6107->6108 6109 403e62 6108->6109 6110 403e7b 6108->6110 6112 403e67 6108->6112 6116 403cc8 6109->6116 6113 402674 4 API calls 6110->6113 6114 403e78 6112->6114 6120 402674 6112->6120 6113->6114 6117 403cd6 6116->6117 6118 403ceb 6117->6118 6119 402674 4 API calls 6117->6119 6118->6112 6119->6118 6121 403154 4 API calls 6120->6121 6122 40267a 6121->6122 6122->6114 5873 40758c ReadFile 5874 4075c3 5873->5874 5875 4075ac 5873->5875 5876 4075b2 GetLastError 5875->5876 5877 4075bc 5875->5877 5876->5874 5876->5877 5878 4073ec 21 API calls 5877->5878 5878->5874 6123 40708e 6124 407078 6123->6124 6125 403198 4 API calls 6124->6125 6126 407080 6125->6126 6127 403198 4 API calls 6126->6127 6128 407088 6127->6128 6133 403e95 6134 403e4c 6133->6134 6135 403e67 6134->6135 6136 403e62 6134->6136 6137 403e7b 6134->6137 6140 403e78 6135->6140 6141 402674 4 API calls 6135->6141 6138 403cc8 4 API calls 6136->6138 6139 402674 4 API calls 6137->6139 6138->6135 6139->6140 6141->6140 6142 403a97 6143 403aac 6142->6143 6144 403bbc GetStdHandle 6143->6144 6145 403b0e CreateFileA 6143->6145 6155 403ab2 6143->6155 6146 403c17 GetLastError 6144->6146 6150 403bba 6144->6150 6145->6146 6147 403b2c 6145->6147 6146->6155 6149 403b3b GetFileSize 6147->6149 6147->6150 6149->6146 6151 403b4e SetFilePointer 6149->6151 6152 403be7 GetFileType 6150->6152 6150->6155 6151->6146 6156 403b6a ReadFile 6151->6156 6154 403c02 CloseHandle 6152->6154 6152->6155 6154->6155 6156->6146 6157 403b8c 6156->6157 6157->6150 6158 403b9f SetFilePointer 6157->6158 6158->6146 6159 403bb0 SetEndOfFile 6158->6159 6159->6146 6159->6150 5684 4074a8 5685 4074b4 CloseHandle 5684->5685 5686 4074bd 5684->5686 5685->5686 6762 40a1a9 6771 409514 6762->6771 6765 402f24 5 API calls 6766 40a1b3 6765->6766 6767 403198 4 API calls 6766->6767 6768 40a1d2 6767->6768 6769 403198 4 API calls 6768->6769 6770 40a1da 6769->6770 6780 4055fc 6771->6780 6773 40952f 6774 40955d 6773->6774 6786 40716c 6773->6786 6777 403198 4 API calls 6774->6777 6776 40954d 6779 409555 MessageBoxA 6776->6779 6778 409572 6777->6778 6778->6765 6778->6766 6779->6774 6781 403154 4 API calls 6780->6781 6782 405601 6781->6782 6783 405619 6782->6783 6784 403154 4 API calls 6782->6784 6783->6773 6785 40560f 6784->6785 6785->6773 6787 4055fc 4 API calls 6786->6787 6788 40717b 6787->6788 6789 407181 6788->6789 6790 40718f 6788->6790 6791 40322c 4 API calls 6789->6791 6793 4071ab 6790->6793 6794 40719f 6790->6794 6792 40718d 6791->6792 6792->6776 6804 4032b8 6793->6804 6797 407130 6794->6797 6798 40322c 4 API calls 6797->6798 6799 40713f 6798->6799 6800 40715c 6799->6800 6801 4068b0 CharPrevA 6799->6801 6800->6792 6802 40714b 6801->6802 6802->6800 6803 4032fc 4 API calls 6802->6803 6803->6800 6805 403278 4 API calls 6804->6805 6806 4032c2 6805->6806 6806->6792 6807 4011aa 6808 4011ac GetStdHandle 6807->6808 6167 4028ac 6168 402594 4 API calls 6167->6168 6169 4028b6 6168->6169 6174 4050b0 6175 4050c3 6174->6175 6176 404da8 19 API calls 6175->6176 6177 4050d7 6176->6177 6817 409fb4 6818 409fe4 6817->6818 6819 409fee CreateWindowExA SetWindowLongA 6818->6819 6820 4050e4 19 API calls 6819->6820 6821 40a071 6820->6821 6822 4032fc 4 API calls 6821->6822 6823 40a07f 6822->6823 6824 4032fc 4 API calls 6823->6824 6825 40a08c 6824->6825 6826 406adc 5 API calls 6825->6826 6827 40a098 6826->6827 6828 4032fc 4 API calls 6827->6828 6829 40a0a1 6828->6829 6830 409888 29 API calls 6829->6830 6831 40a0b3 6830->6831 6832 40969c 5 API calls 6831->6832 6833 40a0c6 6831->6833 6832->6833 6834 40a0ff 6833->6834 6835 4093fc 9 API calls 6833->6835 6836 40a118 6834->6836 6839 40a112 RemoveDirectoryA 6834->6839 6835->6834 6837 40a121 73A25CF0 6836->6837 6838 40a12c 6836->6838 6837->6838 6840 40a154 6838->6840 6841 40357c 4 API calls 6838->6841 6839->6836 6842 40a14a 6841->6842 6843 4025ac 4 API calls 6842->6843 6843->6840 6178 401ab9 6179 401a96 6178->6179 6180 401aa9 RtlDeleteCriticalSection 6179->6180 6181 401a9f RtlLeaveCriticalSection 6179->6181 6181->6180

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 108 409a14-409a38 GetSystemInfo VirtualQuery 109 409ac8-409acf 108->109 110 409a3e 108->110 111 409abd-409ac2 110->111 111->109 112 409a40-409a47 111->112 113 409aa9-409abb VirtualQuery 112->113 114 409a49-409a4d 112->114 113->109 113->111 114->113 115 409a4f-409a57 114->115 116 409a68-409a79 VirtualProtect 115->116 117 409a59-409a5c 115->117 119 409a7b 116->119 120 409a7d-409a7f 116->120 117->116 118 409a5e-409a61 117->118 118->116 121 409a63-409a66 118->121 119->120 122 409a8e-409a91 120->122 121->116 121->120 123 409a81-409a8a call 409a0c 122->123 124 409a93-409a95 122->124 123->122 124->113 126 409a97-409aa4 VirtualProtect 124->126 126->113
                                                    APIs
                                                    • GetSystemInfo.KERNEL32(?), ref: 00409A26
                                                    • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409A31
                                                    • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409A72
                                                    • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409AA4
                                                    • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409AB4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Virtual$ProtectQuery$InfoSystem
                                                    • String ID:
                                                    • API String ID: 2441996862-0
                                                    • Opcode ID: c2769086b94dacb7810d1409196c7497058a42c32b70979fc979e51038c0ff67
                                                    • Instruction ID: 05782b2e5a8588c9c74d05110837466633af9a4b7a19298b20ab433fd050a55e
                                                    • Opcode Fuzzy Hash: c2769086b94dacb7810d1409196c7497058a42c32b70979fc979e51038c0ff67
                                                    • Instruction Fuzzy Hash: D0216FB13003846BD6309A698C85E67B7DC9F85360F18492AFA85E62C3D73DED40CB59
                                                    APIs
                                                    • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: 8ef9b48ed96d6a8df8db933101511442404bdd0abec70889978d036278c5d13e
                                                    • Instruction ID: b78bf48cff894a3999656c5243e329942f020ab22272e2e872fdbeeaebf0035e
                                                    • Opcode Fuzzy Hash: 8ef9b48ed96d6a8df8db933101511442404bdd0abec70889978d036278c5d13e
                                                    • Instruction Fuzzy Hash: EDE09271B0021426D711A9699C86AEB735DDB58310F0006BFB904EB3C6EDB49E8046ED

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00409061,?,?,?,?,00000000,?,00409B53), ref: 00408FE8
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00408FEE
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,Wow64DisableWow64FsRedirection,00000000,00409061,?,?,?,?,00000000,?,00409B53), ref: 00409002
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00409008
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                    • API String ID: 1646373207-2130885113
                                                    • Opcode ID: 17e7db4c528402608d9f53e260f8b79ce616995abb8d95c1af2dd02ed3ed6c5c
                                                    • Instruction ID: 9fcc65c531327f2d7efb14c601a25e4e420c6304718e48176e9e04a6a3b299d5
                                                    • Opcode Fuzzy Hash: 17e7db4c528402608d9f53e260f8b79ce616995abb8d95c1af2dd02ed3ed6c5c
                                                    • Instruction Fuzzy Hash: 6701DF70208300AEEB10AB76DC47B563AA8E782714F60843BF504B22C3CA7C5C44CA2E

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A010
                                                    • SetWindowLongA.USER32(00010412,000000FC,004097FC), ref: 0040A027
                                                      • Part of subcall function 00406ADC: GetCommandLineA.KERNEL32(00000000,00406B20,?,?,?,?,00000000,?,0040A098,?), ref: 00406AF4
                                                      • Part of subcall function 00409888: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,021B1584,00409974,00000000,0040995B), ref: 004098F8
                                                      • Part of subcall function 00409888: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,021B1584,00409974,00000000), ref: 0040990C
                                                      • Part of subcall function 00409888: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409925
                                                      • Part of subcall function 00409888: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409937
                                                      • Part of subcall function 00409888: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,021B1584,00409974), ref: 00409940
                                                    • RemoveDirectoryA.KERNEL32(00000000,0040A166,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A113
                                                    • 73A25CF0.USER32(00010412,0040A166,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A127
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                                    • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                    • API String ID: 978128352-3001827809
                                                    • Opcode ID: 9c8ea10fba0bacef7ee7554f484bbf0083ac014c195cd591b4e6d4161ca4494d
                                                    • Instruction ID: 2aab8d6a1107d59a0dbd69bd519f9aeeb599bbf5838cf4a6d23b975b9c0419da
                                                    • Opcode Fuzzy Hash: 9c8ea10fba0bacef7ee7554f484bbf0083ac014c195cd591b4e6d4161ca4494d
                                                    • Instruction Fuzzy Hash: 82411A70600205DFD714EBA9EE85B9A37A5EB84304F10827BF510B73E2DB799801CB9D

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 00409460: GetLastError.KERNEL32(00000000,00409503,?,0040B240,?,021B1584), ref: 00409484
                                                    • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A010
                                                    • SetWindowLongA.USER32(00010412,000000FC,004097FC), ref: 0040A027
                                                      • Part of subcall function 00406ADC: GetCommandLineA.KERNEL32(00000000,00406B20,?,?,?,?,00000000,?,0040A098,?), ref: 00406AF4
                                                      • Part of subcall function 00409888: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,021B1584,00409974,00000000,0040995B), ref: 004098F8
                                                      • Part of subcall function 00409888: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,021B1584,00409974,00000000), ref: 0040990C
                                                      • Part of subcall function 00409888: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409925
                                                      • Part of subcall function 00409888: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409937
                                                      • Part of subcall function 00409888: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,021B1584,00409974), ref: 00409940
                                                    • RemoveDirectoryA.KERNEL32(00000000,0040A166,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A113
                                                    • 73A25CF0.USER32(00010412,0040A166,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A127
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryErrorExitLastLineLongMultipleObjectsRemoveWait
                                                    • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                    • API String ID: 240127915-3001827809
                                                    • Opcode ID: 62d8dbe4b1c3dad8fb4edccf749c2621fd87208e12f798d5229e62a67d41b466
                                                    • Instruction ID: c704a2ad47ec1817622344a3babb652a96bc0d7367c7d7960b287e1564feeaf5
                                                    • Opcode Fuzzy Hash: 62d8dbe4b1c3dad8fb4edccf749c2621fd87208e12f798d5229e62a67d41b466
                                                    • Instruction Fuzzy Hash: DD41FA70A00205DFD714EBA9EE85B9A37A5EB44304F10827BF510B73E2DB799805CB9D

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,021B1584,00409974,00000000,0040995B), ref: 004098F8
                                                    • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,021B1584,00409974,00000000), ref: 0040990C
                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409925
                                                    • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409937
                                                    • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,021B1584,00409974), ref: 00409940
                                                      • Part of subcall function 00409460: GetLastError.KERNEL32(00000000,00409503,?,0040B240,?,021B1584), ref: 00409484
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                    • String ID: D
                                                    • API String ID: 3356880605-2746444292
                                                    • Opcode ID: 3e364823df46f41b243604843b678d585e88c5cad38ef85377b023b87dae9783
                                                    • Instruction ID: 0c6d97fba1df7b16fba7b9ed0c132cba9133a3324ac8f072eb64155fee6ae1b7
                                                    • Opcode Fuzzy Hash: 3e364823df46f41b243604843b678d585e88c5cad38ef85377b023b87dae9783
                                                    • Instruction Fuzzy Hash: AC1130B16142086EDB10FBE68C52F9EBBACEF49718F50013EB614F62C7DA785D048669

                                                    Control-flow Graph

                                                    APIs
                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409D8A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Message
                                                    • String ID: $u@$.tmp
                                                    • API String ID: 2030045667-236237750
                                                    • Opcode ID: c54dbddafa46f2e22dfffebc81eb5562dc2c172a4bedc3ebd6503997e0ebdf0d
                                                    • Instruction ID: e9b597bbab03728c2fc5742a4be9a6bd4536e0fffc3524e564be6993971d064c
                                                    • Opcode Fuzzy Hash: c54dbddafa46f2e22dfffebc81eb5562dc2c172a4bedc3ebd6503997e0ebdf0d
                                                    • Instruction Fuzzy Hash: 5A41BF30604201DFC315EF29DE91A5A7BA6FB89304B10453AF800B73E2CA79AC01DAAD

                                                    Control-flow Graph

                                                    APIs
                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409D8A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Message
                                                    • String ID: $u@$.tmp
                                                    • API String ID: 2030045667-236237750
                                                    • Opcode ID: b1efb6b67be1747eda4a7ae68470655e0e97a08e0c0088af95ee62a76d0ade59
                                                    • Instruction ID: 325ef343b25d7578ad531e780c27d7eb59b7230534738a93eee9a88be119c5b2
                                                    • Opcode Fuzzy Hash: b1efb6b67be1747eda4a7ae68470655e0e97a08e0c0088af95ee62a76d0ade59
                                                    • Instruction Fuzzy Hash: 2C419070600201DFC315EF29DE91A5A7BA6FB49304B10453AF801B73E2CA79AC41DAAD

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00409343,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040929A
                                                    • GetLastError.KERNEL32(00000000,00000000,?,00000000,00409343,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004092A3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID: .tmp
                                                    • API String ID: 1375471231-2986845003
                                                    • Opcode ID: 7647810fba1c1a7df54c129ecd6d2966c744d5805a6f131b99297333171aebfe
                                                    • Instruction ID: 381de743b5e558d6c5ac88c9815bc56a2e764fefa580558ac3af8d983805238d
                                                    • Opcode Fuzzy Hash: 7647810fba1c1a7df54c129ecd6d2966c744d5805a6f131b99297333171aebfe
                                                    • Instruction Fuzzy Hash: 3C214975A002089BDB01EFE1C9429DEB7B9EB48304F10457BE901B73C2DA7CAF058AA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 253 401430-40143d 254 401446-40144c 253->254 255 40143f-401444 253->255 256 401452-40146a VirtualAlloc 254->256 255->256 257 40146c-40147a call 4012e4 256->257 258 40148f-401492 256->258 257->258 261 40147c-40148d VirtualFree 257->261 261->258
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Virtual$AllocFree
                                                    • String ID: dj
                                                    • API String ID: 2087232378-377656928
                                                    • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                    • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                    • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                    • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 320 401658-40168d 321 4016c7-4016cd 320->321 322 40168f-40169a 321->322 323 4016cf-4016d4 321->323 324 40169c 322->324 325 40169f-4016a1 322->325 324->325 326 4016a3 325->326 327 4016a5-4016a7 325->327 326->327 328 4016c5 327->328 329 4016a9-4016b9 VirtualFree 327->329 328->321 329->328 330 4016bb 329->330 330->328
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID: dj
                                                    • API String ID: 1263568516-377656928
                                                    • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                    • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                    • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                    • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 331 406f00-406f53 SetErrorMode call 403414 LoadLibraryA
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00008000), ref: 00406F0A
                                                    • LoadLibraryA.KERNEL32(00000000,00000000,00406F54,?,00000000,00406F72,?,00008000), ref: 00406F39
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLibraryLoadMode
                                                    • String ID:
                                                    • API String ID: 2987862817-0
                                                    • Opcode ID: 280b78466cfb49ac5d1a4d8de4e82968344a77d2278ba686a31885ea79f0a63b
                                                    • Instruction ID: 61c75ae37e4b7eabf140846b9e9d3e90831ba1beb5fed57b889ca027c52d2016
                                                    • Opcode Fuzzy Hash: 280b78466cfb49ac5d1a4d8de4e82968344a77d2278ba686a31885ea79f0a63b
                                                    • Instruction Fuzzy Hash: 49F08270614704BEDB029FB69C6282BBBFCE749B0475348B6F904A26D2E53C5D208568

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 341 4075cc-4075f1 SetFilePointer 342 407603-407608 341->342 343 4075f3-4075fa GetLastError 341->343 343->342 344 4075fc-4075fe call 4073ec 343->344 344->342
                                                    APIs
                                                    • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 004075EB
                                                    • GetLastError.KERNEL32(?,?,?,00000000), ref: 004075F3
                                                      • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,021B03AC,?,00409BAD,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 004073EF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$FilePointer
                                                    • String ID:
                                                    • API String ID: 1156039329-0
                                                    • Opcode ID: 4b4e93de333a3cce642c2996d73c93b1535ff8d1f0695df8178d397978e57373
                                                    • Instruction ID: cda5b13584bb414d1d7c0d7cef5a43535e1b929ad68122291bf656bee98e9d77
                                                    • Opcode Fuzzy Hash: 4b4e93de333a3cce642c2996d73c93b1535ff8d1f0695df8178d397978e57373
                                                    • Instruction Fuzzy Hash: A0E092766081016FD601D55EC881B9B33DCDFC5365F00453ABA54EB2D1D675AC0087B6

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 335 40758c-4075aa ReadFile 336 4075c3-4075ca 335->336 337 4075ac-4075b0 335->337 338 4075b2-4075ba GetLastError 337->338 339 4075bc-4075be call 4073ec 337->339 338->336 338->339 339->336
                                                    APIs
                                                    • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 004075A3
                                                    • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 004075B2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastRead
                                                    • String ID:
                                                    • API String ID: 1948546556-0
                                                    • Opcode ID: 60e63bc2ff5526e1bd28c8a7098a19329bed0093cf160d1b5924f83231400461
                                                    • Instruction ID: 6d0e635579d8ef6deec62af0acb898b5effba2491802df9b0589d4017bc118ea
                                                    • Opcode Fuzzy Hash: 60e63bc2ff5526e1bd28c8a7098a19329bed0093cf160d1b5924f83231400461
                                                    • Instruction Fuzzy Hash: 4FE012B1A181147AEB24965A9CC5FAB6BDCCBC5314F14847BF904DB282D678DC04877B

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 346 407524-407545 SetFilePointer 347 407557-407559 346->347 348 407547-40754e GetLastError 346->348 348->347 349 407550-407552 call 4073ec 348->349 349->347
                                                    APIs
                                                    • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 0040753B
                                                    • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 00407547
                                                      • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,021B03AC,?,00409BAD,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 004073EF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$FilePointer
                                                    • String ID:
                                                    • API String ID: 1156039329-0
                                                    • Opcode ID: 0dd762855ce75d8d861d21fe55c1929f9bb0fd02210f0b496c114b023f039fab
                                                    • Instruction ID: cd7afd6369a15af5fc7b0f7528e30ca6696358c0ea2e6c45e94f6e0b4d50a73a
                                                    • Opcode Fuzzy Hash: 0dd762855ce75d8d861d21fe55c1929f9bb0fd02210f0b496c114b023f039fab
                                                    • Instruction Fuzzy Hash: 0EE04FB1600210AFEB10EEB98C81B9672DC9F48364F048576EA14DF2C6D274DC00C766
                                                    APIs
                                                    • GetSystemDefaultLCID.KERNEL32(00000000,00405306), ref: 004051EF
                                                      • Part of subcall function 00404C2C: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404C49
                                                      • Part of subcall function 0040515C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: DefaultInfoLoadLocaleStringSystem
                                                    • String ID:
                                                    • API String ID: 1658689577-0
                                                    • Opcode ID: 9ea3c66d670cb0c44a2644de082ff92dfdb36693542507e19320d23b5394a13d
                                                    • Instruction ID: c760dbbb10683706500036a577470844d35ac6ab0c013c9c95042e4326961867
                                                    • Opcode Fuzzy Hash: 9ea3c66d670cb0c44a2644de082ff92dfdb36693542507e19320d23b5394a13d
                                                    • Instruction Fuzzy Hash: 3B313D75E00119ABCB00EF95C8C19EEB779FF84304F158977E815BB285E739AE058B98
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407518
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: ce86d0b46b6749cbb1c8065cdd94f6338fa023cacd1506a2c152e65e14b54ccf
                                                    • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                    • Opcode Fuzzy Hash: ce86d0b46b6749cbb1c8065cdd94f6338fa023cacd1506a2c152e65e14b54ccf
                                                    • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407518
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 5c7f1f50133f8918f9d70925a1da877e635501982028b62cfe689d085d452769
                                                    • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                    • Opcode Fuzzy Hash: 5c7f1f50133f8918f9d70925a1da877e635501982028b62cfe689d085d452769
                                                    • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,00406984,?,?,?,?,00000000,?,00406999,00406CC7,00000000,00406D0C,?,?,?), ref: 00406967
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 53f9965764e037d0eade91fd77cfc00c47722664131d9e88e47f7f2d0abdeb71
                                                    • Instruction ID: a5d31a369ac9c1460ce21b6bb4ed2cb839aeaeb50f5f76e03c39097c5263300d
                                                    • Opcode Fuzzy Hash: 53f9965764e037d0eade91fd77cfc00c47722664131d9e88e47f7f2d0abdeb71
                                                    • Instruction Fuzzy Hash: A9E065712043047FD701EA629C52959B7ACDB89708B924476B501A6682D5785E108568
                                                    APIs
                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 0040763F
                                                      • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,021B03AC,?,00409BAD,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 004073EF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastWrite
                                                    • String ID:
                                                    • API String ID: 442123175-0
                                                    • Opcode ID: 2449abf237b154253dcf2b231e0da589e0eb2b5517b9a23d8c49629d5bbf5411
                                                    • Instruction ID: 68b513bd5595dc6b38f1d245c0222f257f742b1e6f06676187839ef0e6677733
                                                    • Opcode Fuzzy Hash: 2449abf237b154253dcf2b231e0da589e0eb2b5517b9a23d8c49629d5bbf5411
                                                    • Instruction Fuzzy Hash: 93E01A727081106BEB10E65EDCC0EABA7DCDFC5764F04547BBA08EB291D674AC049676
                                                    APIs
                                                    • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0040904B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,Wow64DisableWow64FsRedirection,00000000,00409061), ref: 00407203
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FormatMessage
                                                    • String ID:
                                                    • API String ID: 1306739567-0
                                                    • Opcode ID: 606059c89ae6d8e8cf07aa2f3a49422b1cb7a18355834490beef1a35ac41266b
                                                    • Instruction ID: 095b59eb22c1ada42cfe979e419102ec0d22498c88dfceb067fba30b4837873c
                                                    • Opcode Fuzzy Hash: 606059c89ae6d8e8cf07aa2f3a49422b1cb7a18355834490beef1a35ac41266b
                                                    • Instruction Fuzzy Hash: 8DE0D8A0B8830125F22514544C87B77110E53C0700F50847EB710ED3D3D6BEA90641AF
                                                    APIs
                                                    • SetEndOfFile.KERNEL32(?,021C8000,00409F6B,00000000), ref: 00407613
                                                      • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,021B03AC,?,00409BAD,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 004073EF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLast
                                                    • String ID:
                                                    • API String ID: 734332943-0
                                                    • Opcode ID: 2ff8edb08080e924c2b395f282aa3d8258573adb5ced5672aaac345b41159427
                                                    • Instruction ID: 5d9383f6f08d3e81a9fa52c4aba0b6319cc61be016c813106cdb36ce464f185a
                                                    • Opcode Fuzzy Hash: 2ff8edb08080e924c2b395f282aa3d8258573adb5ced5672aaac345b41159427
                                                    • Instruction Fuzzy Hash: 39C04CB1A0450047DB40A6BE99C1A0662DC5A483157045576BA08DB297D679E8009665
                                                    APIs
                                                    • SetErrorMode.KERNEL32(?,00406F79), ref: 00406F6C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: b3342c3bee8ef6d4bfebdffece25c86b3cab89117035339c57c774ddff03cb9f
                                                    • Instruction ID: 754ecbd0d3eeca534395493226652c0236480d823d7569c9efe771d01927bad3
                                                    • Opcode Fuzzy Hash: b3342c3bee8ef6d4bfebdffece25c86b3cab89117035339c57c774ddff03cb9f
                                                    • Instruction Fuzzy Hash: 97B09B7661C2015DE705D6D5745193863F4D7C47103A1457BF104D25C0D57CD4144518
                                                    APIs
                                                    • SetErrorMode.KERNEL32(?,00406F79), ref: 00406F6C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: 8c0feaa3b8caa60bdda2d34a80aa64328f40d718bb3766066fe9d436f42a4d4e
                                                    • Instruction ID: 7c61e226393e4972c06343dd54fa3db727d2c771c967085a02b7622724de7152
                                                    • Opcode Fuzzy Hash: 8c0feaa3b8caa60bdda2d34a80aa64328f40d718bb3766066fe9d436f42a4d4e
                                                    • Instruction Fuzzy Hash: BAA022A8C00002B2CE00E2F08080A3C23282A8C3003C00AAA322EB20C0C03CC000822A
                                                    APIs
                                                    • CharPrevA.USER32(?,?,004068CC,?,004065A9,?,?,00406CE7,00000000,00406D0C,?,?,?,?,00000000,00000000), ref: 004068D2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CharPrev
                                                    • String ID:
                                                    • API String ID: 122130370-0
                                                    • Opcode ID: 17375083e06acd4281245791c958798094bb343357575ce1856f87173c3dc77f
                                                    • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                    • Opcode Fuzzy Hash: 17375083e06acd4281245791c958798094bb343357575ce1856f87173c3dc77f
                                                    • Instruction Fuzzy Hash:
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407E8C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 173b8e8880a2d8bc8916495ece18949fbab6e5abf9cd9f38168eb99c200b7a3e
                                                    • Instruction ID: 2791b199587b26d82634b85145401aad68464bde91e43c5b6ac1b5c6de7462a2
                                                    • Opcode Fuzzy Hash: 173b8e8880a2d8bc8916495ece18949fbab6e5abf9cd9f38168eb99c200b7a3e
                                                    • Instruction Fuzzy Hash: 7A1172716042449BDB00EE19C881B5B3794AF84359F1484BAF958AB2C6DB38EC04CBAA
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: e9d4eabf3352258034a438adb9f93a7799ac96b59790047b66948ab7235a5e89
                                                    • Instruction ID: 0172511661962fd54a17c381567595eb1d39a1afdb2a9088c563811225ee2893
                                                    • Opcode Fuzzy Hash: e9d4eabf3352258034a438adb9f93a7799ac96b59790047b66948ab7235a5e89
                                                    • Instruction Fuzzy Hash: FDD05E81B00A6017D215E2BE498864696C85F88745B08847AFA84E73D1D67CAC008399
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E82), ref: 00407DBB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID:
                                                    • API String ID: 1263568516-0
                                                    • Opcode ID: 5b9bfc86dfec920811477731d59a81a0154f8da7388717baf7e2e0d063c75e3e
                                                    • Instruction ID: 99ab645fda39969175de1cb99313e8e2edaeef7f3c7532f72142fb74a6686f70
                                                    • Opcode Fuzzy Hash: 5b9bfc86dfec920811477731d59a81a0154f8da7388717baf7e2e0d063c75e3e
                                                    • Instruction Fuzzy Hash: 0AD0E9B17553055BDB90EEB95CC5B123BD87B48601F5044B66904EB29AE674E8109614
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000028), ref: 0040937B
                                                    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00409381
                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 0040939A
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004093C1
                                                    • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004093C6
                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 004093D7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                    • String ID: SeShutdownPrivilege
                                                    • API String ID: 107509674-3733053543
                                                    • Opcode ID: 2b7c2d1c4f590a8974f253569f8503172d2d606641626e35aa9b2bf4c08caf06
                                                    • Instruction ID: 611fb1cec5075bd7f6e538fe0f9c98e62950726bb4ce6d0bef13c3fa82a74cfd
                                                    • Opcode Fuzzy Hash: 2b7c2d1c4f590a8974f253569f8503172d2d606641626e35aa9b2bf4c08caf06
                                                    • Instruction Fuzzy Hash: 95F0627068430276E610A6718C47F67228C5B88B08F50483ABE51FA1C3D7BCCC044A6F
                                                    APIs
                                                    • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409ADA
                                                    • SizeofResource.KERNEL32(00000000,00000000,?,00409BC5,00000000,0040A15C,?,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 00409AED
                                                    • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409BC5,00000000,0040A15C,?,00000001,00000000,00000002,00000000,0040A1A4,?,00000000), ref: 00409AFF
                                                    • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409BC5,00000000,0040A15C,?,00000001,00000000,00000002,00000000,0040A1A4), ref: 00409B10
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLockSizeof
                                                    • String ID:
                                                    • API String ID: 3473537107-0
                                                    • Opcode ID: 400a5822642c04a340576dade1617737d9942a0be047b9803f81a1d9eeffe18d
                                                    • Instruction ID: bd400d834a0aeaf6767d0a45abc69bca8fb82328816d2df24890c915d48f9c17
                                                    • Opcode Fuzzy Hash: 400a5822642c04a340576dade1617737d9942a0be047b9803f81a1d9eeffe18d
                                                    • Instruction Fuzzy Hash: 87E05AD035434625EA6036E718D2B2B62085FA471DF00013FBB00792D3DDBC8C04452E
                                                    APIs
                                                    • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004053AA,?,?,?,00000000,0040555C), ref: 004051BB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: 5ea09b3054f78be8d61aadd1ef4a431fb4c5ee7ddbf8397ee2588b1f4940bcb7
                                                    • Instruction ID: dec8dcb9893e8432c944e1b70884c8cc40709e939aac0c2d0d2241257bb7fc31
                                                    • Opcode Fuzzy Hash: 5ea09b3054f78be8d61aadd1ef4a431fb4c5ee7ddbf8397ee2588b1f4940bcb7
                                                    • Instruction Fuzzy Hash: D3D05EB631E6502AE210519B2D85EBB4EACCAC57A4F14443BF648DB242D2248C069776
                                                    APIs
                                                    • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: SystemTime
                                                    • String ID:
                                                    • API String ID: 2656138-0
                                                    • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                    • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                    • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                    • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                    APIs
                                                    • GetVersionExA.KERNEL32(?,00406540,00000000,0040654E,?,?,?,?,?,00409B44), ref: 00405C52
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Version
                                                    • String ID:
                                                    • API String ID: 1889659487-0
                                                    • Opcode ID: b3c8fce3f516c1eeee7654ac00498b0e6f5204205adccd6d1250d5bfc2945711
                                                    • Instruction ID: 6a84e84a5bdb2c7c5b206d002f2a3fc227ad50a79849cf1aa773f1ea3c1cbc6a
                                                    • Opcode Fuzzy Hash: b3c8fce3f516c1eeee7654ac00498b0e6f5204205adccd6d1250d5bfc2945711
                                                    • Instruction Fuzzy Hash: 5AC0126040470186E7109B319C42B1672D4A744310F4805396DA4953C2E73C81018A5A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                    • Instruction ID: 956cfbd081f07b2254a6d3089f19d76ceb57970edf417c817245e325156cd300
                                                    • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                    • Instruction Fuzzy Hash: 4432E875E04219DFCB14CF99CA80AADB7B2BF88314F24816AD845B7385DB34AE42CF55
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407089), ref: 00406FAD
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00406FB3
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407089), ref: 00407001
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressCloseHandleModuleProc
                                                    • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                    • API String ID: 4190037839-2401316094
                                                    • Opcode ID: 60a9e4a616bde9d3650d5374f7b0e792bef98a6345d6610fa7bc99ac1ec5f133
                                                    • Instruction ID: 4848c3cc747176469ce0ef08a48ea257d9f62360c4c8e5a9f2e1a14c28c6fa3b
                                                    • Opcode Fuzzy Hash: 60a9e4a616bde9d3650d5374f7b0e792bef98a6345d6610fa7bc99ac1ec5f133
                                                    • Instruction Fuzzy Hash: C3217370E04209ABDB10EBB5CD51B9F77A8EB44304F60857BA500F72C1DB7CAA05879E
                                                    APIs
                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                    • LocalFree.KERNEL32(006AFAE8,00000000,00401AB4), ref: 00401A1B
                                                    • VirtualFree.KERNEL32(?,00000000,00008000,006AFAE8,00000000,00401AB4), ref: 00401A3A
                                                    • LocalFree.KERNEL32(006ADD30,?,00000000,00008000,006AFAE8,00000000,00401AB4), ref: 00401A79
                                                    • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                    • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                    • String ID: $j$Tj$dj
                                                    • API String ID: 3782394904-2928015186
                                                    • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                    • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                    • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                    • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                    • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                    • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                    • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                    • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                    • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                    • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                    • String ID:
                                                    • API String ID: 1694776339-0
                                                    • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                    • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                    • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                    • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                    APIs
                                                    • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                    • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                    • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                    • String ID: $j$Tj$dj
                                                    • API String ID: 730355536-2928015186
                                                    • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                    • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                    • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                    • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                                    APIs
                                                    • GetSystemDefaultLCID.KERNEL32(00000000,0040555C,?,?,?,?,00000000,00000000,00000000,?,0040653B,00000000,0040654E), ref: 0040532E
                                                      • Part of subcall function 0040515C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                                      • Part of subcall function 004051A8: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004053AA,?,?,?,00000000,0040555C), ref: 004051BB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale$DefaultSystem
                                                    • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                    • API String ID: 1044490935-665933166
                                                    • Opcode ID: 161572950381ad7cbc257d6fe5eb76d638651fb1e2415ab537dea70fc89fa197
                                                    • Instruction ID: f22f4b18e1885e1925b87b286fa486de3d96a381b4aec2b7527aff107c54c5fa
                                                    • Opcode Fuzzy Hash: 161572950381ad7cbc257d6fe5eb76d638651fb1e2415ab537dea70fc89fa197
                                                    • Instruction Fuzzy Hash: 8E514234B00648ABDB00EBA59C91B9F776ADB89304F50957BB514BB3C6CA3DCA058B5C
                                                    APIs
                                                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                    • ExitProcess.KERNEL32 ref: 00403DE5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ExitMessageProcess
                                                    • String ID: Error$Runtime error at 00000000$9@
                                                    • API String ID: 1220098344-1503883590
                                                    • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                    • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                    • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                    • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                    • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                    • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$AllocString
                                                    • String ID:
                                                    • API String ID: 262959230-0
                                                    • Opcode ID: e5c78b39f57021be2b84baee447ab27339ef0409ceaef8bd5dd3a85dcd2f6a98
                                                    • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                    • Opcode Fuzzy Hash: e5c78b39f57021be2b84baee447ab27339ef0409ceaef8bd5dd3a85dcd2f6a98
                                                    • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,Tj,?,?,?,00401800), ref: 004014B2
                                                    • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,Tj,?,?,?,00401800), ref: 004014D7
                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,Tj,?,?,?,00401800), ref: 004014FD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Virtual$Alloc$Free
                                                    • String ID: Tj$dj
                                                    • API String ID: 3668210933-3699159162
                                                    • Opcode ID: 53fb4fb4dead2bf9bf87b2a1222c08a4795459efffcdd9b971e00269c0061a0c
                                                    • Instruction ID: d5dc587d839e3be782c9b7b9e1ff5a952950f17ebcccd457e3de013d7af40e21
                                                    • Opcode Fuzzy Hash: 53fb4fb4dead2bf9bf87b2a1222c08a4795459efffcdd9b971e00269c0061a0c
                                                    • Instruction Fuzzy Hash: 7CF0C8717403106AEB316E694CC5F533AD89F85754F1040BAFA0DFF3DAD6745800826C
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(00000000,00409B3A), ref: 004030E3
                                                    • GetCommandLineA.KERNEL32(00000000,00409B3A), ref: 004030EE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CommandHandleLineModule
                                                    • String ID: U1hd.@$%i
                                                    • API String ID: 2123368496-1315151738
                                                    • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                    • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                    • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                    • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                    APIs
                                                    • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A0FF,000000FA,00000032,0040A166), ref: 0040941B
                                                    • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A0FF,000000FA,00000032,0040A166), ref: 0040942B
                                                    • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A0FF,000000FA,00000032,0040A166), ref: 0040943E
                                                    • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A0FF,000000FA,00000032,0040A166), ref: 00409448
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2906551229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2906527103.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906575851.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2906593404.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastSleep
                                                    • String ID:
                                                    • API String ID: 1458359878-0
                                                    • Opcode ID: fb2155ff6e4859bec8591c3fde2b363a3ebb44483e144ae34e4cc697df15f474
                                                    • Instruction ID: 2c3041558bff2c9731999a3fdaa5bf7f611e1c5313eca5e15d372d414c244bd5
                                                    • Opcode Fuzzy Hash: fb2155ff6e4859bec8591c3fde2b363a3ebb44483e144ae34e4cc697df15f474
                                                    • Instruction Fuzzy Hash: 32F0B472A0811457CB34B5EF9981A6F638DEAD1368751813BF904F3383D578CD0392AD

                                                    Execution Graph

                                                    Execution Coverage:16.3%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:5.5%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:46
                                                    execution_graph 54404 40ce60 54405 40ce72 54404->54405 54406 40ce6d 54404->54406 54408 406eb0 CloseHandle 54406->54408 54408->54405 48696 402584 48697 402598 48696->48697 48698 4025ab 48696->48698 48726 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 48697->48726 48700 4025c2 RtlEnterCriticalSection 48698->48700 48701 4025cc 48698->48701 48700->48701 48712 4023b4 13 API calls 48701->48712 48702 40259d 48702->48698 48704 4025a1 48702->48704 48705 4025d5 48706 4025d9 48705->48706 48713 402088 48705->48713 48708 402635 48706->48708 48709 40262b RtlLeaveCriticalSection 48706->48709 48709->48708 48710 4025e5 48710->48706 48727 402210 9 API calls 48710->48727 48712->48705 48714 40209c 48713->48714 48715 4020af 48713->48715 48734 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 48714->48734 48717 4020c6 RtlEnterCriticalSection 48715->48717 48720 4020d0 48715->48720 48717->48720 48718 4020a1 48718->48715 48719 4020a5 48718->48719 48723 402106 48719->48723 48720->48723 48728 401f94 48720->48728 48723->48710 48724 4021f1 RtlLeaveCriticalSection 48725 4021fb 48724->48725 48725->48710 48726->48702 48727->48706 48731 401fa4 48728->48731 48729 401fd0 48733 401ff4 48729->48733 48740 401db4 48729->48740 48731->48729 48731->48733 48735 401f0c 48731->48735 48733->48724 48733->48725 48734->48718 48744 40178c 48735->48744 48738 401f29 48738->48731 48741 401dd2 48740->48741 48742 401e02 48740->48742 48741->48733 48742->48741 48767 401d1c 48742->48767 48750 4017a8 48744->48750 48746 4017b2 48763 401678 VirtualAlloc 48746->48763 48748 40180f 48748->48738 48754 401e80 9 API calls 48748->48754 48750->48746 48750->48748 48752 401803 48750->48752 48755 4014e4 48750->48755 48764 4013e0 LocalAlloc 48750->48764 48751 4017be 48751->48748 48765 4015c0 VirtualFree 48752->48765 48754->48738 48756 4014f3 VirtualAlloc 48755->48756 48758 401520 48756->48758 48759 401543 48756->48759 48766 401398 LocalAlloc 48758->48766 48759->48750 48761 40152c 48761->48759 48762 401530 VirtualFree 48761->48762 48762->48759 48763->48751 48764->48750 48765->48748 48766->48761 48768 401d2e 48767->48768 48769 401d51 48768->48769 48770 401d63 48768->48770 48780 401940 48769->48780 48772 401940 3 API calls 48770->48772 48773 401d61 48772->48773 48779 401d79 48773->48779 48790 401bf8 9 API calls 48773->48790 48775 401d88 48776 401da2 48775->48776 48791 401c4c 9 API calls 48775->48791 48792 401454 LocalAlloc 48776->48792 48779->48741 48781 4019bf 48780->48781 48782 401966 48780->48782 48781->48773 48793 40170c 48782->48793 48786 401983 48787 40199a 48786->48787 48798 4015c0 VirtualFree 48786->48798 48787->48781 48799 401454 LocalAlloc 48787->48799 48790->48775 48791->48776 48792->48779 48796 401743 48793->48796 48794 401783 48797 4013e0 LocalAlloc 48794->48797 48795 40175d VirtualFree 48795->48796 48796->48794 48796->48795 48797->48786 48798->48787 48799->48781 48800 48c2cc 48801 48c306 48800->48801 48802 48c308 48801->48802 48803 48c312 48801->48803 49000 409000 MessageBeep 48802->49000 48805 48c34a 48803->48805 48806 48c321 48803->48806 48813 48c359 48805->48813 48814 48c382 48805->48814 48808 446a2c 18 API calls 48806->48808 48810 48c32e 48808->48810 49001 406b18 48810->49001 48817 446a2c 18 API calls 48813->48817 48820 48c3ba 48814->48820 48821 48c391 48814->48821 48819 48c366 48817->48819 49009 406b68 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48819->49009 48828 48c3c9 48820->48828 48829 48c3e2 48820->48829 48823 446a2c 18 API calls 48821->48823 48826 48c39e 48823->48826 48824 48c371 49010 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48824->49010 49011 406b9c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48826->49011 49013 4071e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 48828->49013 48835 48c3f1 48829->48835 48836 48c416 48829->48836 48831 48c3a9 49012 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48831->49012 48832 48c3d1 49014 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48832->49014 48837 446a2c 18 API calls 48835->48837 48839 48c44e 48836->48839 48840 48c425 48836->48840 48838 48c3fe 48837->48838 49015 407210 48838->49015 48847 48c45d 48839->48847 48848 48c486 48839->48848 48842 446a2c 18 API calls 48840->48842 48844 48c432 48842->48844 48843 48c406 49018 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48843->49018 49019 42c6e0 48844->49019 48851 446a2c 18 API calls 48847->48851 48854 48c4d2 48848->48854 48855 48c495 48848->48855 48849 48c30d 49095 403420 48849->49095 48853 48c46a 48851->48853 49029 407160 8 API calls 48853->49029 48861 48c50a 48854->48861 48862 48c4e1 48854->48862 48857 446a2c 18 API calls 48855->48857 48860 48c4a4 48857->48860 48858 48c475 49030 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48858->49030 48863 446a2c 18 API calls 48860->48863 48869 48c519 48861->48869 48870 48c542 48861->48870 48864 446a2c 18 API calls 48862->48864 48865 48c4b5 48863->48865 48866 48c4ee 48864->48866 49031 48bfd0 8 API calls 48865->49031 49033 42c780 48866->49033 48873 446a2c 18 API calls 48869->48873 48877 48c57a 48870->48877 48878 48c551 48870->48878 48871 48c4c1 49032 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48871->49032 48876 48c526 48873->48876 49039 42c7a8 48876->49039 48885 48c589 48877->48885 48886 48c5b2 48877->48886 48880 446a2c 18 API calls 48878->48880 48883 48c55e 48880->48883 49048 42c7d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 48883->49048 48887 446a2c 18 API calls 48885->48887 48892 48c5ea 48886->48892 48893 48c5c1 48886->48893 48889 48c596 48887->48889 48888 48c569 49049 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48888->49049 49050 42c808 48889->49050 48898 48c5f9 48892->48898 48899 48c636 48892->48899 48895 446a2c 18 API calls 48893->48895 48897 48c5ce 48895->48897 49056 42c830 48897->49056 48901 446a2c 18 API calls 48898->48901 48906 48c688 48899->48906 48907 48c645 48899->48907 48903 48c608 48901->48903 48905 446a2c 18 API calls 48903->48905 48909 48c619 48905->48909 48914 48c6fb 48906->48914 48915 48c697 48906->48915 48908 446a2c 18 API calls 48907->48908 48910 48c658 48908->48910 49062 42c424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 48909->49062 48912 446a2c 18 API calls 48910->48912 48916 48c669 48912->48916 48913 48c625 49063 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48913->49063 48922 48c73a 48914->48922 48923 48c70a 48914->48923 48988 446a2c 48915->48988 49064 48c1c8 12 API calls 48916->49064 48921 48c677 49065 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48921->49065 48933 48c779 48922->48933 48934 48c749 48922->48934 48926 446a2c 18 API calls 48923->48926 48930 48c717 48926->48930 48927 48c6b2 48928 48c6eb 48927->48928 48929 48c6b6 48927->48929 49067 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48928->49067 48932 446a2c 18 API calls 48929->48932 49068 451510 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 48930->49068 48937 48c6c5 48932->48937 48942 48c7b8 48933->48942 48943 48c788 48933->48943 48938 446a2c 18 API calls 48934->48938 48936 48c724 49069 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48936->49069 48993 451888 48937->48993 48941 48c756 48938->48941 49070 451378 48941->49070 48953 48c800 48942->48953 48954 48c7c7 48942->48954 48947 446a2c 18 API calls 48943->48947 48944 48c735 48944->48849 48945 48c6d5 49066 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48945->49066 48950 48c795 48947->48950 48949 48c763 49077 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48949->49077 49078 451a18 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 48950->49078 48959 48c848 48953->48959 48960 48c80f 48953->48960 48956 446a2c 18 API calls 48954->48956 48955 48c7a2 49079 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48955->49079 48958 48c7d6 48956->48958 48961 446a2c 18 API calls 48958->48961 48965 48c85b 48959->48965 48972 48c911 48959->48972 48962 446a2c 18 API calls 48960->48962 48963 48c7e7 48961->48963 48964 48c81e 48962->48964 49080 446cac 48963->49080 48966 446a2c 18 API calls 48964->48966 48968 446a2c 18 API calls 48965->48968 48969 48c82f 48966->48969 48970 48c888 48968->48970 48975 446cac 5 API calls 48969->48975 48971 446a2c 18 API calls 48970->48971 48973 48c89f 48971->48973 48972->48849 49089 4469d0 18 API calls 48972->49089 49086 407d44 7 API calls 48973->49086 48975->48849 48976 48c92a 49090 42e670 FormatMessageA 48976->49090 48981 48c8c1 48982 446a2c 18 API calls 48981->48982 48983 48c8d5 48982->48983 49087 408470 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48983->49087 48985 48c8e0 49088 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 48985->49088 48987 48c8ec 48989 446a34 48988->48989 49103 435aac 48989->49103 48991 446a53 48992 42c528 7 API calls 48991->48992 48992->48927 49153 45132c 48993->49153 48995 4518a5 48995->48945 48996 4518a1 48996->48995 48997 4518c9 MoveFileA GetLastError 48996->48997 49159 451368 48997->49159 49000->48849 49002 406b27 49001->49002 49003 406b40 49002->49003 49004 406b49 49002->49004 49005 403400 4 API calls 49003->49005 49162 403778 49004->49162 49007 406b47 49005->49007 49008 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49007->49008 49008->48849 49009->48824 49010->48849 49011->48831 49012->48849 49013->48832 49014->48849 49169 403738 49015->49169 49018->48849 49020 403738 49019->49020 49021 42c703 GetFullPathNameA 49020->49021 49022 42c726 49021->49022 49023 42c70f 49021->49023 49025 403494 4 API calls 49022->49025 49023->49022 49024 42c717 49023->49024 49027 4034e0 4 API calls 49024->49027 49026 42c724 49025->49026 49028 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49026->49028 49027->49026 49028->48849 49029->48858 49030->48849 49031->48871 49032->48849 49171 42c678 49033->49171 49036 403778 4 API calls 49037 42c7a1 49036->49037 49038 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49037->49038 49038->48849 49186 42c594 49039->49186 49042 42c7c5 49045 403778 4 API calls 49042->49045 49043 42c7bc 49044 403400 4 API calls 49043->49044 49046 42c7c3 49044->49046 49045->49046 49047 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49046->49047 49047->48849 49048->48888 49049->48849 49051 42c678 IsDBCSLeadByte 49050->49051 49052 42c818 49051->49052 49053 403778 4 API calls 49052->49053 49054 42c82a 49053->49054 49055 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49054->49055 49055->48849 49057 42c678 IsDBCSLeadByte 49056->49057 49058 42c840 49057->49058 49059 403778 4 API calls 49058->49059 49060 42c851 49059->49060 49061 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49060->49061 49061->48849 49062->48913 49063->48849 49064->48921 49065->48849 49066->48849 49067->48849 49068->48936 49069->48944 49071 45132c 2 API calls 49070->49071 49073 45138e 49071->49073 49072 451392 49072->48949 49073->49072 49074 4513b0 CreateDirectoryA GetLastError 49073->49074 49075 451368 Wow64RevertWow64FsRedirection 49074->49075 49076 4513d6 49075->49076 49076->48949 49077->48849 49078->48955 49079->48849 49081 446cb4 49080->49081 49189 435e14 VariantClear 49081->49189 49083 446cd7 49084 446cee 49083->49084 49190 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49083->49190 49084->48849 49086->48981 49087->48985 49088->48987 49089->48976 49091 42e696 49090->49091 49092 4034e0 4 API calls 49091->49092 49093 42e6b3 49092->49093 49094 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49093->49094 49094->48849 49097 403426 49095->49097 49096 40344b 49099 403400 49096->49099 49097->49096 49098 402660 4 API calls 49097->49098 49098->49097 49100 403406 49099->49100 49101 40341f 49099->49101 49100->49101 49102 402660 4 API calls 49100->49102 49102->49101 49104 435ab8 49103->49104 49105 435ada 49103->49105 49104->49105 49123 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49104->49123 49106 435b5d 49105->49106 49108 435b21 49105->49108 49109 435b51 49105->49109 49110 435b45 49105->49110 49111 435b39 49105->49111 49112 435b2d 49105->49112 49132 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49106->49132 49124 403510 49108->49124 49131 4040e8 18 API calls 49109->49131 49127 403494 49110->49127 49111->48991 49118 403510 4 API calls 49112->49118 49117 435b6e 49117->48991 49122 435b36 49118->49122 49120 435b5a 49120->48991 49122->48991 49123->49105 49133 4034e0 49124->49133 49129 403498 49127->49129 49128 4034ba 49128->48991 49129->49128 49148 402660 49129->49148 49131->49120 49132->49117 49138 4034bc 49133->49138 49135 4034f0 49136 403400 4 API calls 49135->49136 49137 403508 49136->49137 49137->48991 49139 4034c0 49138->49139 49140 4034dc 49138->49140 49143 402648 49139->49143 49140->49135 49142 4034c9 49142->49135 49144 40264c 49143->49144 49145 402656 49143->49145 49144->49145 49147 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49144->49147 49145->49142 49145->49145 49147->49145 49149 402664 49148->49149 49150 40266e 49148->49150 49149->49150 49152 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49149->49152 49150->49128 49150->49150 49152->49150 49154 451336 49153->49154 49155 45133a 49153->49155 49154->48996 49156 451343 Wow64DisableWow64FsRedirection 49155->49156 49157 45135c SetLastError 49155->49157 49158 451357 49156->49158 49157->49158 49158->48996 49160 451377 49159->49160 49161 45136d Wow64RevertWow64FsRedirection 49159->49161 49160->48945 49161->49160 49163 4037aa 49162->49163 49164 40377d 49162->49164 49165 403400 4 API calls 49163->49165 49164->49163 49167 403791 49164->49167 49166 4037a0 49165->49166 49166->49007 49168 4034e0 4 API calls 49167->49168 49168->49166 49170 40373c SetCurrentDirectoryA 49169->49170 49170->48843 49176 42c59c 49171->49176 49173 42c6d7 49173->49036 49174 42c68d 49174->49173 49183 42c3b4 IsDBCSLeadByte 49174->49183 49179 42c5ad 49176->49179 49177 42c611 49180 42c60c 49177->49180 49185 42c3b4 IsDBCSLeadByte 49177->49185 49179->49177 49182 42c5cb 49179->49182 49180->49174 49182->49180 49184 42c3b4 IsDBCSLeadByte 49182->49184 49183->49174 49184->49182 49185->49180 49187 42c59c IsDBCSLeadByte 49186->49187 49188 42c59b 49187->49188 49188->49042 49188->49043 49189->49083 49190->49084 49191 41edc4 49192 41edd3 IsWindowVisible 49191->49192 49193 41ee09 49191->49193 49192->49193 49194 41eddd IsWindowEnabled 49192->49194 49194->49193 49195 41ede7 49194->49195 49196 402648 4 API calls 49195->49196 49197 41edf1 EnableWindow 49196->49197 49197->49193 49198 42e24b SetErrorMode 49199 41fac8 49200 41fad1 49199->49200 49203 41fd6c 49200->49203 49202 41fade 49204 41fe5e 49203->49204 49205 41fd83 49203->49205 49204->49202 49205->49204 49224 41f92c GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 49205->49224 49207 41fdb9 49208 41fde3 49207->49208 49209 41fdbd 49207->49209 49234 41f92c GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 49208->49234 49225 41fb0c 49209->49225 49212 41fdf1 49214 41fdf5 49212->49214 49215 41fe1b 49212->49215 49217 41fb0c 10 API calls 49214->49217 49218 41fb0c 10 API calls 49215->49218 49216 41fb0c 10 API calls 49219 41fde1 49216->49219 49220 41fe07 49217->49220 49221 41fe2d 49218->49221 49219->49202 49222 41fb0c 10 API calls 49220->49222 49223 41fb0c 10 API calls 49221->49223 49222->49219 49223->49219 49224->49207 49226 41fb27 49225->49226 49227 41f8ac 4 API calls 49226->49227 49228 41fb3d 49226->49228 49227->49228 49235 41f8ac 49228->49235 49230 41fb85 49231 41fba8 SetScrollInfo 49230->49231 49243 41fa0c 49231->49243 49234->49212 49254 418150 49235->49254 49237 41f8c9 GetWindowLongA 49238 41f906 49237->49238 49239 41f8e6 49237->49239 49257 41f838 GetWindowLongA GetSystemMetrics GetSystemMetrics 49238->49257 49256 41f838 GetWindowLongA GetSystemMetrics GetSystemMetrics 49239->49256 49242 41f8f2 49242->49230 49244 41fa1a 49243->49244 49245 41fa22 49243->49245 49244->49216 49246 41fa5f 49245->49246 49247 41fa61 49245->49247 49248 41fa51 49245->49248 49249 41faa1 GetScrollPos 49246->49249 49259 417db8 IsWindowVisible ScrollWindow SetWindowPos 49247->49259 49258 417db8 IsWindowVisible ScrollWindow SetWindowPos 49248->49258 49249->49244 49252 41faac 49249->49252 49253 41fabb SetScrollPos 49252->49253 49253->49244 49255 41815a 49254->49255 49255->49237 49256->49242 49257->49242 49258->49246 49259->49246 49260 4933c0 49316 403344 49260->49316 49262 4933ce 49319 4056a0 49262->49319 49264 4933d3 49322 4098b4 49264->49322 49583 4032fc 49316->49583 49318 403349 GetModuleHandleA GetCommandLineA 49318->49262 49321 4056db 49319->49321 49584 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49319->49584 49321->49264 49585 408f8c 49322->49585 49583->49318 49584->49321 49657 408c24 49585->49657 49588 408544 GetSystemDefaultLCID 49592 40857a 49588->49592 49589 406d54 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49589->49592 49590 4084d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 49590->49592 49591 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49591->49592 49592->49589 49592->49590 49592->49591 49593 4085dc 49592->49593 49594 4084d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 49593->49594 49595 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49593->49595 49596 406d54 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49593->49596 49597 40865f 49593->49597 49594->49593 49595->49593 49596->49593 49598 403420 4 API calls 49597->49598 49599 408679 49598->49599 49600 408688 GetSystemDefaultLCID 49599->49600 49674 4084d0 GetLocaleInfoA 49600->49674 49603 403450 4 API calls 49604 4086c8 49603->49604 49605 4084d0 5 API calls 49604->49605 49606 4086dd 49605->49606 49607 4084d0 5 API calls 49606->49607 49608 408701 49607->49608 49680 40851c GetLocaleInfoA 49608->49680 49611 40851c GetLocaleInfoA 49612 408731 49611->49612 49613 4084d0 5 API calls 49612->49613 49614 40874b 49613->49614 49615 40851c GetLocaleInfoA 49614->49615 49616 408768 49615->49616 49617 4084d0 5 API calls 49616->49617 49618 408782 49617->49618 49619 403450 4 API calls 49618->49619 49620 40878f 49619->49620 49621 4084d0 5 API calls 49620->49621 49622 4087a4 49621->49622 49623 403450 4 API calls 49622->49623 49624 4087b1 49623->49624 49625 40851c GetLocaleInfoA 49624->49625 49626 4087bf 49625->49626 49627 4084d0 5 API calls 49626->49627 49628 4087d9 49627->49628 49629 403450 4 API calls 49628->49629 49630 4087e6 49629->49630 49631 4084d0 5 API calls 49630->49631 49632 4087fb 49631->49632 49633 403450 4 API calls 49632->49633 49634 408808 49633->49634 49635 4084d0 5 API calls 49634->49635 49636 40881d 49635->49636 49637 40883a 49636->49637 49638 40882b 49636->49638 49640 403494 4 API calls 49637->49640 49639 403494 4 API calls 49638->49639 49641 408838 49639->49641 49640->49641 49642 4084d0 5 API calls 49641->49642 49643 40885c 49642->49643 49644 408879 49643->49644 49645 40886a 49643->49645 49647 403400 4 API calls 49644->49647 49646 403494 4 API calls 49645->49646 49648 408877 49646->49648 49647->49648 49682 403634 49648->49682 49659 408c30 49657->49659 49665 406d54 LoadStringA 49659->49665 49663 403400 4 API calls 49664 408c76 49663->49664 49664->49588 49666 4034e0 4 API calls 49665->49666 49667 406d81 49666->49667 49668 403450 49667->49668 49669 403454 49668->49669 49670 403464 49668->49670 49669->49670 49672 4034bc 4 API calls 49669->49672 49671 403490 49670->49671 49673 402660 4 API calls 49670->49673 49671->49663 49672->49670 49673->49671 49675 4084f7 49674->49675 49676 408509 49674->49676 49677 4034e0 4 API calls 49675->49677 49678 403494 4 API calls 49676->49678 49679 408507 49677->49679 49678->49679 49679->49603 49681 408538 49680->49681 49681->49611 49683 40363c 49682->49683 49684 4034bc 4 API calls 49683->49684 49685 40364f 49684->49685 49686 403450 4 API calls 49685->49686 49687 403677 49686->49687 51860 420508 51861 42051b 51860->51861 51881 415aa0 51861->51881 51863 420662 51864 420679 51863->51864 51888 414644 KiUserCallbackDispatcher 51863->51888 51868 420690 51864->51868 51889 414688 KiUserCallbackDispatcher 51864->51889 51865 4205c1 51886 4207b8 20 API calls 51865->51886 51866 420556 51866->51863 51866->51865 51874 4205b2 MulDiv 51866->51874 51871 4206b2 51868->51871 51890 41ffd0 12 API calls 51868->51890 51872 4205da 51872->51863 51887 41ffd0 12 API calls 51872->51887 51885 41a274 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 51874->51885 51877 4205f7 51878 420613 MulDiv 51877->51878 51879 420636 51877->51879 51878->51879 51879->51863 51880 42063f MulDiv 51879->51880 51880->51863 51882 415ab2 51881->51882 51891 4143e0 51882->51891 51884 415aca 51884->51866 51885->51865 51886->51872 51887->51877 51888->51864 51889->51868 51890->51871 51892 4143fa 51891->51892 51895 4105b8 51892->51895 51894 414410 51894->51884 51898 40de04 51895->51898 51897 4105be 51897->51894 51899 40de66 51898->51899 51900 40de17 51898->51900 51905 40de74 51899->51905 51903 40de74 19 API calls 51900->51903 51904 40de41 51903->51904 51904->51897 51906 40de84 51905->51906 51908 40de9a 51906->51908 51917 40d740 51906->51917 51937 40e1fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51906->51937 51920 40e0ac 51908->51920 51911 40d740 5 API calls 51912 40dea2 51911->51912 51912->51911 51913 40df0e 51912->51913 51923 40dcc0 51912->51923 51915 40e0ac 5 API calls 51913->51915 51916 40de70 51915->51916 51916->51897 51938 40eb68 51917->51938 51946 40d61c 51920->51946 51924 40e0b4 5 API calls 51923->51924 51925 40dcf3 51924->51925 51926 40eacc 5 API calls 51925->51926 51927 40dcfe 51926->51927 51928 40eacc 5 API calls 51927->51928 51929 40dd09 51928->51929 51930 40dd24 51929->51930 51931 40dd1b 51929->51931 51936 40dd21 51929->51936 51955 40db38 51930->51955 51958 40dc28 19 API calls 51931->51958 51934 403420 4 API calls 51935 40ddef 51934->51935 51935->51912 51936->51934 51937->51906 51941 40d8e0 51938->51941 51943 40d8eb 51941->51943 51942 40d74a 51942->51906 51943->51942 51945 40d92c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51943->51945 51945->51943 51947 40eb68 5 API calls 51946->51947 51948 40d629 51947->51948 51949 40d63c 51948->51949 51953 40ec6c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51948->51953 51949->51912 51951 40d637 51954 40d5b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51951->51954 51953->51951 51954->51949 51959 40acdc 19 API calls 51955->51959 51957 40db60 51957->51936 51958->51936 51959->51957 51960 440dc8 51961 440dd1 51960->51961 51962 440ddf WriteFile 51960->51962 51961->51962 51963 440dea 51962->51963 51964 47b70b 51965 47b714 51964->51965 51968 47b73f 51964->51968 51967 47b731 51965->51967 51965->51968 51966 47b77e 51969 47b791 51966->51969 51970 47b79e 51966->51970 52363 472580 162 API calls 51967->52363 51968->51966 52365 47a0e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51968->52365 51974 47b795 51969->51974 51975 47b7d3 51969->51975 51977 47b7a7 51970->51977 51978 47b7b8 51970->51978 51973 47b771 52366 47a2b4 37 API calls 51973->52366 51982 47b799 51974->51982 51987 47b816 51974->51987 51988 47b831 51974->51988 51979 47b7f7 51975->51979 51980 47b7dc 51975->51980 51976 47b736 51976->51968 52364 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51976->52364 52367 47a2b4 37 API calls 51977->52367 52368 47a324 37 API calls 51978->52368 52370 47a324 37 API calls 51979->52370 52369 47a324 37 API calls 51980->52369 51992 47b85a 51982->51992 51993 47b878 51982->51993 52371 47a324 37 API calls 51987->52371 52372 47a324 37 API calls 51988->52372 51994 47b86f 51992->51994 52373 47a2b4 37 API calls 51992->52373 52375 479f80 24 API calls 51993->52375 52374 479f80 24 API calls 51994->52374 51998 47b876 51999 47b88e 51998->51999 52000 47b888 51998->52000 52001 47b88c 51999->52001 52003 47a290 37 API calls 51999->52003 52000->52001 52004 47a290 37 API calls 52000->52004 52084 47786c 52001->52084 52003->52001 52004->52001 52010 47b8cf 52012 47b8df 52010->52012 52251 47a664 52010->52251 52270 47aa04 52012->52270 52385 42d774 GetWindowsDirectoryA 52084->52385 52086 47788a 52087 403450 4 API calls 52086->52087 52088 477897 52087->52088 52387 42d7a0 GetSystemDirectoryA 52088->52387 52090 47789f 52091 403450 4 API calls 52090->52091 52092 4778ac 52091->52092 52389 42d7cc 52092->52389 52094 4778b4 52095 403450 4 API calls 52094->52095 52096 4778c1 52095->52096 52097 4778e6 52096->52097 52098 4778ca 52096->52098 52100 403400 4 API calls 52097->52100 52413 42d0e4 52098->52413 52102 4778e4 52100->52102 52104 47792b 52102->52104 52106 42c7a8 5 API calls 52102->52106 52103 403450 4 API calls 52103->52102 52393 4776f4 52104->52393 52108 477906 52106->52108 52110 403450 4 API calls 52108->52110 52109 403450 4 API calls 52112 477947 52109->52112 52111 477913 52110->52111 52111->52104 52114 403450 4 API calls 52111->52114 52113 477965 52112->52113 52115 4035c0 4 API calls 52112->52115 52116 4776f4 8 API calls 52113->52116 52114->52104 52115->52113 52117 477974 52116->52117 52118 403450 4 API calls 52117->52118 52119 477981 52118->52119 52120 4779a9 52119->52120 52121 42c36c 5 API calls 52119->52121 52122 477a10 52120->52122 52126 4776f4 8 API calls 52120->52126 52123 477997 52121->52123 52124 477a3a 52122->52124 52125 477a19 52122->52125 52127 4035c0 4 API calls 52123->52127 52130 42c36c 5 API calls 52124->52130 52128 42c36c 5 API calls 52125->52128 52129 4779c1 52126->52129 52127->52120 52131 477a26 52128->52131 52132 403450 4 API calls 52129->52132 52133 477a47 52130->52133 52134 4035c0 4 API calls 52131->52134 52135 4779ce 52132->52135 52136 4035c0 4 API calls 52133->52136 52137 477a38 52134->52137 52138 4779e1 52135->52138 52421 451f4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52135->52421 52136->52137 52404 4777d8 52137->52404 52140 4776f4 8 API calls 52138->52140 52142 4779f0 52140->52142 52144 403450 4 API calls 52142->52144 52147 4779fd 52144->52147 52145 403400 4 API calls 52146 477a73 52145->52146 52149 477cc8 52146->52149 52147->52122 52422 451f4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52147->52422 52150 477cd0 52149->52150 52150->52150 52424 45262c 52150->52424 52153 403450 4 API calls 52154 477cfd 52153->52154 52155 403494 4 API calls 52154->52155 52156 477d0a 52155->52156 52157 40357c 4 API calls 52156->52157 52158 477d18 52157->52158 52159 455f80 24 API calls 52158->52159 52160 477d20 52159->52160 52161 477d33 52160->52161 52458 455774 6 API calls 52160->52458 52162 42c36c 5 API calls 52161->52162 52164 477d40 52162->52164 52165 4035c0 4 API calls 52164->52165 52166 477d50 52165->52166 52167 477d5a CreateDirectoryA 52166->52167 52168 477dc0 52167->52168 52169 477d64 GetLastError 52167->52169 52170 4035c0 4 API calls 52168->52170 52171 450b64 4 API calls 52169->52171 52172 477dd5 52170->52172 52173 477d7c 52171->52173 52442 477c70 52172->52442 52459 406cd0 19 API calls 52173->52459 52176 477de2 52447 456ba8 52176->52447 52177 477d8c 52179 42e670 5 API calls 52177->52179 52181 477d9c 52179->52181 52180 477dea 52182 477e13 52180->52182 52185 4035c0 4 API calls 52180->52185 52183 450b34 4 API calls 52181->52183 52184 403420 4 API calls 52182->52184 52186 477db1 52183->52186 52187 477e2d 52184->52187 52188 477e00 52185->52188 52460 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52186->52460 52190 403420 4 API calls 52187->52190 52191 477c70 25 API calls 52188->52191 52192 477e3a 52190->52192 52193 477e0b 52191->52193 52195 477ff4 52192->52195 52461 456c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52193->52461 52196 42c36c 5 API calls 52195->52196 52197 478020 52196->52197 52198 4035c0 4 API calls 52197->52198 52199 478030 52198->52199 52200 477c70 25 API calls 52199->52200 52201 47803d 52200->52201 52570 4511e0 52201->52570 52204 478056 52205 4511e0 30 API calls 52204->52205 52208 478063 52205->52208 52207 47809c 52210 42e1f0 2 API calls 52207->52210 52208->52207 52209 403494 4 API calls 52208->52209 52209->52207 52211 4780ab 52210->52211 52212 42e1f0 2 API calls 52211->52212 52213 4780b8 52212->52213 52214 4780eb GetProcAddress 52213->52214 52217 40785c 19 API calls 52213->52217 52215 478107 52214->52215 52216 478111 52214->52216 52575 451f4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52215->52575 52220 403400 4 API calls 52216->52220 52218 4780e3 52217->52218 52574 451f4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52218->52574 52222 478126 52220->52222 52223 403400 4 API calls 52222->52223 52224 47812e 52223->52224 52224->52010 52225 47a4cc 52224->52225 52226 42c36c 5 API calls 52225->52226 52227 47a4f8 52226->52227 52228 4035c0 4 API calls 52227->52228 52252 42c36c 5 API calls 52251->52252 52363->51976 52365->51973 52366->51966 52367->51982 52368->51982 52369->51982 52370->51982 52371->51982 52372->51982 52373->51994 52374->51998 52375->51998 52386 42d795 52385->52386 52386->52086 52388 42d7c1 52387->52388 52388->52090 52390 403400 4 API calls 52389->52390 52391 42d7dc GetModuleHandleA GetProcAddress 52390->52391 52392 42d7f5 52391->52392 52392->52094 52394 42dc54 RegOpenKeyExA 52393->52394 52395 47771a 52394->52395 52396 477740 52395->52396 52397 47771e 52395->52397 52398 403400 4 API calls 52396->52398 52399 42db84 6 API calls 52397->52399 52400 477747 52398->52400 52401 47772a 52399->52401 52400->52109 52402 477735 RegCloseKey 52401->52402 52403 403400 4 API calls 52401->52403 52402->52400 52403->52402 52405 4777e6 52404->52405 52406 42dc54 RegOpenKeyExA 52405->52406 52407 47780e 52406->52407 52408 47783f 52407->52408 52409 42db84 6 API calls 52407->52409 52408->52145 52410 477824 52409->52410 52411 42db84 6 API calls 52410->52411 52412 477836 RegCloseKey 52411->52412 52412->52408 52414 4038a4 4 API calls 52413->52414 52415 42d0f7 52414->52415 52416 42d10e GetEnvironmentVariableA 52415->52416 52420 42d121 52415->52420 52423 42da08 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52415->52423 52416->52415 52417 42d11a 52416->52417 52418 403400 4 API calls 52417->52418 52418->52420 52420->52103 52421->52138 52422->52122 52423->52415 52440 45264c 52424->52440 52427 452671 CreateDirectoryA 52428 4526e9 52427->52428 52429 45267b GetLastError 52427->52429 52430 403494 4 API calls 52428->52430 52429->52440 52431 4526f3 52430->52431 52433 403420 4 API calls 52431->52433 52432 450b64 4 API calls 52432->52440 52434 45270d 52433->52434 52436 403420 4 API calls 52434->52436 52437 45271a 52436->52437 52437->52153 52438 42e670 5 API calls 52438->52440 52439 450b34 4 API calls 52439->52440 52440->52427 52440->52432 52440->52438 52440->52439 52462 42d850 52440->52462 52485 4523b8 52440->52485 52504 406cd0 19 API calls 52440->52504 52505 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52440->52505 52443 40d0ac 23 API calls 52442->52443 52444 477c8c 52443->52444 52535 477b94 52444->52535 52446 477ca7 52446->52176 52448 456bb4 52447->52448 52449 456bba 52447->52449 52450 456bc8 52448->52450 52453 456bb8 52448->52453 52451 403494 4 API calls 52449->52451 52452 403494 4 API calls 52450->52452 52454 456bc6 52451->52454 52455 456bd4 52452->52455 52456 403400 4 API calls 52453->52456 52454->52180 52455->52180 52457 456bdd 52456->52457 52457->52180 52458->52161 52459->52177 52460->52168 52461->52182 52463 42d0e4 5 API calls 52462->52463 52464 42d876 52463->52464 52465 42d882 52464->52465 52506 42cc24 52464->52506 52467 42d0e4 5 API calls 52465->52467 52469 42d8ce 52465->52469 52468 42d892 52467->52468 52470 42d89e 52468->52470 52472 42cc24 7 API calls 52468->52472 52471 42c6e0 5 API calls 52469->52471 52470->52469 52475 42d0e4 5 API calls 52470->52475 52481 42d8c3 52470->52481 52474 42d8d8 52471->52474 52472->52470 52473 42d774 GetWindowsDirectoryA 52473->52469 52476 42c36c 5 API calls 52474->52476 52477 42d8b7 52475->52477 52478 42d8e3 52476->52478 52479 42cc24 7 API calls 52477->52479 52477->52481 52480 403494 4 API calls 52478->52480 52479->52481 52482 42d8ed 52480->52482 52481->52469 52481->52473 52483 403420 4 API calls 52482->52483 52484 42d907 52483->52484 52484->52440 52486 4523d8 52485->52486 52487 42c36c 5 API calls 52486->52487 52488 4523f1 52487->52488 52489 403494 4 API calls 52488->52489 52492 4523fc 52489->52492 52491 42ca9c 6 API calls 52491->52492 52492->52491 52493 403634 4 API calls 52492->52493 52494 450b64 4 API calls 52492->52494 52497 452478 52492->52497 52515 452344 52492->52515 52523 4515f8 52492->52523 52531 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52492->52531 52493->52492 52494->52492 52498 403494 4 API calls 52497->52498 52499 452483 52498->52499 52500 403420 4 API calls 52499->52500 52501 45249d 52500->52501 52502 403400 4 API calls 52501->52502 52503 4524a5 52502->52503 52503->52440 52504->52440 52505->52440 52509 42cba8 52506->52509 52510 42ca9c 6 API calls 52509->52510 52511 42cbca 52510->52511 52512 42cbd2 GetFileAttributesA 52511->52512 52513 403400 4 API calls 52512->52513 52514 42cbef 52513->52514 52514->52465 52516 403400 4 API calls 52515->52516 52518 452365 52516->52518 52517 403510 4 API calls 52517->52518 52518->52517 52519 403800 4 API calls 52518->52519 52520 452392 52518->52520 52519->52518 52521 403400 4 API calls 52520->52521 52522 4523a7 52521->52522 52522->52492 52524 45132c 2 API calls 52523->52524 52525 45160e 52524->52525 52526 451612 52525->52526 52532 42cc38 52525->52532 52526->52492 52529 451368 Wow64RevertWow64FsRedirection 52530 45164d 52529->52530 52530->52492 52531->52492 52533 42cba8 7 API calls 52532->52533 52534 42cc42 GetLastError 52533->52534 52534->52529 52542 40cf00 52535->52542 52537 477bc9 52538 403420 4 API calls 52537->52538 52539 477c59 52538->52539 52540 403400 4 API calls 52539->52540 52541 477c61 52540->52541 52541->52446 52547 40cdb0 52542->52547 52544 40cf1a 52559 40cee8 52544->52559 52546 40cf35 52546->52537 52548 40cdbd 52547->52548 52549 40cdd9 52548->52549 52550 40ce0e 52548->52550 52563 406e28 52549->52563 52567 406de8 CreateFileA 52550->52567 52553 40cde0 52557 40ce07 52553->52557 52566 408c94 19 API calls 52553->52566 52554 40ce18 52554->52557 52568 408c94 19 API calls 52554->52568 52557->52544 52558 40ce3f 52558->52557 52560 40cef0 52559->52560 52561 40cefc 52559->52561 52569 40cc18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 52560->52569 52561->52546 52564 403738 52563->52564 52565 406e44 CreateFileA 52564->52565 52565->52553 52566->52557 52567->52554 52568->52558 52569->52561 52571 4511ed 52570->52571 52576 451118 52570->52576 52571->52204 52573 451f4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52571->52573 52573->52204 52574->52214 52575->52216 52577 403738 52576->52577 52578 451135 74D41520 52577->52578 52579 451143 52578->52579 52580 4511ba 52578->52580 52581 402648 4 API calls 52579->52581 52582 4511cd 52580->52582 52589 450f3c 27 API calls 52580->52589 52583 45114a 74D41500 52581->52583 52582->52571 52585 451188 52583->52585 52586 45116e 74D41540 52583->52586 52587 402660 4 API calls 52585->52587 52586->52585 52588 4511b2 52587->52588 52588->52571 52589->52582 54409 4135ac SetWindowLongA GetWindowLongA 54410 413609 SetPropA SetPropA 54409->54410 54411 4135eb GetWindowLongA 54409->54411 54415 41f30c 54410->54415 54411->54410 54412 4135fa SetWindowLongA 54411->54412 54412->54410 54420 4151e0 54415->54420 54427 423b7c 54415->54427 54521 4239f4 54415->54521 54416 413659 54421 4151ed 54420->54421 54422 415253 54421->54422 54423 415248 54421->54423 54426 415251 54421->54426 54528 424afc 13 API calls 54422->54528 54423->54426 54529 414fcc 46 API calls 54423->54529 54426->54416 54432 423bb2 54427->54432 54430 423c5c 54433 423c63 54430->54433 54434 423c97 54430->54434 54431 423bfd 54435 423c03 54431->54435 54436 423cc0 54431->54436 54454 423bd3 54432->54454 54530 423ad8 54432->54530 54437 423c69 54433->54437 54481 423f21 54433->54481 54440 423ca2 54434->54440 54441 42400a IsIconic 54434->54441 54438 423c35 54435->54438 54439 423c08 54435->54439 54442 423cd2 54436->54442 54443 423cdb 54436->54443 54445 423e83 SendMessageA 54437->54445 54446 423c77 54437->54446 54438->54454 54470 423c4e 54438->54470 54471 423daf 54438->54471 54448 423d66 54439->54448 54449 423c0e 54439->54449 54450 424046 54440->54450 54451 423cab 54440->54451 54447 42401e GetFocus 54441->54447 54441->54454 54452 423ce8 54442->54452 54453 423cd9 54442->54453 54539 424104 11 API calls 54443->54539 54445->54454 54446->54454 54473 423c30 54446->54473 54501 423ec6 54446->54501 54447->54454 54458 42402f 54447->54458 54544 423af4 NtdllDefWindowProc_A 54448->54544 54459 423c17 54449->54459 54460 423d8e PostMessageA 54449->54460 54559 4247c0 WinHelpA PostMessageA 54450->54559 54456 42405d 54451->54456 54451->54473 54457 42414c 11 API calls 54452->54457 54540 423af4 NtdllDefWindowProc_A 54453->54540 54454->54416 54468 424066 54456->54468 54469 42407b 54456->54469 54457->54454 54558 41ef64 GetCurrentThreadId 73A25940 54458->54558 54465 423c20 54459->54465 54466 423e15 54459->54466 54545 423af4 NtdllDefWindowProc_A 54460->54545 54476 423c29 54465->54476 54477 423d3e IsIconic 54465->54477 54478 423e1e 54466->54478 54479 423e4f 54466->54479 54467 423da9 54467->54454 54480 424444 5 API calls 54468->54480 54560 42449c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 54469->54560 54470->54473 54482 423d7b 54470->54482 54534 423af4 NtdllDefWindowProc_A 54471->54534 54473->54454 54538 423af4 NtdllDefWindowProc_A 54473->54538 54475 424036 54475->54454 54489 42403e SetFocus 54475->54489 54476->54473 54490 423d01 54476->54490 54483 423d5a 54477->54483 54484 423d4e 54477->54484 54547 423a84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 54478->54547 54535 423af4 NtdllDefWindowProc_A 54479->54535 54480->54454 54481->54454 54492 423f47 IsWindowEnabled 54481->54492 54487 4240e8 12 API calls 54482->54487 54543 423af4 NtdllDefWindowProc_A 54483->54543 54542 423b30 15 API calls 54484->54542 54487->54454 54488 423db5 54496 423df3 54488->54496 54497 423dd1 54488->54497 54489->54454 54490->54454 54541 422bbc ShowWindow PostMessageA PostQuitMessage 54490->54541 54492->54454 54499 423f55 54492->54499 54495 423e55 54500 423e6d 54495->54500 54536 41ee14 GetCurrentThreadId 73A25940 54495->54536 54503 4239f4 6 API calls 54496->54503 54546 423a84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 54497->54546 54498 423e26 54505 423e38 54498->54505 54548 41eec8 54498->54548 54513 423f5c IsWindowVisible 54499->54513 54508 4239f4 6 API calls 54500->54508 54501->54454 54509 423ee8 IsWindowEnabled 54501->54509 54511 423dfb PostMessageA 54503->54511 54554 423af4 NtdllDefWindowProc_A 54505->54554 54508->54454 54509->54454 54514 423ef6 54509->54514 54510 423dd9 PostMessageA 54510->54454 54511->54454 54513->54454 54515 423f6a GetFocus 54513->54515 54555 412280 7 API calls 54514->54555 54517 418150 54515->54517 54518 423f7f SetFocus 54517->54518 54556 4151b0 54518->54556 54522 423a04 54521->54522 54524 423a7d 54521->54524 54523 423a0a EnumWindows 54522->54523 54522->54524 54523->54524 54525 423a26 GetWindow GetWindowLongA 54523->54525 54561 42398c GetWindow 54523->54561 54524->54416 54526 423a45 54525->54526 54526->54524 54527 423a71 SetWindowPos 54526->54527 54527->54524 54527->54526 54528->54426 54529->54426 54531 423ae2 54530->54531 54532 423aed 54530->54532 54531->54532 54533 408688 7 API calls 54531->54533 54532->54430 54532->54431 54533->54532 54534->54488 54535->54495 54537 41ee99 54536->54537 54537->54500 54538->54454 54539->54454 54540->54454 54541->54454 54542->54454 54543->54454 54544->54454 54545->54467 54546->54510 54547->54498 54549 41eed0 IsWindow 54548->54549 54550 41eefc 54548->54550 54551 41eeea 54549->54551 54552 41eedf EnableWindow 54549->54552 54550->54505 54551->54549 54551->54550 54553 402660 4 API calls 54551->54553 54552->54551 54553->54551 54554->54454 54555->54454 54557 4151cb SetFocus 54556->54557 54557->54454 54558->54475 54559->54467 54560->54467 54562 4239ad GetWindowLongA 54561->54562 54563 4239b9 54561->54563 54562->54563 54564 467ca8 54565 467cde 54564->54565 54599 467ecb 54564->54599 54566 467d12 54565->54566 54568 467d5c 54565->54568 54569 467d6d 54565->54569 54570 467d3a 54565->54570 54571 467d4b 54565->54571 54572 467d29 54565->54572 54573 46544c 19 API calls 54566->54573 54566->54599 54567 403400 4 API calls 54574 467f57 54567->54574 54758 467a18 61 API calls 54568->54758 54759 467c38 40 API calls 54569->54759 54757 4676fc 37 API calls 54570->54757 54600 467844 54571->54600 54756 467594 42 API calls 54572->54756 54583 467d8f 54573->54583 54575 403400 4 API calls 54574->54575 54581 467f5f 54575->54581 54582 467d2f 54582->54566 54582->54599 54585 48f704 18 API calls 54583->54585 54594 467dd1 54583->54594 54583->54599 54584 465388 19 API calls 54584->54594 54585->54594 54586 414a58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54586->54594 54587 467eb8 54760 47df14 97 API calls 54587->54760 54589 42ca9c 6 API calls 54589->54594 54590 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54590->54594 54593 466fa4 23 API calls 54593->54594 54594->54584 54594->54586 54594->54587 54594->54589 54594->54590 54594->54593 54595 467f39 54594->54595 54594->54599 54641 466ed0 54594->54641 54648 4666d8 54594->54648 54685 47dad0 54594->54685 54761 467370 19 API calls 54594->54761 54598 466fa4 23 API calls 54595->54598 54598->54599 54599->54567 54762 468348 54600->54762 54603 4679dc 54604 403400 4 API calls 54603->54604 54606 4679f1 54604->54606 54605 414a58 4 API calls 54607 467892 54605->54607 54608 403420 4 API calls 54606->54608 54609 46789f 54607->54609 54610 4679cd 54607->54610 54612 4679fe 54608->54612 54613 42c7a8 5 API calls 54609->54613 54611 403450 4 API calls 54610->54611 54611->54603 54614 403400 4 API calls 54612->54614 54615 4678ae 54613->54615 54616 467a06 54614->54616 54617 42c36c 5 API calls 54615->54617 54616->54566 54618 4678b9 54617->54618 54765 4547f8 13 API calls 54618->54765 54620 46798b 54620->54603 54620->54610 54626 42cc24 7 API calls 54620->54626 54621 42cc24 7 API calls 54624 467964 54621->54624 54622 46792b 54622->54603 54622->54620 54622->54621 54623 4678c6 54623->54622 54625 462e64 19 API calls 54623->54625 54624->54620 54628 450b64 4 API calls 54624->54628 54627 4678f5 54625->54627 54629 4679a1 54626->54629 54630 462e64 19 API calls 54627->54630 54631 46797b 54628->54631 54629->54610 54632 450b64 4 API calls 54629->54632 54633 467906 54630->54633 54767 479c14 37 API calls 54631->54767 54635 4679b8 54632->54635 54636 450b34 4 API calls 54633->54636 54768 479c14 37 API calls 54635->54768 54638 46791b 54636->54638 54766 479c14 37 API calls 54638->54766 54639 4679c8 54639->54603 54639->54610 54642 466ee1 54641->54642 54643 466edc 54641->54643 54960 466258 45 API calls 54642->54960 54645 466edf 54643->54645 54875 46693c 54643->54875 54645->54594 54646 466ee9 54646->54594 54649 46670b 54648->54649 54976 478c68 54649->54976 54651 466720 54652 466747 54651->54652 54653 466724 54651->54653 54655 46673e 54652->54655 54993 48f608 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54652->54993 54654 463064 20 API calls 54653->54654 54656 46672e 54654->54656 54659 403494 4 API calls 54655->54659 54684 466871 54655->54684 54658 403450 4 API calls 54656->54658 54658->54655 54662 46681a 54659->54662 54660 403400 4 API calls 54663 4668a6 54660->54663 54661 466763 54661->54655 54664 46676b 54661->54664 54665 40357c 4 API calls 54662->54665 54663->54594 54666 466fa4 23 API calls 54664->54666 54667 466827 54665->54667 54668 466778 54666->54668 54669 40357c 4 API calls 54667->54669 54994 42ef34 54668->54994 54671 466834 54669->54671 54674 40357c 4 API calls 54671->54674 54676 466841 54674->54676 54675 4667ba 54678 403450 4 API calls 54675->54678 54677 40357c 4 API calls 54676->54677 54679 46684f 54677->54679 54680 4667ca 54678->54680 54681 414a88 4 API calls 54679->54681 54680->54594 54682 466860 54681->54682 54683 46339c 11 API calls 54682->54683 54683->54684 54684->54660 54686 468348 42 API calls 54685->54686 54687 47db13 54686->54687 54688 47db1c 54687->54688 55218 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54687->55218 54689 414a58 4 API calls 54688->54689 54691 47db2c 54689->54691 54692 403450 4 API calls 54691->54692 54693 47db39 54692->54693 55043 468658 54693->55043 54696 47db49 54698 414a58 4 API calls 54696->54698 54699 47db59 54698->54699 54700 403450 4 API calls 54699->54700 54701 47db66 54700->54701 54702 466040 SendMessageA 54701->54702 54703 47db7f 54702->54703 54704 47dbbd 54703->54704 55220 4752dc 23 API calls 54703->55220 54706 42414c 11 API calls 54704->54706 54707 47dbc7 54706->54707 54708 47dbed 54707->54708 54709 47dbd8 SetActiveWindow 54707->54709 55072 47d0d4 54708->55072 54709->54708 54756->54582 54757->54566 54758->54566 54759->54566 54760->54599 54761->54594 54769 4683d4 54762->54769 54765->54623 54766->54622 54767->54620 54768->54639 54770 414a58 4 API calls 54769->54770 54771 468406 54770->54771 54823 4630fc 54771->54823 54774 414a88 4 API calls 54775 468418 54774->54775 54776 468427 54775->54776 54779 468440 54775->54779 54852 479c14 37 API calls 54776->54852 54778 46843b 54780 403420 4 API calls 54778->54780 54782 468487 54779->54782 54784 46846e 54779->54784 54781 467876 54780->54781 54781->54603 54781->54605 54783 4684ec 54782->54783 54797 46848b 54782->54797 54855 42ca28 CharNextA 54783->54855 54853 479c14 37 API calls 54784->54853 54787 4684fb 54788 4684ff 54787->54788 54792 468518 54787->54792 54856 479c14 37 API calls 54788->54856 54790 4684d3 54854 479c14 37 API calls 54790->54854 54793 46853c 54792->54793 54832 46326c 54792->54832 54857 479c14 37 API calls 54793->54857 54797->54790 54797->54792 54800 468555 54801 403778 4 API calls 54800->54801 54802 46856b 54801->54802 54840 42c878 54802->54840 54805 46857c 54858 4632f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54805->54858 54806 4685aa 54807 42c7a8 5 API calls 54806->54807 54809 4685b5 54807->54809 54811 42c36c 5 API calls 54809->54811 54810 46858f 54812 450b64 4 API calls 54810->54812 54813 4685c0 54811->54813 54814 46859c 54812->54814 54815 42ca9c 6 API calls 54813->54815 54859 479c14 37 API calls 54814->54859 54817 4685cb 54815->54817 54844 468368 54817->54844 54819 4685d3 54820 42cc24 7 API calls 54819->54820 54821 4685db 54820->54821 54821->54778 54860 479c14 37 API calls 54821->54860 54827 463116 54823->54827 54824 406b18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54824->54827 54826 42ca9c 6 API calls 54826->54827 54827->54824 54827->54826 54828 403450 4 API calls 54827->54828 54829 46315f 54827->54829 54861 42c988 54827->54861 54828->54827 54830 403420 4 API calls 54829->54830 54831 463179 54830->54831 54831->54774 54833 463276 54832->54833 54835 463289 54833->54835 54872 42ca18 CharNextA 54833->54872 54835->54793 54836 46329c 54835->54836 54837 4632a6 54836->54837 54838 4632d3 54837->54838 54873 42ca18 CharNextA 54837->54873 54838->54793 54838->54800 54841 42c8d1 54840->54841 54842 42c88e 54840->54842 54841->54805 54841->54806 54842->54841 54874 42ca18 CharNextA 54842->54874 54845 4683cd 54844->54845 54846 46837b 54844->54846 54845->54819 54846->54845 54847 41ee14 2 API calls 54846->54847 54848 46838b 54847->54848 54849 4683a5 SHPathPrepareForWriteA 54848->54849 54850 41eec8 6 API calls 54849->54850 54851 4683c5 54850->54851 54851->54819 54852->54778 54853->54778 54854->54778 54855->54787 54856->54778 54857->54778 54858->54810 54859->54778 54860->54778 54862 403494 4 API calls 54861->54862 54863 42c998 54862->54863 54864 403744 4 API calls 54863->54864 54868 42c9ce 54863->54868 54870 42c3b4 IsDBCSLeadByte 54863->54870 54864->54863 54866 42ca12 54866->54827 54868->54866 54869 4037b8 4 API calls 54868->54869 54871 42c3b4 IsDBCSLeadByte 54868->54871 54869->54868 54870->54863 54871->54868 54872->54833 54873->54837 54874->54842 54877 466983 54875->54877 54876 466dfb 54879 466e16 54876->54879 54880 466e47 54876->54880 54877->54876 54878 466a3e 54877->54878 54881 403494 4 API calls 54877->54881 54884 466a5f 54878->54884 54889 466aa0 54878->54889 54882 403494 4 API calls 54879->54882 54883 403494 4 API calls 54880->54883 54886 4669c2 54881->54886 54887 466e24 54882->54887 54888 466e55 54883->54888 54885 403494 4 API calls 54884->54885 54890 466a6d 54885->54890 54891 414a58 4 API calls 54886->54891 54972 465934 12 API calls 54887->54972 54973 465934 12 API calls 54888->54973 54893 403400 4 API calls 54889->54893 54895 414a58 4 API calls 54890->54895 54896 4669e3 54891->54896 54897 466a9e 54893->54897 54899 466a8e 54895->54899 54900 403634 4 API calls 54896->54900 54916 466b84 54897->54916 54961 466040 54897->54961 54898 466e32 54901 403400 4 API calls 54898->54901 54902 403634 4 API calls 54899->54902 54903 4669f3 54900->54903 54905 466e78 54901->54905 54902->54897 54907 414a58 4 API calls 54903->54907 54910 403400 4 API calls 54905->54910 54906 466c0c 54908 403400 4 API calls 54906->54908 54911 466a07 54907->54911 54922 466c0a 54908->54922 54909 466ac0 54912 466ac6 54909->54912 54913 466afe 54909->54913 54914 466e80 54910->54914 54911->54878 54921 414a58 4 API calls 54911->54921 54918 403494 4 API calls 54912->54918 54917 403400 4 API calls 54913->54917 54915 403420 4 API calls 54914->54915 54919 466e8d 54915->54919 54916->54906 54920 466bcb 54916->54920 54930 466afc 54917->54930 54923 466ad4 54918->54923 54919->54645 54925 403494 4 API calls 54920->54925 54926 466a2e 54921->54926 54967 46647c 42 API calls 54922->54967 54924 477554 42 API calls 54923->54924 54928 466aec 54924->54928 54929 466bd9 54925->54929 54931 403634 4 API calls 54926->54931 54932 403634 4 API calls 54928->54932 54933 414a58 4 API calls 54929->54933 54934 466334 42 API calls 54930->54934 54931->54878 54932->54930 54936 466bfa 54933->54936 54937 466b25 54934->54937 54935 466c35 54938 466c96 54935->54938 54939 466c40 54935->54939 54940 403634 4 API calls 54936->54940 54944 466b86 54937->54944 54945 466b30 54937->54945 54941 403400 4 API calls 54938->54941 54942 403494 4 API calls 54939->54942 54940->54922 54943 466c9e 54941->54943 54950 466c4e 54942->54950 54948 466c94 54943->54948 54959 466d47 54943->54959 54946 403400 4 API calls 54944->54946 54947 403494 4 API calls 54945->54947 54946->54916 54952 466b3e 54947->54952 54948->54943 54968 48f608 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54948->54968 54950->54943 54950->54948 54954 403634 4 API calls 54950->54954 54951 466cc1 54951->54959 54969 48f870 18 API calls 54951->54969 54952->54916 54955 403634 4 API calls 54952->54955 54954->54950 54955->54952 54957 466de8 54971 4290b4 SendMessageA SendMessageA 54957->54971 54970 429064 SendMessageA 54959->54970 54960->54646 54974 429fb0 SendMessageA 54961->54974 54963 46604f 54964 46606f 54963->54964 54975 429fb0 SendMessageA 54963->54975 54964->54909 54966 46605f 54966->54909 54967->54935 54968->54951 54969->54959 54970->54957 54971->54876 54972->54898 54973->54898 54974->54963 54975->54966 54977 478c96 54976->54977 54981 478ccc 54976->54981 55011 4546f8 54977->55011 54978 403420 4 API calls 54979 478dcd 54978->54979 54979->54651 54981->54978 54982 478d96 54982->54651 54983 474b58 19 API calls 54986 478cc0 54983->54986 54984 477554 42 API calls 54984->54986 54985 477554 42 API calls 54987 478d44 54985->54987 54986->54981 54986->54982 54986->54983 54986->54984 54986->54987 55018 478828 31 API calls 54986->55018 54987->54985 54987->54986 54989 42c808 5 API calls 54987->54989 54990 42c830 5 API calls 54987->54990 54992 478d83 54987->54992 55019 478974 54 API calls 54987->55019 54989->54987 54990->54987 54992->54981 54993->54661 54995 42ef40 54994->54995 54996 42ef63 GetActiveWindow GetFocus 54995->54996 54997 41ee14 2 API calls 54996->54997 54998 42ef7a 54997->54998 54999 42ef97 54998->54999 55000 42ef87 RegisterClassA 54998->55000 55001 42f026 SetFocus 54999->55001 55002 42efa5 CreateWindowExA 54999->55002 55000->54999 55003 403400 4 API calls 55001->55003 55002->55001 55004 42efd8 55002->55004 55005 42f042 55003->55005 55037 4241ec 55004->55037 55010 48f870 18 API calls 55005->55010 55007 42f000 55008 42f008 CreateWindowExA 55007->55008 55008->55001 55009 42f01e ShowWindow 55008->55009 55009->55001 55010->54675 55012 454709 55011->55012 55013 454716 55012->55013 55014 45470d 55012->55014 55028 4544dc 29 API calls 55013->55028 55020 4543fc 55014->55020 55017 454713 55017->54986 55018->54986 55019->54987 55021 42dc54 RegOpenKeyExA 55020->55021 55022 454419 55021->55022 55023 454467 55022->55023 55029 454330 55022->55029 55023->55017 55026 454330 6 API calls 55027 454448 RegCloseKey 55026->55027 55027->55017 55028->55017 55034 42db90 55029->55034 55031 454358 55032 403420 4 API calls 55031->55032 55033 4543e2 55032->55033 55033->55026 55035 42da38 6 API calls 55034->55035 55036 42db99 55035->55036 55036->55031 55038 42421e 55037->55038 55039 4241fe GetWindowTextA 55037->55039 55040 403494 4 API calls 55038->55040 55041 4034e0 4 API calls 55039->55041 55042 42421c 55040->55042 55041->55042 55042->55007 55044 468681 55043->55044 55045 4686ce 55044->55045 55046 414a58 4 API calls 55044->55046 55048 403420 4 API calls 55045->55048 55047 468697 55046->55047 55226 463188 6 API calls 55047->55226 55050 468778 55048->55050 55050->54696 55219 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 55050->55219 55051 46869f 55052 414a88 4 API calls 55051->55052 55053 4686ad 55052->55053 55054 4686ba 55053->55054 55056 4686d3 55053->55056 55227 479c14 37 API calls 55054->55227 55057 4686eb 55056->55057 55058 46326c CharNextA 55056->55058 55228 479c14 37 API calls 55057->55228 55060 4686e7 55058->55060 55060->55057 55061 468701 55060->55061 55062 468707 55061->55062 55063 46871d 55061->55063 55229 479c14 37 API calls 55062->55229 55065 42c878 CharNextA 55063->55065 55066 46872a 55065->55066 55066->55045 55230 4632f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55066->55230 55068 468741 55069 450b64 4 API calls 55068->55069 55070 46874e 55069->55070 55231 479c14 37 API calls 55070->55231 55073 47d0f7 55072->55073 55075 47d125 55072->55075 55232 48f624 18 API calls 55073->55232 55076 471854 55075->55076 55077 455f80 24 API calls 55076->55077 55078 4718a0 55077->55078 55079 407210 SetCurrentDirectoryA 55078->55079 55080 4718aa 55079->55080 55233 46a1c4 55080->55233 55084 4718ba 55243 458854 55084->55243 55087 477554 42 API calls 55088 471911 55087->55088 55091 471921 55088->55091 55644 451f4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55088->55644 55090 471943 55093 474394 20 API calls 55090->55093 55091->55090 55645 451f4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55091->55645 55094 47194e 55093->55094 55095 403450 4 API calls 55094->55095 55096 47196b 55095->55096 55097 403450 4 API calls 55096->55097 55098 471979 55097->55098 55247 46a8dc 55098->55247 55102 4719df 55287 4717ac 55102->55287 55109 46a464 17 API calls 55110 471a03 55109->55110 55303 470a34 55110->55303 55113 46a464 17 API calls 55114 471a0d 55113->55114 55115 471a31 55114->55115 55116 458910 4 API calls 55114->55116 55117 471a52 55115->55117 55118 458910 4 API calls 55115->55118 55116->55115 55316 470b2c 55117->55316 55118->55117 55121 46a464 17 API calls 55122 471a5e 55121->55122 55327 46a13c 55122->55327 55220->54704 55226->55051 55227->55045 55228->55045 55229->55045 55230->55068 55231->55045 55232->55075 55234 46a237 55233->55234 55236 46a1e1 55233->55236 55237 46a23c 55234->55237 55235 474b58 19 API calls 55235->55236 55236->55234 55236->55235 55238 46a268 55237->55238 55652 44f490 55238->55652 55241 46a2db 756FE550 55242 46a2f7 55241->55242 55242->55084 55244 45885a 55243->55244 55245 458b3c 4 API calls 55244->55245 55246 458876 55245->55246 55246->55087 55248 46a91a 55247->55248 55249 46a90a 55247->55249 55251 403400 4 API calls 55248->55251 55250 403494 4 API calls 55249->55250 55252 46a918 55250->55252 55251->55252 55253 453f4c 5 API calls 55252->55253 55254 46a92e 55253->55254 55255 453f88 5 API calls 55254->55255 55256 46a93c 55255->55256 55257 46a8b4 5 API calls 55256->55257 55258 46a950 55257->55258 55259 458910 4 API calls 55258->55259 55260 46a968 55259->55260 55261 403420 4 API calls 55260->55261 55262 46a982 55261->55262 55263 403400 4 API calls 55262->55263 55264 46a98a 55263->55264 55265 46aae8 55264->55265 55266 4034e0 4 API calls 55265->55266 55267 46ab25 55266->55267 55268 46ab2e 55267->55268 55269 46ab3d 55267->55269 55271 477554 42 API calls 55268->55271 55270 403400 4 API calls 55269->55270 55272 46ab3b 55270->55272 55271->55272 55273 477554 42 API calls 55272->55273 55274 46ab60 55273->55274 55275 46ab8f 55274->55275 55664 46a99c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 55274->55664 55661 46aad4 55275->55661 55279 477554 42 API calls 55280 46abd0 55279->55280 55281 458910 4 API calls 55280->55281 55282 46abee 55281->55282 55283 403420 4 API calls 55282->55283 55284 46ac08 55283->55284 55285 403420 4 API calls 55284->55285 55286 46ac15 55285->55286 55286->55102 55288 4717ed 55287->55288 55289 4717bc 55287->55289 55291 46a464 55288->55291 55289->55288 55290 474a18 19 API calls 55289->55290 55290->55289 55292 46a472 55291->55292 55293 46a46d 55291->55293 55665 42441c 55292->55665 55669 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 55293->55669 55297 46a48a 55299 471800 55297->55299 55300 471810 55299->55300 55302 471843 55299->55302 55301 474a18 19 API calls 55300->55301 55300->55302 55301->55300 55302->55109 55304 470b09 55303->55304 55310 470a5b 55303->55310 55305 403400 4 API calls 55304->55305 55306 470b1e 55305->55306 55306->55113 55307 474a18 19 API calls 55307->55310 55310->55304 55310->55307 55314 470aab 55310->55314 55703 478de0 55310->55703 55707 4746a4 55310->55707 55712 4746d0 19 API calls 55310->55712 55311 477554 42 API calls 55311->55314 55314->55310 55314->55311 55710 452be4 20 API calls 55314->55710 55711 452be4 20 API calls 55314->55711 55317 470beb 55316->55317 55324 470b5a 55316->55324 55318 403400 4 API calls 55317->55318 55319 470c00 55318->55319 55319->55121 55320 474a18 19 API calls 55320->55324 55321 478de0 15 API calls 55321->55324 55322 4746a4 19 API calls 55322->55324 55323 477554 42 API calls 55323->55324 55324->55317 55324->55320 55324->55321 55324->55322 55324->55323 55325 458910 4 API calls 55324->55325 55722 4746d0 19 API calls 55324->55722 55325->55324 55328 414a88 4 API calls 55327->55328 55329 46a14e 55328->55329 55723 46a0c4 55329->55723 55644->55091 55645->55090 55655 44f4a4 55652->55655 55656 44f4b5 55655->55656 55657 44f4d6 MulDiv 55656->55657 55658 44f4a1 55656->55658 55659 418150 55657->55659 55658->55241 55658->55242 55660 44f501 SendMessageA 55659->55660 55660->55658 55662 403494 4 API calls 55661->55662 55663 46aae3 55662->55663 55663->55279 55664->55275 55666 42441f 55665->55666 55668 42442a 55666->55668 55671 42436c PeekMessageA 55666->55671 55668->55297 55670 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 55668->55670 55672 424410 55671->55672 55673 42438f 55671->55673 55672->55666 55673->55672 55683 42433c 55673->55683 55682 4243fa TranslateMessage DispatchMessageA 55682->55672 55684 424364 55683->55684 55685 42434d 55683->55685 55684->55672 55687 424288 55684->55687 55685->55684 55702 424c28 UnhookWindowsHookEx TerminateThread KillTimer IsWindowVisible ShowWindow 55685->55702 55688 4242d2 55687->55688 55689 424298 55687->55689 55688->55672 55691 4242d8 55688->55691 55689->55688 55690 4242bf TranslateMDISysAccel 55689->55690 55690->55688 55692 424334 55691->55692 55693 4242ed 55691->55693 55692->55672 55699 424264 55692->55699 55693->55692 55694 4242f5 GetCapture 55693->55694 55694->55692 55695 4242fe 55694->55695 55696 424317 SendMessageA 55695->55696 55697 424310 55695->55697 55696->55692 55698 424332 55696->55698 55697->55696 55698->55692 55700 424277 IsDialogMessage 55699->55700 55701 424284 55699->55701 55700->55701 55701->55672 55701->55682 55702->55684 55704 478e87 55703->55704 55705 478df4 55703->55705 55704->55310 55705->55704 55713 4556dc 15 API calls 55705->55713 55714 474600 55707->55714 55710->55314 55711->55310 55712->55310 55713->55704 55715 474634 55714->55715 55716 47460c 55714->55716 55715->55310 55717 47462d 55716->55717 55720 451f4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55716->55720 55721 4744c0 19 API calls 55717->55721 55720->55717 55721->55715 55722->55324 55730 42e9cc 73A1A570 55723->55730 55725 46a0fa 55726 414a88 4 API calls 55725->55726 55727 46a104 55726->55727 55728 403400 4 API calls 55727->55728 55731 41a158 5 API calls 55730->55731 55732 42ea14 SelectObject 55731->55732 55733 403494 4 API calls 55732->55733 55734 42ea27 55733->55734 55735 42c830 5 API calls 55734->55735 55736 42ea31 55735->55736 55737 42c808 5 API calls 55736->55737 55738 42ea3b 55737->55738 55739 42c594 IsDBCSLeadByte 55738->55739 55740 42ea43 55739->55740 55741 403778 4 API calls 55740->55741 55742 42ea74 55741->55742 55743 4037b8 4 API calls 55742->55743 55747 42ea83 55743->55747 55744 42eae5 73A1A480 55744->55725 55747->55744 55748 403634 4 API calls 55747->55748 55749 403400 4 API calls 55747->55749 55750 403494 4 API calls 55747->55750 55751 42e918 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 55747->55751 55752 42e474 6 API calls 55747->55752 55748->55747 55749->55747 55750->55747 55751->55747 55752->55747 56670 416ab2 56671 416b5a 56670->56671 56672 416aca 56670->56672 56689 41528c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56671->56689 56674 416ae4 SendMessageA 56672->56674 56675 416ad8 56672->56675 56685 416b38 56674->56685 56676 416ae2 CallWindowProcA 56675->56676 56677 416afe 56675->56677 56676->56685 56686 419fc8 GetSysColor 56677->56686 56680 416b09 SetTextColor 56681 416b1e 56680->56681 56687 419fc8 GetSysColor 56681->56687 56683 416b23 SetBkColor 56688 41a650 GetSysColor CreateBrushIndirect 56683->56688 56686->56680 56687->56683 56688->56685 56689->56685 54032 40cd94 54035 406e78 WriteFile 54032->54035 54036 406e95 54035->54036 56690 4165b4 56691 4165c1 56690->56691 56692 41661b 56690->56692 56697 4164c0 CreateWindowExA 56691->56697 56693 4165c8 SetPropA SetPropA 56693->56692 56694 4165fb 56693->56694 56695 41660e SetWindowPos 56694->56695 56695->56692 56697->56693 54037 422254 54038 422263 54037->54038 54043 4211e4 54038->54043 54042 422283 54044 421253 54043->54044 54046 4211f3 54043->54046 54048 421264 54044->54048 54068 412440 GetMenuItemCount GetMenuStringA GetMenuState 54044->54068 54046->54044 54067 408c94 19 API calls 54046->54067 54047 421292 54049 4212ad 54047->54049 54056 421305 54047->54056 54048->54047 54050 42132a 54048->54050 54060 4212d0 GetMenu 54049->54060 54064 421303 54049->54064 54052 42133e SetMenu 54050->54052 54050->54064 54051 421356 54071 42112c 10 API calls 54051->54071 54052->54064 54055 42135d 54055->54042 54066 422158 10 API calls 54055->54066 54057 421319 54056->54057 54056->54064 54059 421322 SetMenu 54057->54059 54059->54064 54061 4212f3 54060->54061 54062 4212da 54060->54062 54069 412440 GetMenuItemCount GetMenuStringA GetMenuState 54061->54069 54065 4212ed SetMenu 54062->54065 54064->54051 54070 421d9c 11 API calls 54064->54070 54065->54061 54066->54042 54067->54046 54068->54048 54069->54064 54070->54051 54071->54055 56698 47b671 56699 450710 5 API calls 56698->56699 56700 47b685 56699->56700 56701 47a7a0 23 API calls 56700->56701 56702 47b6a9 56701->56702 56703 42eef4 56704 42ef03 NtdllDefWindowProc_A 56703->56704 56705 42eeff 56703->56705 56704->56705 54072 435314 54074 435329 54072->54074 54073 435343 54074->54073 54078 434cfc 54074->54078 54082 434d2c 54078->54082 54083 434d46 54078->54083 54079 403400 4 API calls 54080 43514b 54079->54080 54080->54073 54091 43515c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54080->54091 54081 4467d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54081->54082 54082->54081 54082->54083 54084 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54082->54084 54085 402648 4 API calls 54082->54085 54087 4316d4 4 API calls 54082->54087 54088 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54082->54088 54089 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54082->54089 54092 433de4 54082->54092 54104 4345a8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54082->54104 54083->54079 54084->54082 54085->54082 54087->54082 54088->54082 54089->54082 54091->54073 54093 433ea1 54092->54093 54094 433e11 54092->54094 54123 433d44 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54093->54123 54096 403494 4 API calls 54094->54096 54097 433e1f 54096->54097 54099 403778 4 API calls 54097->54099 54098 433e93 54100 403400 4 API calls 54098->54100 54102 433e40 54099->54102 54101 433ef1 54100->54101 54101->54082 54102->54098 54105 48f2bc 54102->54105 54104->54082 54106 48f38c 54105->54106 54107 48f2f4 54105->54107 54124 448364 54106->54124 54108 403494 4 API calls 54107->54108 54111 48f2ff 54108->54111 54110 403400 4 API calls 54112 48f3b0 54110->54112 54113 4037b8 4 API calls 54111->54113 54116 48f30f 54111->54116 54114 403400 4 API calls 54112->54114 54117 48f328 54113->54117 54115 48f3b8 54114->54115 54115->54102 54116->54110 54117->54116 54118 4037b8 4 API calls 54117->54118 54119 48f34b 54118->54119 54120 403778 4 API calls 54119->54120 54121 48f37c 54120->54121 54122 403634 4 API calls 54121->54122 54122->54106 54123->54098 54125 448389 54124->54125 54135 4483cc 54124->54135 54126 403494 4 API calls 54125->54126 54128 448394 54126->54128 54127 4483e0 54130 403400 4 API calls 54127->54130 54132 4037b8 4 API calls 54128->54132 54131 448413 54130->54131 54131->54116 54133 4483b0 54132->54133 54134 4037b8 4 API calls 54133->54134 54134->54135 54135->54127 54136 447f60 54135->54136 54137 403494 4 API calls 54136->54137 54138 447f96 54137->54138 54139 4037b8 4 API calls 54138->54139 54140 447fa8 54139->54140 54141 403778 4 API calls 54140->54141 54142 447fc9 54141->54142 54143 4037b8 4 API calls 54142->54143 54144 447fe1 54143->54144 54145 403778 4 API calls 54144->54145 54146 44800c 54145->54146 54147 4037b8 4 API calls 54146->54147 54156 448024 54147->54156 54148 44805c 54150 403420 4 API calls 54148->54150 54149 4480f7 54153 4480ff GetProcAddress 54149->54153 54154 44813c 54150->54154 54151 44807f LoadLibraryExA 54151->54156 54152 448091 LoadLibraryA 54152->54156 54155 448112 54153->54155 54154->54127 54155->54148 54156->54148 54156->54149 54156->54151 54156->54152 54157 403b80 4 API calls 54156->54157 54158 403450 4 API calls 54156->54158 54160 43d4bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54156->54160 54157->54156 54158->54156 54160->54156 54161 48d090 54162 48d0c4 54161->54162 54163 48d0da 54162->54163 54164 48d0c6 54162->54164 54167 48d0e9 54163->54167 54168 48d116 54163->54168 54297 4469d0 18 API calls 54164->54297 54166 48d0cf Sleep 54270 48d111 54166->54270 54170 446a2c 18 API calls 54167->54170 54173 48d152 54168->54173 54174 48d125 54168->54174 54169 403420 4 API calls 54172 48d584 54169->54172 54171 48d0f8 54170->54171 54175 48d100 FindWindowA 54171->54175 54179 48d1a8 54173->54179 54180 48d161 54173->54180 54176 446a2c 18 API calls 54174->54176 54177 446cac 5 API calls 54175->54177 54178 48d132 54176->54178 54177->54270 54182 48d13a FindWindowA 54178->54182 54185 48d204 54179->54185 54186 48d1b7 54179->54186 54298 4469d0 18 API calls 54180->54298 54184 446cac 5 API calls 54182->54184 54183 48d16d 54299 4469d0 18 API calls 54183->54299 54281 48d14d 54184->54281 54194 48d260 54185->54194 54195 48d213 54185->54195 54302 4469d0 18 API calls 54186->54302 54189 48d17a 54300 4469d0 18 API calls 54189->54300 54190 48d1c3 54303 4469d0 18 API calls 54190->54303 54193 48d187 54301 4469d0 18 API calls 54193->54301 54205 48d29a 54194->54205 54206 48d26f 54194->54206 54307 4469d0 18 API calls 54195->54307 54196 48d1d0 54304 4469d0 18 API calls 54196->54304 54199 48d21f 54308 4469d0 18 API calls 54199->54308 54201 48d192 SendMessageA 54204 446cac 5 API calls 54201->54204 54203 48d1dd 54305 4469d0 18 API calls 54203->54305 54204->54281 54214 48d2e8 54205->54214 54215 48d2a9 54205->54215 54209 446a2c 18 API calls 54206->54209 54207 48d22c 54309 4469d0 18 API calls 54207->54309 54212 48d27c 54209->54212 54211 48d1e8 PostMessageA 54306 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 54211->54306 54217 48d284 RegisterClipboardFormatA 54212->54217 54213 48d239 54310 4469d0 18 API calls 54213->54310 54223 48d33c 54214->54223 54224 48d2f7 54214->54224 54312 4469d0 18 API calls 54215->54312 54220 446cac 5 API calls 54217->54220 54220->54270 54221 48d244 SendNotifyMessageA 54311 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 54221->54311 54222 48d2b5 54313 4469d0 18 API calls 54222->54313 54233 48d34b 54223->54233 54234 48d390 54223->54234 54315 4469d0 18 API calls 54224->54315 54228 48d2c2 54314 4469d0 18 API calls 54228->54314 54229 48d303 54316 4469d0 18 API calls 54229->54316 54232 48d2cd SendMessageA 54236 446cac 5 API calls 54232->54236 54319 4469d0 18 API calls 54233->54319 54242 48d39f 54234->54242 54243 48d3f2 54234->54243 54235 48d310 54317 4469d0 18 API calls 54235->54317 54236->54281 54238 48d357 54320 4469d0 18 API calls 54238->54320 54241 48d31b PostMessageA 54318 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 54241->54318 54246 446a2c 18 API calls 54242->54246 54250 48d479 54243->54250 54251 48d401 54243->54251 54244 48d364 54321 4469d0 18 API calls 54244->54321 54248 48d3ac 54246->54248 54252 42e1f0 2 API calls 54248->54252 54249 48d36f SendNotifyMessageA 54322 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 54249->54322 54260 48d488 54250->54260 54261 48d4ae 54250->54261 54254 446a2c 18 API calls 54251->54254 54255 48d3b9 54252->54255 54256 48d410 54254->54256 54257 48d3cf GetLastError 54255->54257 54258 48d3bf 54255->54258 54323 4469d0 18 API calls 54256->54323 54262 446cac 5 API calls 54257->54262 54259 446cac 5 API calls 54258->54259 54263 48d3cd 54259->54263 54328 4469d0 18 API calls 54260->54328 54271 48d4bd 54261->54271 54272 48d4e0 54261->54272 54262->54263 54266 446cac 5 API calls 54263->54266 54265 48d492 FreeLibrary 54329 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 54265->54329 54266->54270 54268 48d423 GetProcAddress 54273 48d469 54268->54273 54274 48d42f 54268->54274 54270->54169 54275 446a2c 18 API calls 54271->54275 54279 48d4ef 54272->54279 54286 48d523 54272->54286 54327 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 54273->54327 54324 4469d0 18 API calls 54274->54324 54277 48d4c9 54275->54277 54284 48d4d1 CreateMutexA 54277->54284 54330 48740c 18 API calls 54279->54330 54280 48d43b 54325 4469d0 18 API calls 54280->54325 54281->54270 54284->54270 54285 48d448 54289 446cac 5 API calls 54285->54289 54286->54270 54332 48740c 18 API calls 54286->54332 54288 48d4fb 54290 48d50c OemToCharBuffA 54288->54290 54291 48d459 54289->54291 54331 487424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 54290->54331 54326 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 54291->54326 54294 48d53e 54295 48d54f CharToOemBuffA 54294->54295 54333 487424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 54295->54333 54297->54166 54298->54183 54299->54189 54300->54193 54301->54201 54302->54190 54303->54196 54304->54203 54305->54211 54306->54281 54307->54199 54308->54207 54309->54213 54310->54221 54311->54270 54312->54222 54313->54228 54314->54232 54315->54229 54316->54235 54317->54241 54318->54281 54319->54238 54320->54244 54321->54249 54322->54270 54323->54268 54324->54280 54325->54285 54326->54281 54327->54281 54328->54265 54329->54270 54330->54288 54331->54270 54332->54294 54333->54270 54334 44815c 54335 448191 54334->54335 54336 44818a 54334->54336 54337 4481a5 54335->54337 54339 447f60 7 API calls 54335->54339 54338 403400 4 API calls 54336->54338 54337->54336 54340 403494 4 API calls 54337->54340 54341 44833b 54338->54341 54339->54337 54342 4481be 54340->54342 54343 4037b8 4 API calls 54342->54343 54344 4481da 54343->54344 54345 4037b8 4 API calls 54344->54345 54346 4481f6 54345->54346 54346->54336 54347 44820a 54346->54347 54348 4037b8 4 API calls 54347->54348 54349 448224 54348->54349 54350 431604 4 API calls 54349->54350 54351 448246 54350->54351 54352 4316d4 4 API calls 54351->54352 54359 448266 54351->54359 54352->54351 54353 4482bc 54366 441d68 54353->54366 54354 4482a4 54354->54353 54378 443004 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54354->54378 54358 4482f0 GetLastError 54379 447ef4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54358->54379 54359->54354 54377 443004 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54359->54377 54361 4482ff 54380 443044 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54361->54380 54363 448314 54381 443054 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54363->54381 54365 44831c 54367 442d46 54366->54367 54368 441da1 54366->54368 54369 403400 4 API calls 54367->54369 54370 403400 4 API calls 54368->54370 54371 442d5b 54369->54371 54372 441da9 54370->54372 54371->54358 54373 431604 4 API calls 54372->54373 54375 441db5 54373->54375 54374 442d36 54374->54358 54375->54374 54382 441440 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54375->54382 54377->54359 54378->54353 54379->54361 54380->54363 54381->54365 54382->54375 54383 44aedc 54384 44aeea 54383->54384 54386 44af09 54383->54386 54385 44adc0 11 API calls 54384->54385 54384->54386 54385->54386 54387 40cfdc 54388 40cfe4 54387->54388 54389 40d012 54388->54389 54390 40d007 54388->54390 54399 40d00e 54388->54399 54392 40d016 54389->54392 54393 40d028 54389->54393 54401 4062a0 GlobalHandle GlobalUnWire GlobalFree 54390->54401 54402 406274 GlobalAlloc GlobalFix 54392->54402 54400 406284 GlobalHandle GlobalUnWire GlobalReAlloc GlobalFix 54393->54400 54396 40d024 54397 40d038 54396->54397 54398 408c24 5 API calls 54397->54398 54397->54399 54398->54399 54400->54397 54401->54399 54402->54396 54403 41655c 73A25CF0
                                                    Strings
                                                    • -- File entry --, xrefs: 0046C727
                                                    • Existing file is protected by Windows File Protection. Skipping., xrefs: 0046CE18
                                                    • Stripped read-only attribute., xrefs: 0046CEF3
                                                    • Failed to strip read-only attribute., xrefs: 0046CEFF
                                                    • Version of our file: %u.%u.%u.%u, xrefs: 0046CB1C
                                                    • Version of existing file: %u.%u.%u.%u, xrefs: 0046CBA8
                                                    • Dest file is protected by Windows File Protection., xrefs: 0046C919
                                                    • Incrementing shared file count (32-bit)., xrefs: 0046D5B4
                                                    • @, xrefs: 0046C7DC
                                                    • Failed to read existing file's MD5 sum. Proceeding., xrefs: 0046CCFC
                                                    • Uninstaller requires administrator: %s, xrefs: 0046D1A1
                                                    • Will register the file (a DLL/OCX) later., xrefs: 0046D52E
                                                    • .tmp, xrefs: 0046CFE3
                                                    • Non-default bitness: 32-bit, xrefs: 0046C8E7
                                                    • Skipping due to "onlyifdestfileexists" flag., xrefs: 0046CF26
                                                    • Couldn't read time stamp. Skipping., xrefs: 0046CD61
                                                    • Non-default bitness: 64-bit, xrefs: 0046C8DB
                                                    • InUn, xrefs: 0046D171
                                                    • Time stamp of our file: %s, xrefs: 0046C9C7
                                                    • Time stamp of existing file: (failed to read), xrefs: 0046CA63
                                                    • Existing file's MD5 sum matches our file. Skipping., xrefs: 0046CCE1
                                                    • Version of our file: (none), xrefs: 0046CB28
                                                    • Same version. Skipping., xrefs: 0046CD11
                                                    • User opted not to overwrite the existing file. Skipping., xrefs: 0046CE79
                                                    • Time stamp of our file: (failed to read), xrefs: 0046C9D3
                                                    • Skipping due to "onlyifdoesntexist" flag., xrefs: 0046C9FA
                                                    • Will register the file (a type library) later., xrefs: 0046D522
                                                    • YF, xrefs: 0046D723
                                                    • , xrefs: 0046CBFB, 0046CDCC, 0046CE4A
                                                    • Existing file is a newer version. Skipping., xrefs: 0046CC2E
                                                    • Version of existing file: (none), xrefs: 0046CD26
                                                    • Dest file exists., xrefs: 0046C9E7
                                                    • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0046CEC2
                                                    • Existing file has a later time stamp. Skipping., xrefs: 0046CDFB
                                                    • Existing file's MD5 sum is different from our file. Proceeding., xrefs: 0046CCF0
                                                    • Installing the file., xrefs: 0046CF35
                                                    • Incrementing shared file count (64-bit)., xrefs: 0046D59B
                                                    • Time stamp of existing file: %s, xrefs: 0046CA57
                                                    • Dest filename: %s, xrefs: 0046C8C0
                                                    • Same time stamp. Skipping., xrefs: 0046CD81
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's MD5 sum is different from our file. Proceeding.$Existing file's MD5 sum matches our file. Skipping.$Failed to read existing file's MD5 sum. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.$YF
                                                    • API String ID: 0-3564422898
                                                    • Opcode ID: ed0e2d0e53044e32e0b71031ed58fdf6cc3455cb4204fb473fac64f8dd654023
                                                    • Instruction ID: 1e9c61f2d5dc43f11f2eac8064384361fb78b777c9586803e2fa22bed864b107
                                                    • Opcode Fuzzy Hash: ed0e2d0e53044e32e0b71031ed58fdf6cc3455cb4204fb473fac64f8dd654023
                                                    • Instruction Fuzzy Hash: 06927630E042489FCB11DFA5C485BEDBBB5AF05308F5440ABE844BB392D7789E45DB5A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1585 423b7c-423bb0 1586 423bb2-423bb3 1585->1586 1587 423be4-423bfb call 423ad8 1585->1587 1589 423bb5-423bd1 call 40b3ac 1586->1589 1592 423c5c-423c61 1587->1592 1593 423bfd 1587->1593 1622 423bd3-423bdb 1589->1622 1623 423be0-423be2 1589->1623 1595 423c63 1592->1595 1596 423c97-423c9c 1592->1596 1597 423c03-423c06 1593->1597 1598 423cc0-423cd0 1593->1598 1599 423f21-423f29 1595->1599 1600 423c69-423c71 1595->1600 1603 423ca2-423ca5 1596->1603 1604 42400a-424018 IsIconic 1596->1604 1601 423c35-423c38 1597->1601 1602 423c08 1597->1602 1605 423cd2-423cd7 1598->1605 1606 423cdb-423ce3 call 424104 1598->1606 1611 4240c2-4240ca 1599->1611 1617 423f2f-423f3a call 418150 1599->1617 1609 423e83-423eaa SendMessageA 1600->1609 1610 423c77-423c7c 1600->1610 1618 423d19-423d20 1601->1618 1619 423c3e-423c3f 1601->1619 1613 423d66-423d76 call 423af4 1602->1613 1614 423c0e-423c11 1602->1614 1615 424046-42405b call 4247c0 1603->1615 1616 423cab-423cac 1603->1616 1604->1611 1612 42401e-424029 GetFocus 1604->1612 1620 423ce8-423cf0 call 42414c 1605->1620 1621 423cd9-423cfc call 423af4 1605->1621 1606->1611 1609->1611 1624 423c82-423c83 1610->1624 1625 423fba-423fc5 1610->1625 1626 4240e1-4240e7 1611->1626 1612->1611 1633 42402f-424038 call 41ef64 1612->1633 1613->1611 1634 423c17-423c1a 1614->1634 1635 423d8e-423daa PostMessageA call 423af4 1614->1635 1615->1611 1628 423cb2-423cb5 1616->1628 1629 42405d-424064 1616->1629 1617->1611 1678 423f40-423f4f call 418150 IsWindowEnabled 1617->1678 1618->1611 1638 423d26-423d2d 1618->1638 1639 423c45-423c48 1619->1639 1640 423eaf-423eb6 1619->1640 1620->1611 1621->1611 1622->1626 1623->1587 1623->1589 1641 423fe2-423fed 1624->1641 1642 423c89-423c8c 1624->1642 1625->1611 1644 423fcb-423fdd 1625->1644 1645 424090-424097 1628->1645 1646 423cbb 1628->1646 1655 424066-424079 call 424444 1629->1655 1656 42407b-42408e call 42449c 1629->1656 1633->1611 1693 42403e-424044 SetFocus 1633->1693 1652 423c20-423c23 1634->1652 1653 423e15-423e1c 1634->1653 1635->1611 1638->1611 1658 423d33-423d39 1638->1658 1659 423c4e-423c51 1639->1659 1660 423daf-423dcf call 423af4 1639->1660 1640->1611 1648 423ebc-423ec1 call 404e54 1640->1648 1641->1611 1667 423ff3-424005 1641->1667 1664 423c92 1642->1664 1665 423ec6-423ece 1642->1665 1644->1611 1662 4240aa-4240b9 1645->1662 1663 424099-4240a8 1645->1663 1666 4240bb-4240bc call 423af4 1646->1666 1648->1611 1673 423c29-423c2a 1652->1673 1674 423d3e-423d4c IsIconic 1652->1674 1675 423e1e-423e31 call 423a84 1653->1675 1676 423e4f-423e60 call 423af4 1653->1676 1655->1611 1656->1611 1658->1611 1679 423c57 1659->1679 1680 423d7b-423d89 call 4240e8 1659->1680 1706 423df3-423e10 call 4239f4 PostMessageA 1660->1706 1707 423dd1-423dee call 423a84 PostMessageA 1660->1707 1662->1611 1663->1611 1664->1666 1665->1611 1691 423ed4-423edb 1665->1691 1702 4240c1 1666->1702 1667->1611 1694 423c30 1673->1694 1695 423d01-423d09 1673->1695 1684 423d5a-423d61 call 423af4 1674->1684 1685 423d4e-423d55 call 423b30 1674->1685 1719 423e43-423e4a call 423af4 1675->1719 1720 423e33-423e3d call 41eec8 1675->1720 1713 423e62-423e68 call 41ee14 1676->1713 1714 423e76-423e7e call 4239f4 1676->1714 1678->1611 1710 423f55-423f64 call 418150 IsWindowVisible 1678->1710 1679->1666 1680->1611 1684->1611 1685->1611 1691->1611 1705 423ee1-423ef0 call 418150 IsWindowEnabled 1691->1705 1693->1611 1694->1666 1695->1611 1708 423d0f-423d14 call 422bbc 1695->1708 1702->1611 1705->1611 1735 423ef6-423f0c call 412280 1705->1735 1706->1611 1707->1611 1708->1611 1710->1611 1736 423f6a-423fb5 GetFocus call 418150 SetFocus call 4151b0 SetFocus 1710->1736 1733 423e6d-423e70 1713->1733 1714->1611 1719->1611 1720->1719 1733->1714 1735->1611 1741 423f12-423f1c 1735->1741 1736->1611 1741->1611
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e2da97f0453a8356ded8a134e82b241216a7217cf4a6f009116005f3a9e21df7
                                                    • Instruction ID: 08d2eb01bbb0ed60fc7aa7cee5e011afdc801c2d0a550085eeb8675b0aa62de6
                                                    • Opcode Fuzzy Hash: e2da97f0453a8356ded8a134e82b241216a7217cf4a6f009116005f3a9e21df7
                                                    • Instruction Fuzzy Hash: ACE19A30B00124EBC710DF69E585A5EB7B0FF48704FA441AAE645AB352CB7DEE81DB09

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2004 463b8c-463ba2 2005 463ba4-463ba7 call 402d30 2004->2005 2006 463bac-463c63 call 490118 call 402b30 * 6 2004->2006 2005->2006 2023 463c65-463c8c call 4145ac 2006->2023 2024 463ca0-463cb9 2006->2024 2028 463c91-463c9b call 41456c 2023->2028 2029 463c8e 2023->2029 2030 463cf6-463d04 call 4903f8 2024->2030 2031 463cbb-463ce2 call 41458c 2024->2031 2028->2024 2029->2028 2037 463d06-463d15 call 490268 2030->2037 2038 463d17-463d19 call 49038c 2030->2038 2039 463ce7-463cf1 call 41454c 2031->2039 2040 463ce4 2031->2040 2045 463d1e-463d71 call 48fd7c call 41a340 * 2 2037->2045 2038->2045 2039->2030 2040->2039 2052 463d82-463d97 call 450b64 call 414a88 2045->2052 2053 463d73-463d80 call 414a88 2045->2053 2058 463d9c-463da3 2052->2058 2053->2058 2060 463da5-463de6 call 41462c call 414670 call 420f08 call 420f34 call 420ad8 call 420b04 2058->2060 2061 463deb-464271 call 4901b8 call 4904b4 call 41458c * 3 call 41462c call 41454c * 3 call 45d548 call 45d560 call 45d56c call 45d5b4 call 45d548 call 45d560 call 45d56c call 45d5b4 call 45d560 call 45d5b4 LoadBitmapA call 41d620 call 45d584 call 45d59c call 4639e8 call 46546c call 463064 call 40357c call 414a88 call 46339c call 4633a4 call 463064 call 40357c * 2 call 414a88 call 46546c call 463064 call 414a88 call 46339c call 4633a4 call 414a88 * 2 call 46546c call 414a88 * 2 call 46339c call 41456c call 46339c call 41456c call 46546c call 414a88 call 46339c call 4633a4 call 46546c call 414a88 call 46339c call 41456c * 2 call 414a88 call 46339c call 41456c 2058->2061 2060->2061 2191 464273-4642cb call 41456c call 414a88 call 46339c call 41456c 2061->2191 2192 4642cd-4642e6 call 4149b4 * 2 2061->2192 2199 4642eb-46439c call 463064 call 46546c call 463064 call 414a88 call 4904b4 call 46339c 2191->2199 2192->2199 2218 4643d6-4645fa call 463064 call 414a88 call 4904c4 * 2 call 42e668 call 41456c call 46339c call 41456c call 414a88 call 4901b8 call 4904b4 call 41458c call 463064 call 414a88 call 46339c call 41456c call 463064 call 46546c call 463064 call 414a88 call 46339c call 41456c call 4633a4 call 463064 call 414a88 call 46339c 2199->2218 2219 46439e-4643b9 2199->2219 2276 4645fc-464605 2218->2276 2277 46463b-4646f4 call 463064 call 46546c call 463064 call 414a88 call 4904b4 call 46339c 2218->2277 2220 4643be-4643d1 call 41456c 2219->2220 2221 4643bb 2219->2221 2220->2218 2221->2220 2276->2277 2278 464607-464636 call 4149b4 call 4633a4 2276->2278 2295 4646f6-464711 2277->2295 2296 46472e-464b4f call 463064 call 414a88 call 4904c4 * 2 call 42e668 call 41456c call 46339c call 41456c call 414a88 call 4901b8 call 4904b4 call 41458c call 414a88 call 463064 call 46546c call 463064 call 414a88 call 46339c call 4633a4 call 42bb40 call 4904c4 call 44e2e4 call 463064 call 46546c call 463064 call 46546c call 463064 call 46546c * 2 call 414a88 call 46339c call 4633a4 call 46546c call 48fd7c call 41a340 call 463064 call 40357c call 414a88 call 46339c call 41456c call 414a88 * 2 call 4904c4 call 403494 call 40357c * 2 call 414a88 2277->2296 2278->2277 2297 464716-464729 call 41456c 2295->2297 2298 464713 2295->2298 2395 464b73-464b7a 2296->2395 2396 464b51-464b6e call 44f8f8 call 44fa54 2296->2396 2297->2296 2298->2297 2397 464b9e-464ba5 2395->2397 2398 464b7c-464b99 call 44f8f8 call 44fa54 2395->2398 2396->2395 2401 464ba7-464bc4 call 44f8f8 call 44fa54 2397->2401 2402 464bc9-464c0f call 418150 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 465560 2397->2402 2398->2397 2401->2402 2416 464c11-464c18 2402->2416 2417 464c29 2402->2417 2418 464c25-464c27 2416->2418 2419 464c1a-464c23 2416->2419 2420 464c2b-464c3a 2417->2420 2418->2420 2419->2417 2419->2418 2421 464c54 2420->2421 2422 464c3c-464c43 2420->2422 2425 464c56-464c70 2421->2425 2423 464c45-464c4e 2422->2423 2424 464c50-464c52 2422->2424 2423->2421 2423->2424 2424->2425 2426 464c76-464c7f 2425->2426 2427 464d19-464d20 2425->2427 2428 464c81-464cd8 call 477554 call 414a88 call 477554 call 414a88 call 477554 call 414a88 2426->2428 2429 464cda-464d14 call 414a88 * 3 2426->2429 2430 464d26-464d49 call 477554 call 403450 2427->2430 2431 464db4-464dc2 call 414a88 2427->2431 2428->2427 2429->2427 2451 464d5b-464d6f call 403494 2430->2451 2452 464d4b-464d59 call 403494 2430->2452 2437 464dc7-464dd0 2431->2437 2441 464dd6-464dee call 429f48 2437->2441 2442 464ee0-464f0f call 42b8dc call 44e270 2437->2442 2459 464e65-464e69 2441->2459 2460 464df0-464df4 2441->2460 2469 464f15-464f19 2442->2469 2470 464fbd-464fc1 2442->2470 2474 464d81-464db2 call 42c6e0 call 42ca9c call 403494 call 414a88 2451->2474 2475 464d71-464d7c call 403494 2451->2475 2452->2474 2465 464e6b-464e74 2459->2465 2466 464eb9-464ebd 2459->2466 2467 464df6-464e30 call 40b3ac call 477554 2460->2467 2465->2466 2476 464e76-464e81 2465->2476 2472 464ed1-464edb call 429fcc 2466->2472 2473 464ebf-464ecf call 429fcc 2466->2473 2528 464e32-464e39 2467->2528 2529 464e5f-464e63 2467->2529 2478 464f1b-464f2d call 40b3ac 2469->2478 2479 464fc3-464fca 2470->2479 2480 465040-465044 2470->2480 2472->2442 2473->2442 2474->2437 2475->2474 2476->2466 2486 464e83-464e87 2476->2486 2508 464f5f-464f96 call 477554 call 44c540 2478->2508 2509 464f2f-464f5d call 477554 call 44c610 2478->2509 2479->2480 2489 464fcc-464fd3 2479->2489 2490 465046-46505d call 40b3ac 2480->2490 2491 4650ad-4650b6 2480->2491 2495 464e89-464eac call 40b3ac call 406a2c 2486->2495 2489->2480 2501 464fd5-464fe0 2489->2501 2521 46505f-46509b call 40b3ac call 4661d4 * 2 call 466074 2490->2521 2522 46509d-4650ab call 4661d4 2490->2522 2499 4650d5-4650ea call 463748 call 4634c0 2491->2499 2500 4650b8-4650d0 call 40b3ac call 4661d4 2491->2500 2538 464eb3-464eb7 2495->2538 2539 464eae-464eb1 2495->2539 2552 46513c-465146 call 4149b4 2499->2552 2553 4650ec-46510f call 429fb0 call 40b3ac 2499->2553 2500->2499 2501->2499 2511 464fe6-464fea 2501->2511 2554 464f9b-464f9f 2508->2554 2509->2554 2520 464fec-465002 call 40b3ac 2511->2520 2549 465004-465030 call 429fcc call 4661d4 call 466074 2520->2549 2550 465035-465039 2520->2550 2521->2499 2522->2499 2528->2529 2540 464e3b-464e4d call 406a2c 2528->2540 2529->2459 2529->2467 2538->2466 2538->2495 2539->2466 2540->2529 2564 464e4f-464e59 2540->2564 2549->2499 2550->2520 2555 46503b 2550->2555 2565 46514b-46516a call 4149b4 2552->2565 2578 465111-465118 2553->2578 2579 46511a-465129 call 4149b4 2553->2579 2561 464fa1-464fa8 2554->2561 2562 464faa-464fac 2554->2562 2555->2499 2561->2562 2563 464fb3-464fb7 2561->2563 2562->2563 2563->2470 2563->2478 2564->2529 2569 464e5b 2564->2569 2580 465194-4651b7 call 477554 call 403450 2565->2580 2581 46516c-46518f call 429fb0 call 466334 2565->2581 2569->2529 2578->2579 2584 46512b-46513a call 4149b4 2578->2584 2579->2565 2597 4651d4-4651dd 2580->2597 2598 4651b9-4651c2 2580->2598 2581->2580 2584->2565 2600 4651f3-465203 call 403494 2597->2600 2601 4651df-4651f1 call 403684 2597->2601 2598->2597 2599 4651c4-4651d2 call 403494 2598->2599 2608 465215-46522c call 414a88 2599->2608 2600->2608 2601->2600 2609 465205-465210 call 403494 2601->2609 2613 465262-46526c call 4149b4 2608->2613 2614 46522e-465235 2608->2614 2609->2608 2620 465271-465296 call 403400 * 3 2613->2620 2615 465237-465240 2614->2615 2616 465242-46524c call 42b054 2614->2616 2615->2616 2618 465251-465260 call 4149b4 2615->2618 2616->2618 2618->2620
                                                    APIs
                                                      • Part of subcall function 00490268: GetWindowRect.USER32(00000000), ref: 0049027E
                                                    • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00463F5B
                                                      • Part of subcall function 0041D620: GetObjectA.GDI32(?,00000018,00463F75), ref: 0041D64B
                                                      • Part of subcall function 004639E8: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00463A85
                                                      • Part of subcall function 004639E8: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00463AAB
                                                      • Part of subcall function 004639E8: SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00463B07
                                                      • Part of subcall function 004639E8: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00463B2D
                                                      • Part of subcall function 004633A4: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00464010,00000000,00000000,00000000,0000000C,00000000), ref: 004633BC
                                                      • Part of subcall function 004904C4: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 004904CE
                                                      • Part of subcall function 004901B8: 73A1A570.USER32(00000000,?,?,?), ref: 004901DA
                                                      • Part of subcall function 004901B8: SelectObject.GDI32(?,00000000), ref: 00490200
                                                      • Part of subcall function 004901B8: 73A1A480.USER32(00000000,?,0049025E,00490257,?,00000000,?,?,?), ref: 00490251
                                                      • Part of subcall function 004904B4: MulDiv.KERNEL32(0000004B,?,00000006), ref: 004904BE
                                                    • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,021DEC3C,021E071C,?,?,021E074C,?,?,021E079C,?), ref: 00464BD3
                                                    • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00464BE4
                                                    • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00464BFC
                                                      • Part of subcall function 00429FCC: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 00429FE2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Menu$AppendExtractFileIconInfoObject$A480A570BitmapCallbackDispatcherLoadMessageRectSelectSendSystemUserWindow
                                                    • String ID: $(Default)$STOPIMAGE
                                                    • API String ID: 1965080796-770201673
                                                    • Opcode ID: fa521217fb0e5812f436cbf92353f22a14d6e4acfc2cec147169aff284106fce
                                                    • Instruction ID: 626ff93bbfc8332391d0f2b102979e9e991fab8d506e9976bf8a011eab2a6279
                                                    • Opcode Fuzzy Hash: fa521217fb0e5812f436cbf92353f22a14d6e4acfc2cec147169aff284106fce
                                                    • Instruction Fuzzy Hash: 2FF2C6386105109FCB00EF69D8D9F9973F5BF89304F1542B6E9049B36ADB78AC46CB4A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2629 47aa8c-47aaf8 call 403634 call 403738 FindFirstFileA 2634 47ab47-47ab4b 2629->2634 2635 47aafa-47ab02 2629->2635 2636 47ac62-47ac87 call 403420 call 403400 2634->2636 2637 47ab51-47ab9a call 403494 call 40357c * 2 call 403738 FindFirstFileA 2634->2637 2638 47ab04-47ab08 2635->2638 2639 47ab2a-47ab3c FindNextFileA 2635->2639 2637->2636 2656 47aba0-47abab 2637->2656 2642 47ab0e-47ab25 call 4305a0 2638->2642 2643 47ab0a-47ab0c 2638->2643 2639->2635 2640 47ab3e-47ab42 FindClose 2639->2640 2640->2634 2642->2639 2643->2639 2643->2642 2657 47abae-47abbb call 478788 2656->2657 2660 47abbd-47ac27 call 403494 call 40355c call 40357c * 2 call 47aa8c call 4305a0 2657->2660 2661 47ac2c-47ac3e FindNextFileA 2657->2661 2660->2661 2661->2657 2663 47ac44-47ac5a FindClose 2661->2663
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,?,00000000,?,00000000,!5I,?,00000000,00000000,?,?,0047BE05,?,?,00000000), ref: 0047AAEC
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,?,?,00000000,?,00000000,!5I,?,00000000,00000000,?,?,0047BE05,?), ref: 0047AB35
                                                    • FindClose.KERNEL32(000000FF,000000FF,?,00000000,?,?,00000000,?,00000000,!5I,?,00000000,00000000,?,?,0047BE05), ref: 0047AB42
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,!5I,?,00000000,00000000,?,?,0047BE05,?), ref: 0047AB8E
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0047AC5B,?,00000000,?,00000000,?,?,00000000,?,00000000,!5I,?,00000000), ref: 0047AC37
                                                    • FindClose.KERNEL32(000000FF,0047AC62,0047AC5B,?,00000000,?,00000000,?,?,00000000,?,00000000,!5I,?,00000000,00000000), ref: 0047AC55
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNext
                                                    • String ID: !5I
                                                    • API String ID: 3541575487-1811926599
                                                    • Opcode ID: 5db09696fcb86aa681af2ac980b74f6ec1081cc4fe3c74d895faf0f1671323b3
                                                    • Instruction ID: dddbc17d7fa16c008acef8f830c258430c94bebf86a13a93c3925b777e83759d
                                                    • Opcode Fuzzy Hash: 5db09696fcb86aa681af2ac980b74f6ec1081cc4fe3c74d895faf0f1671323b3
                                                    • Instruction Fuzzy Hash: A4516F71900648AFCB11EFA5CC85ADEB7BCEB88315F1084BAA408E7351D6389F95CF59
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00470EFE,?,?,00000001,00497154), ref: 00470DED
                                                    • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,00470EFE,?,?,00000001,00497154), ref: 00470ECA
                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,00470EFE,?,?,00000001,00497154), ref: 00470ED8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNext
                                                    • String ID: unins$unins???.*
                                                    • API String ID: 3541575487-1009660736
                                                    • Opcode ID: 59bbec5d29110cfc8c3922ffc3efe913e4adb4c1814e18eb1ba6450e0216b8aa
                                                    • Instruction ID: 3238905601e7178f79b8e6620674fa0ed0285fbb132af5dce66f95cffd567c6d
                                                    • Opcode Fuzzy Hash: 59bbec5d29110cfc8c3922ffc3efe913e4adb4c1814e18eb1ba6450e0216b8aa
                                                    • Instruction Fuzzy Hash: D9312170601108EFCB10EB65C991ADEB7A9EF44318F5084B6E44CEB3A2DB79DF458B58
                                                    APIs
                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,0044813D), ref: 00448080
                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00448101
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID:
                                                    • API String ID: 2574300362-0
                                                    • Opcode ID: 94212dd90ddcc7e7b97f5c0ad46f395fe92f525c31c0224741e74e51c689ebfd
                                                    • Instruction ID: 5c6eebc632780948e30306f747c70913dfebb380d33768fd88d962b889412947
                                                    • Opcode Fuzzy Hash: 94212dd90ddcc7e7b97f5c0ad46f395fe92f525c31c0224741e74e51c689ebfd
                                                    • Instruction Fuzzy Hash: CD515170A00105AFDB00EFA5C481AAFB7F9EB54315F10817FE814BB392DB389E458B99
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,004516CB,?,?,-00000001,00000000), ref: 004516A5
                                                    • GetLastError.KERNEL32(00000000,?,00000000,004516CB,?,?,-00000001,00000000), ref: 004516AD
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileFindFirstLast
                                                    • String ID:
                                                    • API String ID: 873889042-0
                                                    • Opcode ID: 85b5cf930fe23895bef6e60e72055f4d932c23341b5013a69e1222781679f763
                                                    • Instruction ID: 1035efb27f9b4b466a521b4d59d966f000d53702a43f221aaee312fb08fd4d5a
                                                    • Opcode Fuzzy Hash: 85b5cf930fe23895bef6e60e72055f4d932c23341b5013a69e1222781679f763
                                                    • Instruction Fuzzy Hash: 9EF04931A00304BB8B10EB769C5159EB7ECDB4532571046BBFC14D32A2DA784D048458
                                                    APIs
                                                    • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004964C0,00000001,?,0040859B,?,00000000,0040867A), ref: 004084EE
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: db4c94cdf382ee3399fd393310c0d3b07f3e4771964ce669c16d021a31866df8
                                                    • Instruction ID: 1ce02aaae6ec4ade8b295bae84213e8e13784b7c216e354617812bc232f4da8b
                                                    • Opcode Fuzzy Hash: db4c94cdf382ee3399fd393310c0d3b07f3e4771964ce669c16d021a31866df8
                                                    • Instruction Fuzzy Hash: 59E0D87170021467D711E95A9C869F7B35CA758314F00427FB949EB3C2EDB8DE4046ED
                                                    APIs
                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?,?,004240C1,?,00000000,004240CC), ref: 00423B1E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: f78a68ed826797f4bf69a42243cc74bd686c7ff48922d06499da9bfac42a5011
                                                    • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                                    • Opcode Fuzzy Hash: f78a68ed826797f4bf69a42243cc74bd686c7ff48922d06499da9bfac42a5011
                                                    • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: e5c4147ce8d30c90c427c53b97d0de2aa7d796d22412cffb07543fa3924af9c1
                                                    • Instruction ID: 1680b636b72d7d7da35d26ad3489112d7b5719c0f4c6eb10b1da13dd6a5c5f2b
                                                    • Opcode Fuzzy Hash: e5c4147ce8d30c90c427c53b97d0de2aa7d796d22412cffb07543fa3924af9c1
                                                    • Instruction Fuzzy Hash: CAD0C2B260420053C300AEA9AC82697769C8B84316F10483F7C85CA3C3E67CDB4C569A
                                                    APIs
                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042EF10
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: 526567439b164cf8a1cedbeebbc24c6bfdc41ebf56c0565ee429dfc079ee367e
                                                    • Instruction ID: 914d3360e1f6a3e7d3a1e305f80b88d129d6a01b97e8a9d2bd08e0dbdb8f1123
                                                    • Opcode Fuzzy Hash: 526567439b164cf8a1cedbeebbc24c6bfdc41ebf56c0565ee429dfc079ee367e
                                                    • Instruction Fuzzy Hash: 16D0A77120010C7FCB00DE99D940C6F33AC9B88700BA0C805F508C7205C734EC1087B4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 409 46afd0-46b002 410 46b004-46b00b 409->410 411 46b00d 409->411 412 46b014-46b04c call 403634 call 403738 call 42dcf8 410->412 411->412 419 46b067-46b090 call 403738 call 42dc1c 412->419 420 46b04e-46b062 call 403738 call 42dcf8 412->420 428 46b092-46b09b call 46aca0 419->428 429 46b0a0-46b0c9 call 46adbc 419->429 420->419 428->429 433 46b0db-46b0de call 403400 429->433 434 46b0cb-46b0d9 call 403494 429->434 438 46b0e3-46b12e call 46adbc call 42c36c call 46ae04 call 46adbc 433->438 434->438 447 46b144-46b165 call 453f88 call 46adbc 438->447 448 46b130-46b143 call 46ae2c 438->448 455 46b167-46b1ba call 46adbc call 474d2c call 46adbc call 474d2c call 46adbc 447->455 456 46b1bb-46b1c2 447->456 448->447 455->456 457 46b1c4-46b201 call 474d2c call 46adbc call 474d2c call 46adbc 456->457 458 46b202-46b209 456->458 457->458 462 46b24a-46b24e 458->462 463 46b20b-46b249 call 46adbc * 3 458->463 465 46b250-46b25b call 477554 462->465 466 46b25d-46b266 call 403494 462->466 463->462 476 46b26b-46b438 call 403778 call 46adbc call 477554 call 46ae04 call 403494 call 40357c * 2 call 46adbc call 403494 call 40357c * 2 call 46adbc call 477554 call 46ae04 call 477554 call 46ae04 call 477554 call 46ae04 call 477554 call 46ae04 call 477554 call 46ae04 call 477554 call 46ae04 call 477554 call 46ae04 call 477554 call 46ae04 call 477554 call 46ae04 call 477554 465->476 466->476 553 46b44e-46b45c call 46ae2c 476->553 554 46b43a-46b44c call 46adbc 476->554 558 46b461 553->558 559 46b462-46b4ab call 46ae2c call 46ae60 call 46adbc call 477554 call 46aec4 554->559 558->559 570 46b4d1-46b4db 559->570 571 46b4ad-46b4d0 call 46ae2c * 2 559->571 573 46b4e1-46b4e8 570->573 574 46b57f-46b586 570->574 571->570 575 46b54c-46b557 573->575 576 46b4ea-46b50e call 4305a0 573->576 577 46b5e0-46b5f6 RegCloseKey 574->577 578 46b588-46b5be call 48f624 574->578 583 46b55a-46b55e 575->583 576->583 589 46b510-46b511 576->589 578->577 583->574 587 46b560-46b579 call 4305dc call 46ae2c 583->587 594 46b57e 587->594 591 46b513-46b539 call 40b3ac call 474a18 589->591 598 46b546-46b548 591->598 599 46b53b-46b541 call 4305a0 591->599 594->574 598->591 601 46b54a 598->601 599->598 601->583
                                                    APIs
                                                      • Part of subcall function 0046ADBC: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,00471E52,00497154,?,0046B0C1,?,00000000,0046B5F7,?,_is1), ref: 0046ADDF
                                                    • RegCloseKey.ADVAPI32(?,0046B5FE,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046B649,?,?,00000001,00497154), ref: 0046B5F1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseValue
                                                    • String ID: " /SILENT$5.3.7 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                    • API String ID: 3132538880-1513848147
                                                    • Opcode ID: bd9ebed55080ab1c2cbc551a0e488ba844bb2b61b786902c1b2a1379981f34ac
                                                    • Instruction ID: 746d38c79df91a3682cc1381ab8f3a69e9c68552b91b34625608c135107d40c7
                                                    • Opcode Fuzzy Hash: bd9ebed55080ab1c2cbc551a0e488ba844bb2b61b786902c1b2a1379981f34ac
                                                    • Instruction Fuzzy Hash: EF022234A001089BCB04EB55D981ADE73F5EB48304F60807BE815BB795EB79BE45CF9A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 994 48d090-48d0c4 call 403684 997 48d0da-48d0e7 call 403684 994->997 998 48d0c6-48d0d5 call 4469d0 Sleep 994->998 1004 48d0e9-48d10c call 446a2c call 403738 FindWindowA call 446cac 997->1004 1005 48d116-48d123 call 403684 997->1005 1003 48d56a-48d584 call 403420 998->1003 1023 48d111 1004->1023 1013 48d152-48d15f call 403684 1005->1013 1014 48d125-48d14d call 446a2c call 403738 FindWindowA call 446cac 1005->1014 1021 48d1a8-48d1b5 call 403684 1013->1021 1022 48d161-48d1a3 call 4469d0 * 4 SendMessageA call 446cac 1013->1022 1014->1003 1031 48d204-48d211 call 403684 1021->1031 1032 48d1b7-48d1ff call 4469d0 * 4 PostMessageA call 446b04 1021->1032 1022->1003 1023->1003 1043 48d260-48d26d call 403684 1031->1043 1044 48d213-48d25b call 4469d0 * 4 SendNotifyMessageA call 446b04 1031->1044 1032->1003 1056 48d29a-48d2a7 call 403684 1043->1056 1057 48d26f-48d295 call 446a2c call 403738 RegisterClipboardFormatA call 446cac 1043->1057 1044->1003 1068 48d2e8-48d2f5 call 403684 1056->1068 1069 48d2a9-48d2e3 call 4469d0 * 3 SendMessageA call 446cac 1056->1069 1057->1003 1081 48d33c-48d349 call 403684 1068->1081 1082 48d2f7-48d337 call 4469d0 * 3 PostMessageA call 446b04 1068->1082 1069->1003 1095 48d34b-48d38b call 4469d0 * 3 SendNotifyMessageA call 446b04 1081->1095 1096 48d390-48d39d call 403684 1081->1096 1082->1003 1095->1003 1107 48d39f-48d3bd call 446a2c call 42e1f0 1096->1107 1108 48d3f2-48d3ff call 403684 1096->1108 1128 48d3cf-48d3dd GetLastError call 446cac 1107->1128 1129 48d3bf-48d3cd call 446cac 1107->1129 1118 48d479-48d486 call 403684 1108->1118 1119 48d401-48d42d call 446a2c call 403738 call 4469d0 GetProcAddress 1108->1119 1131 48d488-48d4a9 call 4469d0 FreeLibrary call 446b04 1118->1131 1132 48d4ae-48d4bb call 403684 1118->1132 1150 48d469-48d474 call 446b04 1119->1150 1151 48d42f-48d464 call 4469d0 * 2 call 446cac call 446b04 1119->1151 1137 48d3e2-48d3ed call 446cac 1128->1137 1129->1137 1131->1003 1147 48d4bd-48d4db call 446a2c call 403738 CreateMutexA 1132->1147 1148 48d4e0-48d4ed call 403684 1132->1148 1137->1003 1147->1003 1158 48d4ef-48d521 call 48740c call 403574 call 403738 OemToCharBuffA call 487424 1148->1158 1159 48d523-48d530 call 403684 1148->1159 1150->1003 1151->1003 1158->1003 1171 48d532-48d564 call 48740c call 403574 call 403738 CharToOemBuffA call 487424 1159->1171 1172 48d566 1159->1172 1171->1003 1172->1003
                                                    APIs
                                                    • Sleep.KERNEL32(00000000,00000000,0048D585,?,?,?,?,00000000,00000000,00000000), ref: 0048D0D0
                                                    • FindWindowA.USER32(00000000,00000000), ref: 0048D101
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FindSleepWindow
                                                    • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                    • API String ID: 3078808852-3310373309
                                                    • Opcode ID: 6d09237ef46fbe0c588df0b5f31f10d1ab6f4aecfe11740b5c8deda4b3a47913
                                                    • Instruction ID: b7cd7d5d5db4a0afe63c34010f1f5127a1ce6451f18986b2d244d641b6039975
                                                    • Opcode Fuzzy Hash: 6d09237ef46fbe0c588df0b5f31f10d1ab6f4aecfe11740b5c8deda4b3a47913
                                                    • Instruction Fuzzy Hash: 7CC170A0B0021067D714BE3E9C4261E67999F89B08B21D93FB446EB7CACD7DDC06439E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1505 47e324-47e349 GetModuleHandleA GetProcAddress 1506 47e3b0-47e3b5 GetSystemInfo 1505->1506 1507 47e34b-47e361 GetNativeSystemInfo GetProcAddress 1505->1507 1509 47e3ba-47e3c3 1506->1509 1508 47e363-47e36e GetCurrentProcess 1507->1508 1507->1509 1508->1509 1518 47e370-47e374 1508->1518 1510 47e3c5-47e3c9 1509->1510 1511 47e3d3-47e3da 1509->1511 1512 47e3dc-47e3e3 1510->1512 1513 47e3cb-47e3cf 1510->1513 1514 47e3f5-47e3fa 1511->1514 1512->1514 1516 47e3e5-47e3ec 1513->1516 1517 47e3d1-47e3ee 1513->1517 1516->1514 1517->1514 1518->1509 1520 47e376-47e37d call 451324 1518->1520 1520->1509 1523 47e37f-47e38c GetProcAddress 1520->1523 1523->1509 1524 47e38e-47e3a5 GetModuleHandleA GetProcAddress 1523->1524 1524->1509 1525 47e3a7-47e3ae 1524->1525 1525->1509
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0047E335
                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0047E342
                                                    • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0047E350
                                                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0047E358
                                                    • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 0047E364
                                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 0047E385
                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 0047E398
                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0047E39E
                                                    • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0047E3B5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                    • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                    • API String ID: 2230631259-2623177817
                                                    • Opcode ID: 876d29313336f64b02c429a4dc30d06227ee9fa5e9a52924d5b7fd0a40990461
                                                    • Instruction ID: a063e709604e63e698a73f43ad3ac4547ab3c09a454f64e1e729cbbcaa2a8d4d
                                                    • Opcode Fuzzy Hash: 876d29313336f64b02c429a4dc30d06227ee9fa5e9a52924d5b7fd0a40990461
                                                    • Instruction Fuzzy Hash: B111BE55108781E4DA2173778C46BEB26488B19718F18CBFBBC5DA72D3CAACCC45866E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1526 465560-465598 call 477554 1529 46559e-4655ae call 474394 1526->1529 1530 46577a-465794 call 403420 1526->1530 1535 4655b3-4655f8 call 40785c call 403738 call 42dc54 1529->1535 1541 4655fd-4655ff 1535->1541 1542 465605-46561a 1541->1542 1543 465770-465774 1541->1543 1544 46562f-465636 1542->1544 1545 46561c-46562a call 42db84 1542->1545 1543->1530 1543->1535 1547 465663-46566a 1544->1547 1548 465638-46565a call 42db84 call 42db9c 1544->1548 1545->1544 1550 4656c3-4656ca 1547->1550 1551 46566c-465691 call 42db84 * 2 1547->1551 1548->1547 1567 46565c 1548->1567 1554 465710-465717 1550->1554 1555 4656cc-4656de call 42db84 1550->1555 1572 465693-46569c call 474e20 1551->1572 1573 4656a1-4656b3 call 42db84 1551->1573 1557 465752-465768 RegCloseKey 1554->1557 1558 465719-46574d call 42db84 * 3 1554->1558 1568 4656e0-4656e9 call 474e20 1555->1568 1569 4656ee-465700 call 42db84 1555->1569 1558->1557 1567->1547 1568->1569 1569->1554 1579 465702-46570b call 474e20 1569->1579 1572->1573 1573->1550 1583 4656b5-4656be call 474e20 1573->1583 1579->1554 1583->1550
                                                    APIs
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    • RegCloseKey.ADVAPI32(?,0046577A,?,?,00000001,00000000,00000000,00465795,?,00000000,00000000,?), ref: 00465763
                                                    Strings
                                                    • Inno Setup: Selected Components, xrefs: 00465682
                                                    • Inno Setup: No Icons, xrefs: 0046564B
                                                    • Inno Setup: Deselected Components, xrefs: 004656A4
                                                    • Inno Setup: Setup Type, xrefs: 00465672
                                                    • Inno Setup: User Info: Serial, xrefs: 00465745
                                                    • Inno Setup: Deselected Tasks, xrefs: 004656F1
                                                    • Inno Setup: User Info: Name, xrefs: 0046571F
                                                    • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 004655BF
                                                    • Inno Setup: Icon Group, xrefs: 0046563E
                                                    • %s\%s_is1, xrefs: 004655DD
                                                    • Inno Setup: User Info: Organization, xrefs: 00465732
                                                    • Inno Setup: App Path, xrefs: 00465622
                                                    • Inno Setup: Selected Tasks, xrefs: 004656CF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                    • API String ID: 47109696-1093091907
                                                    • Opcode ID: 328a1bc407ec345f630894097dd9e4ef0db271cfb89d006e8a38850b5e478fe2
                                                    • Instruction ID: bb32627f320e3cc68c90922f1ce730c32f1ed2e05da39e653a8746b1e26c5d66
                                                    • Opcode Fuzzy Hash: 328a1bc407ec345f630894097dd9e4ef0db271cfb89d006e8a38850b5e478fe2
                                                    • Instruction Fuzzy Hash: 7151D730A00A04DBCB11EB65D951BDEBBF5EF84314F9084BAE844A7791E738AF05CB59

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1744 4237e4-4237ee 1745 423917-42391b 1744->1745 1746 4237f4-423816 call 41f334 GetClassInfoA 1744->1746 1749 423847-423850 GetSystemMetrics 1746->1749 1750 423818-42382f RegisterClassA 1746->1750 1752 423852 1749->1752 1753 423855-42385f GetSystemMetrics 1749->1753 1750->1749 1751 423831-423842 call 408c24 call 40311c 1750->1751 1751->1749 1752->1753 1755 423861 1753->1755 1756 423864-4238c0 call 403738 call 406300 call 403400 call 4235bc SetWindowLongA 1753->1756 1755->1756 1767 4238c2-4238d5 call 4240e8 SendMessageA 1756->1767 1768 4238da-423908 GetSystemMenu DeleteMenu * 2 1756->1768 1767->1768 1768->1745 1770 42390a-423912 DeleteMenu 1768->1770 1770->1745
                                                    APIs
                                                      • Part of subcall function 0041F334: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED14,?,004237FF,00423B7C,0041ED14), ref: 0041F352
                                                    • GetClassInfoA.USER32(00400000,004235EC), ref: 0042380F
                                                    • RegisterClassA.USER32(00494630), ref: 00423827
                                                    • GetSystemMetrics.USER32(00000000), ref: 00423849
                                                    • GetSystemMetrics.USER32(00000001), ref: 00423858
                                                    • SetWindowLongA.USER32(004105C0,000000FC,004235FC), ref: 004238B4
                                                    • SendMessageA.USER32(004105C0,00000080,00000001,00000000), ref: 004238D5
                                                    • GetSystemMenu.USER32(004105C0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C,0041ED14), ref: 004238E0
                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,004105C0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C,0041ED14), ref: 004238EF
                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,004105C0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 004238FC
                                                    • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,004105C0,00000000,00000000,00400000,00000000,00000000,00000000), ref: 00423912
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                    • String ID: 5B
                                                    • API String ID: 183575631-3738334870
                                                    • Opcode ID: e5b5147e0e34996107640ab488c5a955b3283bc40e3e9afea641ea9dff5fb6f0
                                                    • Instruction ID: 4eea79998965153292ad411f177aff7c9d901da1d54039d3c3496ec011b6d66c
                                                    • Opcode Fuzzy Hash: e5b5147e0e34996107640ab488c5a955b3283bc40e3e9afea641ea9dff5fb6f0
                                                    • Instruction Fuzzy Hash: C53161B17402106AEB10AF65EC82F6A36989715709F11017BBA41AF2D7C67DED04876C

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00477E3B,?,?,00000000,00496628,00000000,00000000,?,00492DE5,00000000,00492F8E,?,00000000), ref: 00477D5B
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00477E3B,?,?,00000000,00496628,00000000,00000000,?,00492DE5,00000000,00492F8E,?,00000000), ref: 00477D64
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID: Created temporary directory: $REGDLL_EXE$U3I$\_RegDLL.tmp$\_setup64.tmp$_3I$_isetup
                                                    • API String ID: 1375471231-2101017921
                                                    • Opcode ID: 044f710515538b87f3539befc4994a712df830ba868c81cf226560f097988371
                                                    • Instruction ID: 9eac427b1f6c86218b5dd17884e9265b12970cda80e91b75412eebffdef6b962
                                                    • Opcode Fuzzy Hash: 044f710515538b87f3539befc4994a712df830ba868c81cf226560f097988371
                                                    • Instruction Fuzzy Hash: FA414834A041099FDB01EF95C882ADEB7B9EF48308F50857BE81477391D738AE05CB98

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1935 477ff4-47804a call 42c36c call 4035c0 call 477c70 call 4511e0 1944 478056-478065 call 4511e0 1935->1944 1945 47804c-478051 call 451f4c 1935->1945 1949 478067-47806d 1944->1949 1950 47807f-478085 1944->1950 1945->1944 1951 47808f-478097 call 403494 1949->1951 1952 47806f-478075 1949->1952 1953 478087-47808d 1950->1953 1954 47809c-4780c4 call 42e1f0 * 2 1950->1954 1951->1954 1952->1950 1955 478077-47807d 1952->1955 1953->1951 1953->1954 1961 4780c6-4780e6 call 40785c call 451f4c 1954->1961 1962 4780eb-478105 GetProcAddress 1954->1962 1955->1950 1955->1951 1961->1962 1963 478107-47810c call 451f4c 1962->1963 1964 478111-47812e call 403400 * 2 1962->1964 1963->1964
                                                    APIs
                                                    • GetProcAddress.KERNEL32(6F9F0000,SHGetFolderPathA), ref: 004780F6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc
                                                    • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                    • API String ID: 190572456-1343262939
                                                    • Opcode ID: 5f811c4b1ad69077daeec5ebc9ca371b9d8a8bac53d2212722e899f71a5dbf0f
                                                    • Instruction ID: 78987156a0c8f89aaa09f1bd6b28e0925efeaf29b32e78da8b5dfd25ccb219f9
                                                    • Opcode Fuzzy Hash: 5f811c4b1ad69077daeec5ebc9ca371b9d8a8bac53d2212722e899f71a5dbf0f
                                                    • Instruction Fuzzy Hash: 61316430A40149DFCB00EBA5C8859DEB7B5EB54344F90C4BBE504E7352DB389E458BAD

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1973 42ef34-42ef3e 1974 42ef40-42ef43 call 402d30 1973->1974 1975 42ef48-42ef85 call 402b30 GetActiveWindow GetFocus call 41ee14 1973->1975 1974->1975 1981 42ef97-42ef9f 1975->1981 1982 42ef87-42ef91 RegisterClassA 1975->1982 1983 42f026-42f042 SetFocus call 403400 1981->1983 1984 42efa5-42efd6 CreateWindowExA 1981->1984 1982->1981 1984->1983 1986 42efd8-42f01c call 4241ec call 403738 CreateWindowExA 1984->1986 1986->1983 1992 42f01e-42f021 ShowWindow 1986->1992 1992->1983
                                                    APIs
                                                    • GetActiveWindow.USER32 ref: 0042EF63
                                                    • GetFocus.USER32 ref: 0042EF6B
                                                    • RegisterClassA.USER32(004947AC), ref: 0042EF8C
                                                    • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F060,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042EFCA
                                                    • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F010
                                                    • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F021
                                                    • SetFocus.USER32(00000000,00000000,0042F043,?,?,?,00000001,00000000,?,00456ACA,00000000,00496628), ref: 0042F028
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                    • String ID: (fI$TWindowDisabler-Window
                                                    • API String ID: 3167913817-2792019125
                                                    • Opcode ID: 8c16546f9a585749c763ac640097901552d234e7c9639c2d0d67cc4ae301c64c
                                                    • Instruction ID: 77e24118650528b8c543fe6d0d23e90f8f7024fb04e3d66e63b834f41b798fd0
                                                    • Opcode Fuzzy Hash: 8c16546f9a585749c763ac640097901552d234e7c9639c2d0d67cc4ae301c64c
                                                    • Instruction Fuzzy Hash: 35219571740710BAE220EF62DD02F1A76A4EB05B04FA2453BF604BB2D2D7BC6D54C6AD

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1993 451df8-451e49 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 1994 451e54-451e56 1993->1994 1995 451e4b-451e52 1993->1995 1997 451e5a-451e90 call 42e1f0 call 42e670 call 403400 1994->1997 1995->1994 1996 451e58 1995->1996 1996->1997
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451E91,?,?,?,?,00000000,?,00493414), ref: 00451E18
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451E1E
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451E91,?,?,?,?,00000000,?,00493414), ref: 00451E32
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451E38
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                    • API String ID: 1646373207-2130885113
                                                    • Opcode ID: 005ce24a84f0adc731c4ba6b6a02f3cecc611ef39ba83e5d20aa547e568ff859
                                                    • Instruction ID: bff3e1d123b44789eb661b74cfa9bb81be17ee1d1842bcd010c9e5766072ccdb
                                                    • Opcode Fuzzy Hash: 005ce24a84f0adc731c4ba6b6a02f3cecc611ef39ba83e5d20aa547e568ff859
                                                    • Instruction Fuzzy Hash: E4018470200744AED701AB62AC03B6B3A98D754B5AF91447BFC04A61A3D7BC5D089E2D

                                                    Control-flow Graph

                                                    APIs
                                                    • RegisterClipboardFormatA.USER32(commdlg_help), ref: 0043031C
                                                    • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 0043032B
                                                    • GetCurrentThreadId.KERNEL32 ref: 00430345
                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00430366
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                    • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                    • API String ID: 4130936913-2943970505
                                                    • Opcode ID: d957c5322606f91c3a63daffd078634db936568746c689a8806e8aa63a5fc16b
                                                    • Instruction ID: 0713c644b5c0c2c8d9555e19a872e1a2a1cf9f6f22ed51b2a28eccd68185566a
                                                    • Opcode Fuzzy Hash: d957c5322606f91c3a63daffd078634db936568746c689a8806e8aa63a5fc16b
                                                    • Instruction Fuzzy Hash: 9CF082704483808BD700EB75C842B197AE0EB98708F01467FB898A62E1D77A8500CB5F
                                                    APIs
                                                    • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00453C20,00453C20,?,00453C20,00000000), ref: 00453BAC
                                                    • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00453C20,00453C20,?,00453C20), ref: 00453BB9
                                                      • Part of subcall function 00453970: WaitForInputIdle.USER32(?,00000032), ref: 0045399C
                                                      • Part of subcall function 00453970: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004539BE
                                                      • Part of subcall function 00453970: GetExitCodeProcess.KERNEL32(?,?), ref: 004539CD
                                                      • Part of subcall function 00453970: CloseHandle.KERNEL32(?,004539FA,004539F3,?,?,?,00000000,?,?,00453BCD,?,?,?,00000044,00000000,00000000), ref: 004539ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                    • String ID: .bat$.cmd$;@G$COMMAND.COM" /C $D$cmd.exe" /C "
                                                    • API String ID: 854858120-2992700576
                                                    • Opcode ID: ef3c1c521bdf9824ac8a48839c8a769afaea94b7faf56d572750ec2177aa4b73
                                                    • Instruction ID: 0d4c244814a61e6a9f40f8d6579175ec88b371b5f0bc4768c512e06936e56e52
                                                    • Opcode Fuzzy Hash: ef3c1c521bdf9824ac8a48839c8a769afaea94b7faf56d572750ec2177aa4b73
                                                    • Instruction Fuzzy Hash: 0D51767460035DABCB01EFA5C842B9EBBB9AF44346F50443BB844B7283D7789F098B58
                                                    APIs
                                                    • LoadIconA.USER32(00400000,MAINICON), ref: 0042368C
                                                    • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 004236B9
                                                    • OemToCharA.USER32(?,?), ref: 004236CC
                                                    • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 0042370C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Char$FileIconLoadLowerModuleName
                                                    • String ID: 2$MAINICON
                                                    • API String ID: 3935243913-3181700818
                                                    • Opcode ID: b8e4f3de8f6e7962c855b1bbff0a6ea575b20ad32e9f870a500b7efad52da8d9
                                                    • Instruction ID: d7f5d394b2ec06d520cb0a4b60bf3498b9d8aa77ab50e693133e7ce4a757069a
                                                    • Opcode Fuzzy Hash: b8e4f3de8f6e7962c855b1bbff0a6ea575b20ad32e9f870a500b7efad52da8d9
                                                    • Instruction Fuzzy Hash: DC31A2B0A042559ADF10EF29D8C57C67BE8AF14308F4441BAE844DB393D7BED988CB65
                                                    APIs
                                                    • GetCurrentProcessId.KERNEL32(00000000), ref: 00418EAD
                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00418ECE
                                                    • GetCurrentThreadId.KERNEL32 ref: 00418EE9
                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F0A
                                                      • Part of subcall function 00423038: 73A1A570.USER32(00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 0042308E
                                                      • Part of subcall function 00423038: EnumFontsA.GDI32(00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 004230A1
                                                      • Part of subcall function 00423038: 73A24620.GDI32(00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230A9
                                                      • Part of subcall function 00423038: 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230B4
                                                      • Part of subcall function 004235FC: LoadIconA.USER32(00400000,MAINICON), ref: 0042368C
                                                      • Part of subcall function 004235FC: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 004236B9
                                                      • Part of subcall function 004235FC: OemToCharA.USER32(?,?), ref: 004236CC
                                                      • Part of subcall function 004235FC: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 0042370C
                                                      • Part of subcall function 0041F088: GetVersion.KERNEL32(?,00418F60,00000000,?,?,?,00000001), ref: 0041F096
                                                      • Part of subcall function 0041F088: SetErrorMode.KERNEL32(00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0B2
                                                      • Part of subcall function 0041F088: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0BE
                                                      • Part of subcall function 0041F088: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0CC
                                                      • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F0FC
                                                      • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F125
                                                      • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F13A
                                                      • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F14F
                                                      • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F164
                                                      • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F179
                                                      • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F18E
                                                      • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F1A3
                                                      • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F1B8
                                                      • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F1CD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$A24620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                                    • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                    • API String ID: 3864787166-2767913252
                                                    • Opcode ID: 1c5da02b922e4aac06326fd948070b9cb60db65944391413fb0283cc291dbe50
                                                    • Instruction ID: b4a2cca2d4326696562d23f03e9beb5cdbbc64ba536a620a3ee3ba5bc66bdef7
                                                    • Opcode Fuzzy Hash: 1c5da02b922e4aac06326fd948070b9cb60db65944391413fb0283cc291dbe50
                                                    • Instruction Fuzzy Hash: 9A1160B06142409AC700FF2A984274A7AE0EB64309F41843FF448DB2A1DB3D9945CB5E
                                                    APIs
                                                    • SetWindowLongA.USER32(?,000000FC,?), ref: 004135D4
                                                    • GetWindowLongA.USER32(?,000000F0), ref: 004135DF
                                                    • GetWindowLongA.USER32(?,000000F4), ref: 004135F1
                                                    • SetWindowLongA.USER32(?,000000F4,?), ref: 00413604
                                                    • SetPropA.USER32(?,00000000,00000000), ref: 0041361B
                                                    • SetPropA.USER32(?,00000000,00000000), ref: 00413632
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: LongWindow$Prop
                                                    • String ID:
                                                    • API String ID: 3887896539-0
                                                    • Opcode ID: 86a15e674b3ea48860a72e4751bd866d9c55aec508b8b4782c27e449c12c4e66
                                                    • Instruction ID: 44bb5ba5a57c54889193f85f1a8a28b74f903b4ef320443ee5f093ebf11223bc
                                                    • Opcode Fuzzy Hash: 86a15e674b3ea48860a72e4751bd866d9c55aec508b8b4782c27e449c12c4e66
                                                    • Instruction Fuzzy Hash: B611C975500244BFDB00DF99DC85E9A3BE8BB19364F114266B928DB2A1D738D9908B68
                                                    APIs
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0046E329,?,00000000,?,00000001,00000000,0046E4F7,?,00000000,?,00000000,?,0046E6B2), ref: 0046E305
                                                    • FindClose.KERNEL32(000000FF,0046E330,0046E329,?,00000000,?,00000001,00000000,0046E4F7,?,00000000,?,00000000,?,0046E6B2,?), ref: 0046E323
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0046E44B,?,00000000,?,00000001,00000000,0046E4F7,?,00000000,?,00000000,?,0046E6B2), ref: 0046E427
                                                    • FindClose.KERNEL32(000000FF,0046E452,0046E44B,?,00000000,?,00000001,00000000,0046E4F7,?,00000000,?,00000000,?,0046E6B2,?), ref: 0046E445
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Find$CloseFileNext
                                                    • String ID: YF
                                                    • API String ID: 2066263336-2112587444
                                                    • Opcode ID: 44642d70b14a14687b7361ecc19c5e484dae4317cea6d780876f8d2e879884c3
                                                    • Instruction ID: e575a7226ce51fbf7acaf8d29481eeb492381148b249d1de2fe39cee2facd5be
                                                    • Opcode Fuzzy Hash: 44642d70b14a14687b7361ecc19c5e484dae4317cea6d780876f8d2e879884c3
                                                    • Instruction Fuzzy Hash: C5B13E7490425D9FCF11DFA6C881ADEBBF9FF49304F5081AAE808A3251E7389A46CF55
                                                    APIs
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045425B,?,00000000,0045429B), ref: 004541A1
                                                    Strings
                                                    • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00454124
                                                    • WININIT.INI, xrefs: 004541D0
                                                    • PendingFileRenameOperations, xrefs: 00454140
                                                    • PendingFileRenameOperations2, xrefs: 00454170
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                    • API String ID: 47109696-2199428270
                                                    • Opcode ID: 5a803ebc472e1eef725e3b4469119fc247a957838ae40e6127557b68fa69f4a0
                                                    • Instruction ID: 8ceaccac1fe58e6261fec66e20af0929b63452d54162f6f6a325dab65676f0d5
                                                    • Opcode Fuzzy Hash: 5a803ebc472e1eef725e3b4469119fc247a957838ae40e6127557b68fa69f4a0
                                                    • Instruction Fuzzy Hash: 0051BA30E001189FDB10DF62DC519DEB7B9EFC4348F5085B7F814AB292DB78AA85CA58
                                                    APIs
                                                    • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00463A85
                                                    • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00463AAB
                                                      • Part of subcall function 00463928: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 004639C0
                                                      • Part of subcall function 00463928: DestroyCursor.USER32(00000000), ref: 004639D6
                                                    • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00463B07
                                                    • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00463B2D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Icon$ExtractFileInfo$CursorDestroyDraw
                                                    • String ID: c:\directory
                                                    • API String ID: 2926980410-3984940477
                                                    • Opcode ID: 1a7901e35b7efb8855ed844898b1e62419ded63c9a28a762335ba207438abc47
                                                    • Instruction ID: aebe66bdfd0ec029a936342cabbc8b7a3bf3ec6e1bb74b79e8c64710f921470f
                                                    • Opcode Fuzzy Hash: 1a7901e35b7efb8855ed844898b1e62419ded63c9a28a762335ba207438abc47
                                                    • Instruction Fuzzy Hash: E7416F70640288AFD711DF55DD8AFDEBBE8EB48701F5140A6F904D7382D678EE808B59
                                                    APIs
                                                    • RegDeleteKeyA.ADVAPI32(00000000,?), ref: 0042DC88
                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DE0B,00000000,0042DE23,?,?,?,?,00000006,?,00000000,004921AA), ref: 0042DCA3
                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DCA9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressDeleteHandleModuleProc
                                                    • String ID: RegDeleteKeyExA$advapi32.dll
                                                    • API String ID: 588496660-1846899949
                                                    • Opcode ID: 1ac9f45d9403d68368f5ea09b308c2771ffc131f1d77a79e4eddddbac772e20e
                                                    • Instruction ID: 479eeeb2458f1cbf9b477f45b3eef1c6296245770f751ec8fb172f928072974a
                                                    • Opcode Fuzzy Hash: 1ac9f45d9403d68368f5ea09b308c2771ffc131f1d77a79e4eddddbac772e20e
                                                    • Instruction Fuzzy Hash: 57E06DF0B45230AAD620676B7D4AFA327299B64725F54403BB105A619182FD4C40DE5C
                                                    APIs
                                                    • SetActiveWindow.USER32(?,?,00000000,0047DDE5,?,?,00000001,?), ref: 0047DBE1
                                                    • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 0047DC56
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ActiveChangeNotifyWindow
                                                    • String ID: $Need to restart Windows? %s
                                                    • API String ID: 1160245247-4200181552
                                                    • Opcode ID: b8cedb298b4518fd2632f3de8cb4f215f8d1ae9a9fab7b0f80db3ec08aab2393
                                                    • Instruction ID: ddbf27886554f964f433b7b0acfa1f84a0d1cf1ce5d01c3518e2881561d2d5a4
                                                    • Opcode Fuzzy Hash: b8cedb298b4518fd2632f3de8cb4f215f8d1ae9a9fab7b0f80db3ec08aab2393
                                                    • Instruction Fuzzy Hash: A091B070A142448FCB10EB69D886BDE77F1AF45308F1080BBE8049B366CB78AD09DB5D
                                                    APIs
                                                      • Part of subcall function 0042C6E0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C704
                                                    • GetLastError.KERNEL32(00000000,0046BBC1,?,?,00000001,00497154), ref: 0046BA9E
                                                    • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046BB18
                                                    • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046BB3D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ChangeNotify$ErrorFullLastNamePath
                                                    • String ID: Creating directory: %s
                                                    • API String ID: 2451617938-483064649
                                                    • Opcode ID: 438c93cc4e59c72e084cb6ec96099d3f31c6071ba6bc51e5eba620b81ccc9e35
                                                    • Instruction ID: 122c76eaac7bb317a6cd1b909c33bc1015f76f2e71178b94c8a1bc52660abe90
                                                    • Opcode Fuzzy Hash: 438c93cc4e59c72e084cb6ec96099d3f31c6071ba6bc51e5eba620b81ccc9e35
                                                    • Instruction Fuzzy Hash: 37514274E00258ABDB01DFA5C482BDEB7F5EF08308F50856AE841B7386D7786E44DB99
                                                    APIs
                                                    • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00453876
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,0045393C), ref: 004538E0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressByteCharMultiProcWide
                                                    • String ID: SfcIsFileProtected$sfc.dll
                                                    • API String ID: 2508298434-591603554
                                                    • Opcode ID: 12fa247b779299bd7ba19459dff7a426763f6dedb225ba5dc68fc68448903dce
                                                    • Instruction ID: 8896df26e74b4f53e6f77957fc07a02fe6ad1856ac683947f167e21e68caa71d
                                                    • Opcode Fuzzy Hash: 12fa247b779299bd7ba19459dff7a426763f6dedb225ba5dc68fc68448903dce
                                                    • Instruction Fuzzy Hash: 9D4167B0A042189FEB10DF55DC85B9D77B8AB04346F5041BBB908A7293D7785F48CE5C
                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0045271B,?,?,00000000,00496628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00452672
                                                    • GetLastError.KERNEL32(00000000,00000000,?,00000000,0045271B,?,?,00000000,00496628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045267B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID: .tmp$_3I
                                                    • API String ID: 1375471231-1872390814
                                                    • Opcode ID: 6263e7da38dc712251df72676f2ee857ab2003e645070e4b394e34e858e0385a
                                                    • Instruction ID: 89aaa5dd644a1bfb9c6e4ab11305a67587a6d25824e33790291d603b6c08dcc0
                                                    • Opcode Fuzzy Hash: 6263e7da38dc712251df72676f2ee857ab2003e645070e4b394e34e858e0385a
                                                    • Instruction Fuzzy Hash: 14216575A002089BDB01EFA1C9929DFB7B8EF58305F50457BEC01B7342DA7CAE058AA5
                                                    APIs
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    • RegCloseKey.ADVAPI32(?,00454467,?,00000001,00000000), ref: 0045445A
                                                    Strings
                                                    • PendingFileRenameOperations, xrefs: 0045442C
                                                    • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00454408
                                                    • PendingFileRenameOperations2, xrefs: 0045443B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                    • API String ID: 47109696-2115312317
                                                    • Opcode ID: 092caaa40463e36ba540d88bf9772420b0114a73f918b905d93b2227b4f65ec5
                                                    • Instruction ID: f6b2750a9208994f71abef58e55a78fed862e8850860690132b194e4ac46e676
                                                    • Opcode Fuzzy Hash: 092caaa40463e36ba540d88bf9772420b0114a73f918b905d93b2227b4f65ec5
                                                    • Instruction Fuzzy Hash: C0F062313442046FDB04D6A6EC12B5B73ADD7C5B19FA0446AFC009A682DA79AD48D51C
                                                    APIs
                                                    • GetMenu.USER32(00000000), ref: 004212D1
                                                    • SetMenu.USER32(00000000,00000000), ref: 004212EE
                                                    • SetMenu.USER32(00000000,00000000), ref: 00421323
                                                    • SetMenu.USER32(00000000,00000000), ref: 0042133F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Menu
                                                    • String ID:
                                                    • API String ID: 3711407533-0
                                                    • Opcode ID: 828adb1f4503573b8b19ec7e50c880e5d7ba93b5c851f867c46ca8f401a21855
                                                    • Instruction ID: 658f50d7c39b10a4f0c402205ec9e9078e39c2738942e4c3e39302bb3a71e335
                                                    • Opcode Fuzzy Hash: 828adb1f4503573b8b19ec7e50c880e5d7ba93b5c851f867c46ca8f401a21855
                                                    • Instruction Fuzzy Hash: 7641BE307002645BEB20AA7AA88579B37914F65308F4845BFFC44EF3A7CA7DCC4582AD
                                                    APIs
                                                    • SendMessageA.USER32(?,?,?,?), ref: 00416AF4
                                                    • SetTextColor.GDI32(?,00000000), ref: 00416B0E
                                                    • SetBkColor.GDI32(?,00000000), ref: 00416B28
                                                    • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416B50
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Color$CallMessageProcSendTextWindow
                                                    • String ID:
                                                    • API String ID: 601730667-0
                                                    • Opcode ID: 1d3cbda9518b2ce12e9cd07cc94b211126e19477f7e649d954dcb8d793c07e3f
                                                    • Instruction ID: c000e8b01db0500dd6874d208778bcf8efa3d9016d5589f965051e8255cd057a
                                                    • Opcode Fuzzy Hash: 1d3cbda9518b2ce12e9cd07cc94b211126e19477f7e649d954dcb8d793c07e3f
                                                    • Instruction Fuzzy Hash: 74115EB2604604AFC710EE6ECC84E8777ECEF49710B15886BB55ADB652C638FC418B79
                                                    APIs
                                                    • EnumWindows.USER32(0042398C), ref: 00423A18
                                                    • GetWindow.USER32(?,00000003), ref: 00423A2D
                                                    • GetWindowLongA.USER32(?,000000EC), ref: 00423A3C
                                                    • SetWindowPos.USER32(00000000,004240CC,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,0042411B,?,?,00423CE3), ref: 00423A72
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$EnumLongWindows
                                                    • String ID:
                                                    • API String ID: 4191631535-0
                                                    • Opcode ID: d0e2bd5a937db86739a19ca1d462c84c022c2c43b76c8e87a4892cc6c9f09a09
                                                    • Instruction ID: 335c349655b4e4ce664b27c97d7ab575fba50449cb033fde685ace27ceb71c75
                                                    • Opcode Fuzzy Hash: d0e2bd5a937db86739a19ca1d462c84c022c2c43b76c8e87a4892cc6c9f09a09
                                                    • Instruction Fuzzy Hash: 91115A70700610ABDB10EF68DC85F5A77E8EB08725F11026AF9A4AB2E2C37CDC40CB58
                                                    APIs
                                                    • 73A1A570.USER32(00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 0042308E
                                                    • EnumFontsA.GDI32(00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 004230A1
                                                    • 73A24620.GDI32(00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230A9
                                                    • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230B4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: A24620A480A570EnumFonts
                                                    • String ID:
                                                    • API String ID: 2630238358-0
                                                    • Opcode ID: 0130a543140e80f2b9f86b8e83a342749db33d5760528b3305e50fe7c2cc1c24
                                                    • Instruction ID: 4d68480f6d607538855b0f171b38ffa839f5ce6e0578d669e72114bdc8101102
                                                    • Opcode Fuzzy Hash: 0130a543140e80f2b9f86b8e83a342749db33d5760528b3305e50fe7c2cc1c24
                                                    • Instruction Fuzzy Hash: 0601D2616053002AE700BF6A5C82B9B37649F00709F40027BF804AF2C7D6BE9805476E
                                                    APIs
                                                    • GlobalHandle.KERNEL32 ref: 00406287
                                                    • GlobalUnWire.KERNEL32(00000000), ref: 0040628E
                                                    • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                                    • GlobalFix.KERNEL32(00000000), ref: 00406299
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocHandleWire
                                                    • String ID:
                                                    • API String ID: 2210401237-0
                                                    • Opcode ID: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                    • Instruction ID: ad050c8fb554795a0ca7e59246f03ac17dd57b6c6051e6027a9978793207e39e
                                                    • Opcode Fuzzy Hash: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                    • Instruction Fuzzy Hash: A0B009C5814A05B9EC0833B24C0BD3F141CD88072C3808A6FB458BA1839C7C9C402A3D
                                                    APIs
                                                      • Part of subcall function 00450088: SetEndOfFile.KERNEL32(?,?,0045AA1E,00000000,0045ABA9,?,00000000,00000002,00000002), ref: 0045008F
                                                    • FlushFileBuffers.KERNEL32(?), ref: 0045AB75
                                                    Strings
                                                    • NumRecs range exceeded, xrefs: 0045AA72
                                                    • EndOffset range exceeded, xrefs: 0045AAA9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: File$BuffersFlush
                                                    • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                    • API String ID: 3593489403-659731555
                                                    • Opcode ID: 45702785fcaad4fc86f292ea6daa3e91028922980440eb0c45f0e96b53753725
                                                    • Instruction ID: 49fd1ead36e8c92626c0d22f3e04e342ae71ee3369d077df08b87a69a2b16800
                                                    • Opcode Fuzzy Hash: 45702785fcaad4fc86f292ea6daa3e91028922980440eb0c45f0e96b53753725
                                                    • Instruction Fuzzy Hash: 68617334A002588FDB24DF25C881BDAB7B5EF49305F0085EAED889B352D674AEC9CF55
                                                    APIs
                                                      • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,004933CE), ref: 0040334B
                                                      • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,004933CE), ref: 00403356
                                                      • Part of subcall function 00409AE8: 6F571CD0.COMCTL32(004933DD), ref: 00409AE8
                                                      • Part of subcall function 004108C4: GetCurrentThreadId.KERNEL32 ref: 00410912
                                                      • Part of subcall function 00418FB0: GetVersion.KERNEL32(004933F1), ref: 00418FB0
                                                      • Part of subcall function 0044F178: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00493405), ref: 0044F1B3
                                                      • Part of subcall function 0044F178: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F1B9
                                                      • Part of subcall function 0044F55C: GetVersionExA.KERNEL32(00496780,0049340A), ref: 0044F56B
                                                      • Part of subcall function 00451DF8: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451E91,?,?,?,?,00000000,?,00493414), ref: 00451E18
                                                      • Part of subcall function 00451DF8: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451E1E
                                                      • Part of subcall function 00451DF8: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451E91,?,?,?,?,00000000,?,00493414), ref: 00451E32
                                                      • Part of subcall function 00451DF8: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451E38
                                                      • Part of subcall function 00460EAC: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00493428), ref: 00460EBB
                                                      • Part of subcall function 00460EAC: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00460EC1
                                                      • Part of subcall function 00468C50: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 00468C65
                                                      • Part of subcall function 004741B0: GetModuleHandleA.KERNEL32(kernel32.dll,?,00493432), ref: 004741B6
                                                      • Part of subcall function 004741B0: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 004741C3
                                                      • Part of subcall function 004741B0: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 004741D3
                                                      • Part of subcall function 00490528: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00490541
                                                    • SetErrorMode.KERNEL32(00000001,00000000,0049347A), ref: 0049344C
                                                      • Part of subcall function 004931D0: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00493456,00000001,00000000,0049347A), ref: 004931DA
                                                      • Part of subcall function 004931D0: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 004931E0
                                                      • Part of subcall function 00424444: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424463
                                                      • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                    • ShowWindow.USER32(?,00000005,00000000,0049347A), ref: 004934BD
                                                      • Part of subcall function 0047D1E8: SetActiveWindow.USER32(?), ref: 0047D28C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF571FormatLibraryLineLoadMessageModeRegisterSendShowTextThread
                                                    • String ID: Setup
                                                    • API String ID: 4109318208-3839654196
                                                    • Opcode ID: d3a37ac55464a92d5c3180e2391cfe32e831f1214d6bcb595b262488175d9ea6
                                                    • Instruction ID: 3d51f83f2601650cc24143c780a79562174cd2469de45517b10a3a5e7dee0329
                                                    • Opcode Fuzzy Hash: d3a37ac55464a92d5c3180e2391cfe32e831f1214d6bcb595b262488175d9ea6
                                                    • Instruction Fuzzy Hash: 6731D6312146409FD701BBBBAC135193BA4EB8A72D7A2447FF804C2563DE3D5D54896E
                                                    APIs
                                                    • CreateProcessA.KERNEL32(00000000,00000000,?,?,dE,00000000,004564D0,?,?,?,00000000,0045146A,?,?,?,00000001), ref: 00451444
                                                    • GetLastError.KERNEL32(00000000,00000000,?,?,dE,00000000,004564D0,?,?,?,00000000,0045146A,?,?,?,00000001), ref: 0045144C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CreateErrorLastProcess
                                                    • String ID: dE
                                                    • API String ID: 2919029540-3809906464
                                                    • Opcode ID: 593608dd5432025e5c10579cc54da45850a235723a39842afc18d8064d6d1a21
                                                    • Instruction ID: 6a74b67a3bdf66ca54efcfc0657381ecd904da166113fafb2436bbcb0ae12e28
                                                    • Opcode Fuzzy Hash: 593608dd5432025e5c10579cc54da45850a235723a39842afc18d8064d6d1a21
                                                    • Instruction Fuzzy Hash: E1117972600208AF8B00DEA9DC41EDFB7ECEB4D310B114566FD18D3212D638AD15CBA4
                                                    APIs
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,00477A5E,00000000,00477A74,?,?,?,?,00000000), ref: 0047783A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID: RegisteredOrganization$RegisteredOwner
                                                    • API String ID: 3535843008-1113070880
                                                    • Opcode ID: 92582ed20f2489815259e80cf8d6125947c328d81e960ec0f0fcf28b5f71f636
                                                    • Instruction ID: d6f64f009a97bb626499a380770af655c9c2ca03171b50a22454bea1df32e0e3
                                                    • Opcode Fuzzy Hash: 92582ed20f2489815259e80cf8d6125947c328d81e960ec0f0fcf28b5f71f636
                                                    • Instruction Fuzzy Hash: 37F02B30B0C2446FDF00E665DC92BAB775AD740308FA4807BE5089B341C678AD01D75C
                                                    APIs
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 004231B9
                                                    • LoadCursorA.USER32(00000000,00000000), ref: 004231E3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CursorLoad
                                                    • String ID: EI
                                                    • API String ID: 3238433803-1715459816
                                                    • Opcode ID: cf7d116e50ce189f5790faa080c989bb411d79830bfeb1cde74da96b9f6355ff
                                                    • Instruction ID: e763212e35d88e91f52bf3e5ce882ef76e84b1945e438db40d164ba05c470673
                                                    • Opcode Fuzzy Hash: cf7d116e50ce189f5790faa080c989bb411d79830bfeb1cde74da96b9f6355ff
                                                    • Instruction Fuzzy Hash: 1DF0A7117001145BD620593E6CC1D3A72688F87736B61033BFE2AD72D1C62E2D51426D
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047128F), ref: 0047107D
                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047128F), ref: 00471094
                                                      • Part of subcall function 004520A4: GetLastError.KERNEL32(00000000,00452B15,00000005,00000000,00452B4A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00492C51,00000000), ref: 004520A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateErrorFileHandleLast
                                                    • String ID: CreateFile
                                                    • API String ID: 2528220319-823142352
                                                    • Opcode ID: 8c646f7d68d64cd9faa450377244fa0e0114e1c76f22dd170fcd2adea2132ad7
                                                    • Instruction ID: 784f602bcd0ac41552675a693b23a3fdc118bd0a005798cd27afad425636cabb
                                                    • Opcode Fuzzy Hash: 8c646f7d68d64cd9faa450377244fa0e0114e1c76f22dd170fcd2adea2132ad7
                                                    • Instruction Fuzzy Hash: 2EE065342403447FDA10E679CCC6F4577989B04728F10C152F6446F3E2C5B5EC808658
                                                    APIs
                                                    • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,TqI,00000004,00000001,?,0046B461,?,?,00000000,0046B5F7,?,_is1,?), ref: 0046AE3F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID: NoModify$TqI
                                                    • API String ID: 3702945584-2484388882
                                                    • Opcode ID: 878d98948406c1680fea418170683e592ae80c251ea7f8d0105b235234bde7f4
                                                    • Instruction ID: b631ca34beafd88e5092584286cf6b85e0aa3f7fc8f15a2c822d6072bc6c4a9a
                                                    • Opcode Fuzzy Hash: 878d98948406c1680fea418170683e592ae80c251ea7f8d0105b235234bde7f4
                                                    • Instruction Fuzzy Hash: BEE04FB0640704BFEB04DB55DD4AF6B77ACDB48750F104059BA04AB281E675FE00CA69
                                                    APIs
                                                      • Part of subcall function 0042E1F0: SetErrorMode.KERNEL32(00008000), ref: 0042E1FA
                                                      • Part of subcall function 0042E1F0: LoadLibraryA.KERNEL32(00000000,00000000,0042E244,?,00000000,0042E262,?,00008000), ref: 0042E229
                                                    • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 00468C65
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressErrorLibraryLoadModeProc
                                                    • String ID: SHPathPrepareForWriteA$shell32.dll
                                                    • API String ID: 2492108670-2683653824
                                                    • Opcode ID: c0afff7d1057892895078773578216f882e66cea4a59f9e14efa42500ed24cd0
                                                    • Instruction ID: f54d236eaa647a004fc156d77ac0774b12b8f86e94465ae50302f3b70839ea38
                                                    • Opcode Fuzzy Hash: c0afff7d1057892895078773578216f882e66cea4a59f9e14efa42500ed24cd0
                                                    • Instruction Fuzzy Hash: FDB092A064271082CE006BB2584271B22149750744B10C57FB040AA295EE7D88044FBE
                                                    APIs
                                                    • GetSystemMenu.USER32(00000000,00000000,00000000,0047C9D4), ref: 0047C96C
                                                    • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0047C97D
                                                    • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 0047C995
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Menu$Append$System
                                                    • String ID:
                                                    • API String ID: 1489644407-0
                                                    • Opcode ID: db45e507b61adc88edd07b8b5a48ace8e4914970235c14a912b17cba1ed326a9
                                                    • Instruction ID: 87f9d44178769b7bd9fbbd6ea7d735440db0ceea9fbae913df1100d0c2314cfd
                                                    • Opcode Fuzzy Hash: db45e507b61adc88edd07b8b5a48ace8e4914970235c14a912b17cba1ed326a9
                                                    • Instruction Fuzzy Hash: 1331EFB07143441AD710EB3A8CC2BAA7AA49B1131CF50447FB904AB3D3CA7D9808839D
                                                    APIs
                                                    • 74D41520.VERSION(00000000,?,?,?,?), ref: 00451138
                                                    • 74D41500.VERSION(00000000,?,00000000,?,00000000,004511B3,?,00000000,?,?,?,?), ref: 00451165
                                                    • 74D41540.VERSION(?,004511DC,?,?,00000000,?,00000000,?,00000000,004511B3,?,00000000,?,?,?,?), ref: 0045117F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: D41500D41520D41540
                                                    • String ID:
                                                    • API String ID: 2153611984-0
                                                    • Opcode ID: ae97c8c8a0c1eba3379072f8b46b7e7df9da348ac85090545a8034cef28368fb
                                                    • Instruction ID: c2ad28a97d73236a39d00b1522cfa6caf261f6f5eba90309d69346832355d152
                                                    • Opcode Fuzzy Hash: ae97c8c8a0c1eba3379072f8b46b7e7df9da348ac85090545a8034cef28368fb
                                                    • Instruction Fuzzy Hash: 5D219235A00508AFDB01DAA98C41EBFB7FCEB49340F5544BAFD00E3392D6799E058769
                                                    APIs
                                                    • 73A1A570.USER32(00000000,?,00000000,00000000,0044AEC1,?,0047D203,?,?), ref: 0044AE35
                                                    • SelectObject.GDI32(?,00000000), ref: 0044AE58
                                                    • 73A1A480.USER32(00000000,?,0044AE98,00000000,0044AE91,?,00000000,?,00000000,00000000,0044AEC1,?,0047D203,?,?), ref: 0044AE8B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: A480A570ObjectSelect
                                                    • String ID:
                                                    • API String ID: 1230475511-0
                                                    • Opcode ID: 33a430985fda2c74775254ad64c5a54439247a28fe8f2d556e00664fbf2272eb
                                                    • Instruction ID: 233d7bfbdcc25e67ff0a572e229f91d747dfb26028a93c536af8bc2826ebb7c8
                                                    • Opcode Fuzzy Hash: 33a430985fda2c74775254ad64c5a54439247a28fe8f2d556e00664fbf2272eb
                                                    • Instruction Fuzzy Hash: D721B570E84208AFEB01DFA5C841B9F7BB9DB48304F51847AF504A6281C77C9950CB19
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044AB80,?,0047D203,?,?), ref: 0044AB52
                                                    • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044AB65
                                                    • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044AB99
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: DrawText$ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 65125430-0
                                                    • Opcode ID: 145cb60817e1461b02aba970f6a399deb92e78d362c3eca44f3c4fb02434d21d
                                                    • Instruction ID: de988064b5c118741e346c03ff1e8b17db840b4da88b1af59de34c2d8924ec6d
                                                    • Opcode Fuzzy Hash: 145cb60817e1461b02aba970f6a399deb92e78d362c3eca44f3c4fb02434d21d
                                                    • Instruction Fuzzy Hash: D811E6B27446447FE711DAAA8C81D6FB7EDDB88724F10413AF604E7280C6389E018669
                                                    APIs
                                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424382
                                                    • TranslateMessage.USER32(?), ref: 004243FF
                                                    • DispatchMessageA.USER32(?), ref: 00424409
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Message$DispatchPeekTranslate
                                                    • String ID:
                                                    • API String ID: 4217535847-0
                                                    • Opcode ID: 4c72fe453077d3d5441811771d3c73f57da1beb0f02e586e781598996b195a0c
                                                    • Instruction ID: aef1b0206ccdbb2aa8587e86ea6dacd49c82d9c27d6d10fa8c02d352bba97142
                                                    • Opcode Fuzzy Hash: 4c72fe453077d3d5441811771d3c73f57da1beb0f02e586e781598996b195a0c
                                                    • Instruction Fuzzy Hash: 6F11543030432056DA20E665A94179B73D4DFC1B44F80886EF9DD97382D77D9D4987AA
                                                    APIs
                                                    • SetPropA.USER32(00000000,00000000), ref: 004165DA
                                                    • SetPropA.USER32(00000000,00000000), ref: 004165EF
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 00416616
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Prop$Window
                                                    • String ID:
                                                    • API String ID: 3363284559-0
                                                    • Opcode ID: 1fb1b97be76101d9ef08d5d8446c8afc3bbb58054602902757088ffac8a02945
                                                    • Instruction ID: 49560f5f00ee2c9135054c0b38937f4b9f373f0e35015079742173c5fde362c9
                                                    • Opcode Fuzzy Hash: 1fb1b97be76101d9ef08d5d8446c8afc3bbb58054602902757088ffac8a02945
                                                    • Instruction Fuzzy Hash: C3F0BD71701220BBEB10AB599C85FA632DCAB09715F16057ABE09EF286C778DC44C7A8
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 0041EDD4
                                                    • IsWindowEnabled.USER32(?), ref: 0041EDDE
                                                    • EnableWindow.USER32(?,00000000), ref: 0041EE04
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$EnableEnabledVisible
                                                    • String ID:
                                                    • API String ID: 3234591441-0
                                                    • Opcode ID: f1041f771c00274fafaec7c92c8c7bfa6f382932e423aeab5ff933265dcc9458
                                                    • Instruction ID: feef2f1e36016e7b5cf4fb144cadbc7ab6d373431457e94ba2eb74728d462d7d
                                                    • Opcode Fuzzy Hash: f1041f771c00274fafaec7c92c8c7bfa6f382932e423aeab5ff933265dcc9458
                                                    • Instruction Fuzzy Hash: B9E0E5B41003006BD711AF67DC85E57769CBB94314F568437AD0597793EA3ED8418AB8
                                                    APIs
                                                    • SetActiveWindow.USER32(?), ref: 0047D28C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ActiveWindow
                                                    • String ID: InitializeWizard
                                                    • API String ID: 2558294473-2356795471
                                                    • Opcode ID: af45882b7d7f8b5d418edabb2f90c9349030db6fbe48965aff3ca86abb385a29
                                                    • Instruction ID: a2c985359f1e29e78e4af1cc33d1296a421be71b1820f2b6de99b8e74d40efdf
                                                    • Opcode Fuzzy Hash: af45882b7d7f8b5d418edabb2f90c9349030db6fbe48965aff3ca86abb385a29
                                                    • Instruction Fuzzy Hash: 9711A030638200AFD314EB69EC42B5A7BF5EB65724F10417BF808976A2EA79A811C75D
                                                    APIs
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047793A,00000000,00477A74), ref: 00477739
                                                    Strings
                                                    • Software\Microsoft\Windows\CurrentVersion, xrefs: 00477709
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: Software\Microsoft\Windows\CurrentVersion
                                                    • API String ID: 47109696-1019749484
                                                    • Opcode ID: 8d83d48921549b4201cfaa3bf3deab8337b6c6286534ed2fda54c0c7cdfe845f
                                                    • Instruction ID: ec5d787ed5d2ea8468db5f94e0d296ff42eca114fe20b29262099598dc86d331
                                                    • Opcode Fuzzy Hash: 8d83d48921549b4201cfaa3bf3deab8337b6c6286534ed2fda54c0c7cdfe845f
                                                    • Instruction Fuzzy Hash: DCF0A7357081146BDA04A66A5C42B9FA7DDCB84758F60407BF508EB342DABDAE0243EC
                                                    APIs
                                                    • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,00471E52,00497154,?,0046B0C1,?,00000000,0046B5F7,?,_is1), ref: 0046ADDF
                                                    Strings
                                                    • Inno Setup: Setup Version, xrefs: 0046ADDD
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID: Inno Setup: Setup Version
                                                    • API String ID: 3702945584-4166306022
                                                    • Opcode ID: 0bc7f77e07761ceca1d49086a7ead9d7805e57a8e3b46daf9ae4a0c6104b4bd1
                                                    • Instruction ID: f02e899512fbd3bc7b07c23b000334e2aa67050ee719e0e83ad50cbc3e72194a
                                                    • Opcode Fuzzy Hash: 0bc7f77e07761ceca1d49086a7ead9d7805e57a8e3b46daf9ae4a0c6104b4bd1
                                                    • Instruction Fuzzy Hash: 57E092713016043FD710AA2F9C85F6BBBDDDF983A5F10403AB908EB392D978DD4085A9
                                                    APIs
                                                    • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    Strings
                                                    • System\CurrentControlSet\Control\Windows, xrefs: 0042DC6E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID: System\CurrentControlSet\Control\Windows
                                                    • API String ID: 71445658-1109719901
                                                    • Opcode ID: cac79e148e5d1637301d0cd401e0a8768c8b40d51dfb76d9d00be79e5a4099f3
                                                    • Instruction ID: fabb803f5ff523eeab3b7a035bb747b9213277980d9d81731b2bf545c5070290
                                                    • Opcode Fuzzy Hash: cac79e148e5d1637301d0cd401e0a8768c8b40d51dfb76d9d00be79e5a4099f3
                                                    • Instruction Fuzzy Hash: EDD0C772910128BBDB10DA89DC41DF7775DDB59760F54401AFD0497141C1B4EC5197F4
                                                    APIs
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DB70), ref: 0042DA74
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DB70), ref: 0042DAE4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: fe899f6043c7f770a4508ac600d0d0e70af19fa3b1a52c17f713553a047210da
                                                    • Instruction ID: de7305fe23da407263f6a21fe748e6d6d926aae016943a7179aec9e2dd5a457b
                                                    • Opcode Fuzzy Hash: fe899f6043c7f770a4508ac600d0d0e70af19fa3b1a52c17f713553a047210da
                                                    • Instruction Fuzzy Hash: 4F417171E04129AFDF10DF91D891BAFBBB8EB01704F918466E810B7240D778BE04CB99
                                                    APIs
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DDF6,?,?,00000008,00000000,00000000,0042DE23), ref: 0042DD8C
                                                    • RegCloseKey.ADVAPI32(?,0042DDFD,?,00000000,00000000,00000000,00000000,00000000,0042DDF6,?,?,00000008,00000000,00000000,0042DE23), ref: 0042DDF0
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseEnumOpen
                                                    • String ID:
                                                    • API String ID: 1332880857-0
                                                    • Opcode ID: dce1f7cc73d4e3604b9a44f8775a4b97c18346cc185ea4e09b9ad9138ba8798c
                                                    • Instruction ID: 4db75c3f0003ee77c81ad7234f2e5e1b513bc4eba3d2eee43a500da64a91fe5e
                                                    • Opcode Fuzzy Hash: dce1f7cc73d4e3604b9a44f8775a4b97c18346cc185ea4e09b9ad9138ba8798c
                                                    • Instruction Fuzzy Hash: 4931B270F04649AFDB14DFA6DC52BAFBBB9EB48304F90407BE400F7281D6785A01CA29
                                                    APIs
                                                    • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AF52
                                                    • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B0AF,00000000,0040B0C7,?,?,?,00000000), ref: 0040AF63
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindFree
                                                    • String ID:
                                                    • API String ID: 4097029671-0
                                                    • Opcode ID: fdc05ff922620c04b940a3e4bd27e3d44c2643b66f702b11abfad4396d3de249
                                                    • Instruction ID: d0e6d2b3de5701a5b01f0c314f0e154d100cb3f2f79c9d4e2e087994511e300e
                                                    • Opcode Fuzzy Hash: fdc05ff922620c04b940a3e4bd27e3d44c2643b66f702b11abfad4396d3de249
                                                    • Instruction Fuzzy Hash: 7701F7B1704300AFD700EF69DC92E1A77EDDB897187128076F500EB3D0DA799C119669
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 0041EE63
                                                    • 73A25940.USER32(00000000,0041EDC4,00000000,00000000,0041EE80,?,00000000,0041EEB7,?,0042E908,?,00000001), ref: 0041EE69
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: A25940CurrentThread
                                                    • String ID:
                                                    • API String ID: 2655091166-0
                                                    • Opcode ID: b328251ae0892c8a3b7f185b32438ae157af80a37aa78e1151a8addd2e42d252
                                                    • Instruction ID: 6dec67758a4febc774e22da3091525d30ea0c4d8bfc57ce8b44416be19a69247
                                                    • Opcode Fuzzy Hash: b328251ae0892c8a3b7f185b32438ae157af80a37aa78e1151a8addd2e42d252
                                                    • Instruction Fuzzy Hash: C3015B74A04704AFD701CFA6EC11956BBE8E789720B22887BE904D37A0EA385811DE18
                                                    APIs
                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 004518CA
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,004518F0), ref: 004518D2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastMove
                                                    • String ID:
                                                    • API String ID: 55378915-0
                                                    • Opcode ID: 10a17b5f55d8132d355b2be22579e48721c0d02d21db4419b0f25e12a06febb5
                                                    • Instruction ID: 4a908479c274ede1fa612a67027dcf523005e30280c6ec4e7261d6cc76548501
                                                    • Opcode Fuzzy Hash: 10a17b5f55d8132d355b2be22579e48721c0d02d21db4419b0f25e12a06febb5
                                                    • Instruction Fuzzy Hash: B9014971B00304AF9B10FFB99C4259EB7ECDB8832171045BBFC08E3652EA384E048558
                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004513D7), ref: 004513B1
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,004513D7), ref: 004513B9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID:
                                                    • API String ID: 1375471231-0
                                                    • Opcode ID: 7fd9e911900e9a06a0dfd278701c74cc3c46c37c0458817335f085c5dd111093
                                                    • Instruction ID: 9b23b03b90933790c580962e112c838e42041695dbfb4577ddf6274ef4a18e8c
                                                    • Opcode Fuzzy Hash: 7fd9e911900e9a06a0dfd278701c74cc3c46c37c0458817335f085c5dd111093
                                                    • Instruction Fuzzy Hash: 2EF0C871A04708BBEB00EFB5AC516AEB7E8EB09315F5045B7FC04E3A52E6794E148698
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00008000), ref: 0042E1FA
                                                    • LoadLibraryA.KERNEL32(00000000,00000000,0042E244,?,00000000,0042E262,?,00008000), ref: 0042E229
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLibraryLoadMode
                                                    • String ID:
                                                    • API String ID: 2987862817-0
                                                    • Opcode ID: 0102d987cd0908c49357e23cdbf7a47517641d04aa5dfc05fc1f8898bd46d34f
                                                    • Instruction ID: 2bd629673230950b16c4bb4544665cc4d3578012b9e0763c9fae70ecea85f9d4
                                                    • Opcode Fuzzy Hash: 0102d987cd0908c49357e23cdbf7a47517641d04aa5dfc05fc1f8898bd46d34f
                                                    • Instruction Fuzzy Hash: 31F08270714744FEDF019F779C6282BBBECE74DB1479249B6F800A2691E63C5810C939
                                                    APIs
                                                    • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,0046C175,?,00000000), ref: 0045006A
                                                    • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,0046C175,?,00000000), ref: 00450072
                                                      • Part of subcall function 0044FE10: GetLastError.KERNEL32(0044FC2C,0044FED2,?,00000000,?,00492778,00000001,00000000,00000002,00000000,004928D9,?,?,00000005,00000000,0049290D), ref: 0044FE13
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$FilePointer
                                                    • String ID:
                                                    • API String ID: 1156039329-0
                                                    • Opcode ID: f7b6d91780900016932261e5b31036d83abc2770e31421f62e2bd79437fa69ba
                                                    • Instruction ID: 619d70630f7d728e19568b0c26e44efacd411b086580920acadf97a9c9154113
                                                    • Opcode Fuzzy Hash: f7b6d91780900016932261e5b31036d83abc2770e31421f62e2bd79437fa69ba
                                                    • Instruction Fuzzy Hash: F9E012B53042016BEB10EAA5A9C1F3B23DCEF44715F10447EB944CF183D674CC054B69
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Virtual$AllocFree
                                                    • String ID:
                                                    • API String ID: 2087232378-0
                                                    • Opcode ID: ac11951010fca1e09d027c43c8ed5b4b578696c80165eb8de0d03b95ec4bb515
                                                    • Instruction ID: 1d7fc67d8943aca9bd8b7424c3d760102f2274f63a1bf98f742a2cdc6a51162d
                                                    • Opcode Fuzzy Hash: ac11951010fca1e09d027c43c8ed5b4b578696c80165eb8de0d03b95ec4bb515
                                                    • Instruction Fuzzy Hash: 28F0A772B0073067EB605A6A4C81F5359C49FC5B94F154076FD0DFF3E9D6B58C0142A9
                                                    APIs
                                                    • SendNotifyMessageA.USER32(00010412,00000496,00002711,00000000), ref: 00479254
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: MessageNotifySend
                                                    • String ID:
                                                    • API String ID: 3556456075-0
                                                    • Opcode ID: cb77da2c6047cd0f6d01f17350b7d5a6ac00d1ec94a7f21fb77f165dc6b0fa50
                                                    • Instruction ID: 2ce2c158a3a296402131e27f755e93f3936b08486eb4d04be9461f9d3ef652ed
                                                    • Opcode Fuzzy Hash: cb77da2c6047cd0f6d01f17350b7d5a6ac00d1ec94a7f21fb77f165dc6b0fa50
                                                    • Instruction Fuzzy Hash: 614143346141009BCB10FF26EC8598A7B99EB94309B65C5B7B8049F367CA3CDD428B9D
                                                    APIs
                                                    • GetSystemDefaultLCID.KERNEL32(00000000,0040867A), ref: 00408563
                                                      • Part of subcall function 00406D54: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406D71
                                                      • Part of subcall function 004084D0: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004964C0,00000001,?,0040859B,?,00000000,0040867A), ref: 004084EE
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: DefaultInfoLoadLocaleStringSystem
                                                    • String ID:
                                                    • API String ID: 1658689577-0
                                                    • Opcode ID: 6e8303e27ed7ddfbf6acd002e5c720f3c58af445dc5c20a44dc96457956c1da1
                                                    • Instruction ID: 74dcf24fece9135f842d9e2340cbc50c81b3ec91f87ebb2824f4d2ce1649f107
                                                    • Opcode Fuzzy Hash: 6e8303e27ed7ddfbf6acd002e5c720f3c58af445dc5c20a44dc96457956c1da1
                                                    • Instruction Fuzzy Hash: E7316375E00109ABCF00EF95C8819EEB7B9FF84314F118577E815BB285E738AE058B98
                                                    APIs
                                                    • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FBA9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: InfoScroll
                                                    • String ID:
                                                    • API String ID: 629608716-0
                                                    • Opcode ID: 50e1310ba0544b59a0555e2be0f3aefd4cf1699031129a7841ddf0d9dd467a2f
                                                    • Instruction ID: 884c2cb002146e47c45dd1875db58eae66db6a4caaf859e9ca4b80fd75174b4c
                                                    • Opcode Fuzzy Hash: 50e1310ba0544b59a0555e2be0f3aefd4cf1699031129a7841ddf0d9dd467a2f
                                                    • Instruction Fuzzy Hash: DD2130716087456FC340DF39D840696BBE4BB48344F148A3EA098C3341D774E99ACBD6
                                                    APIs
                                                      • Part of subcall function 0041EE14: GetCurrentThreadId.KERNEL32 ref: 0041EE63
                                                      • Part of subcall function 0041EE14: 73A25940.USER32(00000000,0041EDC4,00000000,00000000,0041EE80,?,00000000,0041EEB7,?,0042E908,?,00000001), ref: 0041EE69
                                                    • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,004683C6,?,00000000,?,?,004685D3,?,00000000,00468612), ref: 004683AA
                                                      • Part of subcall function 0041EEC8: IsWindow.USER32(8BF0EBFF), ref: 0041EED6
                                                      • Part of subcall function 0041EEC8: EnableWindow.USER32(8BF0EBFF,00000001), ref: 0041EEE5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$A25940CurrentEnablePathPrepareThreadWrite
                                                    • String ID:
                                                    • API String ID: 390483697-0
                                                    • Opcode ID: 2601ccebc8297ec2757cc4d81d7830a92cf499cd8e38382da83f90827a97ed59
                                                    • Instruction ID: 8cedc2f6a71ee69efd2a6275c707bf33ab25025b692428be545e7eededc413c6
                                                    • Opcode Fuzzy Hash: 2601ccebc8297ec2757cc4d81d7830a92cf499cd8e38382da83f90827a97ed59
                                                    • Instruction Fuzzy Hash: 69F0E9B1258300BFE7159B72EC56B1677E8E318B15F51443FF804C66D0EA7A5890C62D
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                    • Instruction ID: f885d1546c0ddadd170268c7727831953bb7ef74118cb9c1630738a499be6481
                                                    • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                    • Instruction Fuzzy Hash: E3F06D70504109EFAF0CCF58D0658AF77A1EF48300B2084AFE60797790D638AE30E798
                                                    APIs
                                                    • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 004164F5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: cdcc0148ce654954751abbafc01dffb42bdee5d1888213000ee0bb92e9214fa3
                                                    • Instruction ID: a44329a4cc8b06b024a2b0eee2fd8d89e642962040674eee811c3e7967e458ca
                                                    • Opcode Fuzzy Hash: cdcc0148ce654954751abbafc01dffb42bdee5d1888213000ee0bb92e9214fa3
                                                    • Instruction Fuzzy Hash: F5F025B2200510AFDB84CF9CD9C0F9373ECEB0C210B0981A6FA08CF24AD220EC108BB0
                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0041495F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                    • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                    • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                    • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,0042CBF0,?,00000001,?,?,00000000,?,0042CC42,00000000,0045162D,00000000,0045164E,?,00000000), ref: 0042CBD3
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: fb728ae1967c572744be537d183b1c2397660519459ab9e6793d4da77068addf
                                                    • Instruction ID: dfed850972a7f4cfed0b3d6ce6ead54829112a593105f6481b619d55be1254e6
                                                    • Opcode Fuzzy Hash: fb728ae1967c572744be537d183b1c2397660519459ab9e6793d4da77068addf
                                                    • Instruction Fuzzy Hash: 1AE06571304708BFD701EB62AC93E5EBBACD745714B914876B400A7651D5B8AE00845C
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0044FF60
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: a92cf0aa8bb23f57ccdc9442b6704fbd4576b7ac5b6e0326e42d432a692528ee
                                                    • Instruction ID: 45ed5e217c844315310d89a20c49d2eff003bfa8467b370b0955f01a950c20be
                                                    • Opcode Fuzzy Hash: a92cf0aa8bb23f57ccdc9442b6704fbd4576b7ac5b6e0326e42d432a692528ee
                                                    • Instruction Fuzzy Hash: 39E0EDA53541583ED240AABCBC52F9767DC9759754F008033B998D7241D4619A158BA8
                                                    APIs
                                                    • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00451E7B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E68F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FormatMessage
                                                    • String ID:
                                                    • API String ID: 1306739567-0
                                                    • Opcode ID: 860b655ccada46b5013a8742cf2038536e52ba062f8b3e277fa769ce81e13b95
                                                    • Instruction ID: 7c82c80d86496392c3130c3e7de8882f0dfcc9e316fc406f93a4df2216b263d5
                                                    • Opcode Fuzzy Hash: 860b655ccada46b5013a8742cf2038536e52ba062f8b3e277fa769ce81e13b95
                                                    • Instruction Fuzzy Hash: 21E026617843112AF23514567C83B7F1A4E83C0B04FE4842B7B00DE3C3DAAEAD09429E
                                                    APIs
                                                    • CreateWindowExA.USER32(00000000,004235EC,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 00406329
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                    • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                                    • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                    • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                                    APIs
                                                    • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DC48
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 4676b834bccda8ccd94f8a4f379db04665fbdc7bc7b85aab9c145464b6c6dbba
                                                    • Instruction ID: 5aa87c08ff8936fcaaa84cf50ff31e6a06e3de0a8084b04fc6442f63f77fe161
                                                    • Opcode Fuzzy Hash: 4676b834bccda8ccd94f8a4f379db04665fbdc7bc7b85aab9c145464b6c6dbba
                                                    • Instruction Fuzzy Hash: BDE07EB2600129AF9B40DE8DDC81EEB37ADAB1D350F404016FA08D7200C2B4EC519BB4
                                                    APIs
                                                    • FindClose.KERNEL32(00000000,000000FF,0046C998,00000000,0046D791,?,00000000,0046D7DA,?,00000000,0046D913,?,00000000,?,00000000), ref: 004536D2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseFind
                                                    • String ID:
                                                    • API String ID: 1863332320-0
                                                    • Opcode ID: 6c698a14110e452aac40b3ababb2ad90c4f5a302b665bd5b0a6769929c4d3364
                                                    • Instruction ID: eca53ef0c4505d94b6e963a585f564cfd6265b0c9c03d819447d58a966c2af15
                                                    • Opcode Fuzzy Hash: 6c698a14110e452aac40b3ababb2ad90c4f5a302b665bd5b0a6769929c4d3364
                                                    • Instruction Fuzzy Hash: 49E065705047004BCB24DF3A848121A7AD15F84321F08C56AAC58CB396E63DC4199616
                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(00490382,?,004903A4,?,?,00000000,00490382,?,?), ref: 0041460B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                    • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                    • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                    • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                    APIs
                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406E8C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: a86332fa630e211a890a26f820a456cfae7ee7da2a92b38f798d74d6102b1500
                                                    • Instruction ID: 5e9ef0cb41ef517b54198f539e7e4457f1ce254f1207c5e451c0fee893fabf4d
                                                    • Opcode Fuzzy Hash: a86332fa630e211a890a26f820a456cfae7ee7da2a92b38f798d74d6102b1500
                                                    • Instruction Fuzzy Hash: 3DD05B763082107AD620A55BAC44DA76BDCCFC5770F11063EB558C71C1D6309C01C675
                                                    APIs
                                                      • Part of subcall function 00423568: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042357D
                                                    • ShowWindow.USER32(004105C0,00000009,?,00000000,0041ED14,004238AA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 004235D7
                                                      • Part of subcall function 00423598: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 004235B4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: InfoParametersSystem$ShowWindow
                                                    • String ID:
                                                    • API String ID: 3202724764-0
                                                    • Opcode ID: 05b12f49588f72d468172bd8f1b82f2cb8bfea04f415fe28581d7e625a87d56b
                                                    • Instruction ID: 6e8deb3ed7ffb4c54c7bf11bddd21d475954711d807402a63cfbe74293682e9f
                                                    • Opcode Fuzzy Hash: 05b12f49588f72d468172bd8f1b82f2cb8bfea04f415fe28581d7e625a87d56b
                                                    • Instruction Fuzzy Hash: 03D05E123812743102107ABB280998B42A84D862AB388043BB54CDB202E91E8A81A1AC
                                                    APIs
                                                    • SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: TextWindow
                                                    • String ID:
                                                    • API String ID: 530164218-0
                                                    • Opcode ID: c34688b727229efcedc1f2997f44e421d28f5fd8d0fc977b3f59e8ef08dab085
                                                    • Instruction ID: a3b20f4c882213fa23ff33249cd178fa67041ba6f44abe22b1f00704e939aabb
                                                    • Opcode Fuzzy Hash: c34688b727229efcedc1f2997f44e421d28f5fd8d0fc977b3f59e8ef08dab085
                                                    • Instruction Fuzzy Hash: 4CD05EE27011702BCB01BBED54C4AC667CC8B8829AB1940BBF918EF257C638CE448398
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,00450CD7,00000000), ref: 0042CC0B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 696c079d1e659a807bafa968d47e5a3e4cea9be412662ea6c9d5bc89f686c2e0
                                                    • Instruction ID: 3d474633da5dc292dd1e9b08acfa0ea7ef8e6560f0837aa6ac70ccb6d2902417
                                                    • Opcode Fuzzy Hash: 696c079d1e659a807bafa968d47e5a3e4cea9be412662ea6c9d5bc89f686c2e0
                                                    • Instruction Fuzzy Hash: 42C08CE03022001A9A1465BF2CC511F42C8891827A3A41F37F53CE32D2D27E88A72428
                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00464010,00000000,00000000,00000000,0000000C,00000000), ref: 004633BC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                    • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                    • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                    • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A834,0040CDE0,?,00000000,?), ref: 00406E45
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 4583f237df22b439ee34a1a79ec62ce4162a2c4c0b032f6043df3341da82d5c7
                                                    • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                    • Opcode Fuzzy Hash: 4583f237df22b439ee34a1a79ec62ce4162a2c4c0b032f6043df3341da82d5c7
                                                    • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                    APIs
                                                    • SetEndOfFile.KERNEL32(?,?,0045AA1E,00000000,0045ABA9,?,00000000,00000002,00000002), ref: 0045008F
                                                      • Part of subcall function 0044FE10: GetLastError.KERNEL32(0044FC2C,0044FED2,?,00000000,?,00492778,00000001,00000000,00000002,00000000,004928D9,?,?,00000005,00000000,0049290D), ref: 0044FE13
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLast
                                                    • String ID:
                                                    • API String ID: 734332943-0
                                                    • Opcode ID: 857a2ef5c33fcabe859aa2781a1519cd0b5291b8658590954683ea0b80d8510a
                                                    • Instruction ID: 5fd336f37560a3562a1f9a64c462d12011a30875c45227d907a3aa1d5a9b5e2e
                                                    • Opcode Fuzzy Hash: 857a2ef5c33fcabe859aa2781a1519cd0b5291b8658590954683ea0b80d8510a
                                                    • Instruction Fuzzy Hash: 35C04C65300110479F00A6BE95C1A1763D95F083063104866BA04CF257D669D8544A18
                                                    APIs
                                                    • SetCurrentDirectoryA.KERNEL32(00000000,?,00492706,00000000,004928D9,?,?,00000005,00000000,0049290D,?,?,00000000), ref: 0040721B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory
                                                    • String ID:
                                                    • API String ID: 1611563598-0
                                                    • Opcode ID: 116f646fca034a371e6a5c157b9d4efecc0deabf7e2bcd6bcee3aaaef58023bf
                                                    • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                    • Opcode Fuzzy Hash: 116f646fca034a371e6a5c157b9d4efecc0deabf7e2bcd6bcee3aaaef58023bf
                                                    • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                    APIs
                                                    • SetErrorMode.KERNEL32(?,0042E269), ref: 0042E25C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: 7fad5ebe009d69c2099675b3e000f1c062c351dec5b4fb3cd432c824ae70c241
                                                    • Instruction ID: b0804e078831a813d9aa2463563e291fc03c9a68ee142e2bda9a21ea894dad8b
                                                    • Opcode Fuzzy Hash: 7fad5ebe009d69c2099675b3e000f1c062c351dec5b4fb3cd432c824ae70c241
                                                    • Instruction Fuzzy Hash: AFB09B7670C600DDB709D6D6745552D63D8D7C47207E145B7F001D2580D93C58004928
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 15102f7382d34fed751781a5022c55e4c44b9a191595ad2a6c0bef55f1a25186
                                                    • Instruction ID: 444a78761fbc6a727879d8c4239369b0bde5fc0390465f01f64749401816922a
                                                    • Opcode Fuzzy Hash: 15102f7382d34fed751781a5022c55e4c44b9a191595ad2a6c0bef55f1a25186
                                                    • Instruction Fuzzy Hash: CDA002756015049ADE04A7A5C849F662298BB44204FC915F971449B092C53C99008E58
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 650ea7e237b6737cc94a3f8aba1f60bdc70ca4e22bfddbabe51001f3615e7197
                                                    • Instruction ID: d201100ca80ec2f8cbfe3f56f823717f17ab321979d0d2a0415f45e630f29b9c
                                                    • Opcode Fuzzy Hash: 650ea7e237b6737cc94a3f8aba1f60bdc70ca4e22bfddbabe51001f3615e7197
                                                    • Instruction Fuzzy Hash: CD518674E042459FDB00EFA9C482AAEBBF5EF49704F5041BEE500A7351DB789E41CB98
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0045C3D8
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 76fbdefa84b6e6646576d37aa534d5687847a51f5d406797e85eb89dfb11de70
                                                    • Instruction ID: 7994756c429da8fd341528b1115bd972bbd87915911d1c28c7d9b705713d9cd5
                                                    • Opcode Fuzzy Hash: 76fbdefa84b6e6646576d37aa534d5687847a51f5d406797e85eb89dfb11de70
                                                    • Instruction Fuzzy Hash: 641163716043089FD700AE55C8C1B4B3795AF8475AF05806AFD589B2C7DB38E848CB6A
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED14,?,004237FF,00423B7C,0041ED14), ref: 0041F352
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: fcc5bb2b52a6c868320fd556f825bdddd6823e0008dba192f27ebe0d5c6033d0
                                                    • Instruction ID: b4617262a153a49870252b9da37c83347ffd54b91452f412ea0f349906787434
                                                    • Opcode Fuzzy Hash: fcc5bb2b52a6c868320fd556f825bdddd6823e0008dba192f27ebe0d5c6033d0
                                                    • Instruction Fuzzy Hash: 361118742407099BC710DF59D881B86FBE5EB983A0B10C53BED688B385D378E945CBA9
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,?,00004000,?,?,?,00001B78,00005B7B,00401973), ref: 00401766
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID:
                                                    • API String ID: 1263568516-0
                                                    • Opcode ID: 09cabece21cf584f7b8116981dfbad3f8653d6c5a4f55eb454a10d9661d4edbc
                                                    • Instruction ID: dd39995c24d96b1f0cd65365fb3acc738aa13d81c460f04ccbda7f03c85f078f
                                                    • Opcode Fuzzy Hash: 09cabece21cf584f7b8116981dfbad3f8653d6c5a4f55eb454a10d9661d4edbc
                                                    • Instruction Fuzzy Hash: 6D01FC766442148FC3109F69DCC0E2677E8D794378F16453EDA85673A1D37A6C018BDC
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,00451C35), ref: 00451C17
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID:
                                                    • API String ID: 1452528299-0
                                                    • Opcode ID: ab3637484c69f1e3a9289275503d70efe7f0fad7bd619f5ef2b617ba719f0b94
                                                    • Instruction ID: 9b046278fcf2f54c8895181bb84fa4e67d3ca0abe95595291a9aaadc5344c142
                                                    • Opcode Fuzzy Hash: ab3637484c69f1e3a9289275503d70efe7f0fad7bd619f5ef2b617ba719f0b94
                                                    • Instruction Fuzzy Hash: 7B017036604248AF8B11DF69AC105EEF7E8EB4932072082B7FC64C3352D7754D05D694
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,0045C3CE), ref: 0045C307
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID:
                                                    • API String ID: 1263568516-0
                                                    • Opcode ID: 1db0cbd719025b65296d728f72a94704870e37dd70070be8469bdcaf82232f5c
                                                    • Instruction ID: 3bb3114e2640d79ee9d1f6c6c170ec04299b672b50bb43f7844af23f30410e64
                                                    • Opcode Fuzzy Hash: 1db0cbd719025b65296d728f72a94704870e37dd70070be8469bdcaf82232f5c
                                                    • Instruction Fuzzy Hash: 6CD0E9B17557045FDF90EE798CC1B0237D8BB48741F5044666D04DB286E674E8048A18
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: ce9819a0c299784ac39983e171dfc3d0d3373cd0e3bd5e96c40e619c76bc7acf
                                                    • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                    • Opcode Fuzzy Hash: ce9819a0c299784ac39983e171dfc3d0d3373cd0e3bd5e96c40e619c76bc7acf
                                                    • Instruction Fuzzy Hash:
                                                    APIs
                                                      • Part of subcall function 0044B038: GetVersionExA.KERNEL32(00000094), ref: 0044B055
                                                    • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F1A9,00493405), ref: 0044B0B3
                                                    • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B0CB
                                                    • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B0DD
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B0EF
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B101
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B113
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B125
                                                    • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B137
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B149
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B15B
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B16D
                                                    • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B17F
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B191
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B1A3
                                                    • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B1B5
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B1C7
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B1D9
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B1EB
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B1FD
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B20F
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B221
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B233
                                                    • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B245
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B257
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B269
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B27B
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B28D
                                                    • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B29F
                                                    • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B2B1
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B2C3
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B2D5
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B2E7
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B2F9
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B30B
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B31D
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B32F
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B341
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B353
                                                    • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B365
                                                    • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B377
                                                    • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B389
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B39B
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B3AD
                                                    • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B3BF
                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B3D1
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B3E3
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B3F5
                                                    • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B407
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoadVersion
                                                    • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                    • API String ID: 1968650500-2910565190
                                                    • Opcode ID: c0b6a7321769edc8054774f6e1a4a7cc645fbf4eca71de10d65dcd89c53b7c41
                                                    • Instruction ID: fe7ec38607b22d39bed663b2d58cef56837bfbcccade8a066643eb3a06087c6f
                                                    • Opcode Fuzzy Hash: c0b6a7321769edc8054774f6e1a4a7cc645fbf4eca71de10d65dcd89c53b7c41
                                                    • Instruction Fuzzy Hash: 3B91E3B0A40B50EFEF00EBF598C6A2636A8EB15B18B15457BB444EF296C778D804CF5D
                                                    APIs
                                                    • GetTickCount.KERNEL32 ref: 00456DF3
                                                    • QueryPerformanceCounter.KERNEL32(021C3858,00000000,00457086,?,?,021C3858,00000000,?,00457782,?,021C3858,00000000), ref: 00456DFC
                                                    • GetSystemTimeAsFileTime.KERNEL32(021C3858,021C3858), ref: 00456E06
                                                    • GetCurrentProcessId.KERNEL32(?,021C3858,00000000,00457086,?,?,021C3858,00000000,?,00457782,?,021C3858,00000000), ref: 00456E0F
                                                    • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00456E85
                                                    • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,021C3858,021C3858), ref: 00456E93
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00494AB0,00000003,00000000,00000000,00000000,00457042), ref: 00456EDB
                                                    • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00457031,?,00000000,C0000000,00000000,00494AB0,00000003,00000000,00000000,00000000,00457042), ref: 00456F14
                                                      • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                                    • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00456FBD
                                                    • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 00456FF3
                                                    • CloseHandle.KERNEL32(000000FF,00457038,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 0045702B
                                                      • Part of subcall function 004520A4: GetLastError.KERNEL32(00000000,00452B15,00000005,00000000,00452B4A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00492C51,00000000), ref: 004520A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                    • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                    • API String ID: 770386003-3271284199
                                                    • Opcode ID: b6c76b490d3448fa98c91db28bbb6e2eed09d21f4a05413548b3143b36593413
                                                    • Instruction ID: 4e99e656643f3ba46170a9d7f6d68e0b425dfb47568c8c04ebee0880f6ffca98
                                                    • Opcode Fuzzy Hash: b6c76b490d3448fa98c91db28bbb6e2eed09d21f4a05413548b3143b36593413
                                                    • Instruction Fuzzy Hash: 23716570A04744AFDB20DB69DC41B5EBBF8AB05705F5084BAF904EB282D7785948CF69
                                                    APIs
                                                    • GetVersion.KERNEL32 ref: 0045B2B6
                                                    • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045B2D6
                                                    • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045B2E3
                                                    • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045B2F0
                                                    • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045B2FE
                                                      • Part of subcall function 0045B1A4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045B243,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045B21D
                                                    • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045B4F1,?,?,00000000), ref: 0045B3B7
                                                    • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045B4F1,?,?,00000000), ref: 0045B3C0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                    • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                    • API String ID: 59345061-4263478283
                                                    • Opcode ID: 1d806d9dda6068bb291ca6d6d76056618574950846b2f0729205e6ddb2b5ae31
                                                    • Instruction ID: c7fa785e835f4f31fbb174cc3c8bee0aea38d4a0e272f0ec20846287379b14aa
                                                    • Opcode Fuzzy Hash: 1d806d9dda6068bb291ca6d6d76056618574950846b2f0729205e6ddb2b5ae31
                                                    • Instruction Fuzzy Hash: 455174B1900608EFDB10DF99C845BEEB7B8EB49315F14806AF904B7382D7789945CFA9
                                                    APIs
                                                    • ShellExecuteEx.SHELL32(0000003C), ref: 00473B3F
                                                    • GetLastError.KERNEL32(?,?), ref: 00473B48
                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00473B95
                                                    • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00473BB9
                                                    • CloseHandle.KERNEL32(00000000,00473BEA,00000000,00000000,000000FF,000000FF,00000000,00473BE3,?,?,?), ref: 00473BDD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseCodeErrorExecuteExitHandleLastMultipleObjectsProcessShellWait
                                                    • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                    • API String ID: 171997614-221126205
                                                    • Opcode ID: bef301a62d8ffc78d5260bcd4c1e1c6eca9441666b75cb640df1e528dc9e9b36
                                                    • Instruction ID: 5f64ea44067129eb5fb12e8a8d15e7f3de330a3afdc31c8232f0dc09076527ee
                                                    • Opcode Fuzzy Hash: bef301a62d8ffc78d5260bcd4c1e1c6eca9441666b75cb640df1e528dc9e9b36
                                                    • Instruction Fuzzy Hash: 4C219570A04204AFDB10EFA989427DE76E8EF04319F50843BF508F7282DB7C9A049B5E
                                                    APIs
                                                    • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422964
                                                    • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422B2E), ref: 00422974
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: MessageSendShowWindow
                                                    • String ID:
                                                    • API String ID: 1631623395-0
                                                    • Opcode ID: 3aa0b6c465d6afcb9065345e62bf86cceb2bb92a21272c728d1d131490a7db7d
                                                    • Instruction ID: 22a298226f26ad5282d2b06c056c5494fcfa573f7ff451a3aba74327ab4f92ef
                                                    • Opcode Fuzzy Hash: 3aa0b6c465d6afcb9065345e62bf86cceb2bb92a21272c728d1d131490a7db7d
                                                    • Instruction Fuzzy Hash: A6917271B04214FFD710EBA9DA86F9D77F4AB09314F5104BAF504AB3A2C778AE409B58
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 00418303
                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 00418320
                                                    • GetWindowRect.USER32(?), ref: 0041833C
                                                    • GetWindowLongA.USER32(?,000000F0), ref: 0041834A
                                                    • GetWindowLongA.USER32(?,000000F8), ref: 0041835F
                                                    • ScreenToClient.USER32(00000000), ref: 00418368
                                                    • ScreenToClient.USER32(00000000,?), ref: 00418373
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                    • String ID: ,
                                                    • API String ID: 2266315723-3772416878
                                                    • Opcode ID: 76ed797ea6865fddbc3593e7458191c6aaa261637689223d055d8f073444f388
                                                    • Instruction ID: 9cf88c6662a8b54f2d940af1896da5675c8924d24fa9a5d7825e36bf04e718ba
                                                    • Opcode Fuzzy Hash: 76ed797ea6865fddbc3593e7458191c6aaa261637689223d055d8f073444f388
                                                    • Instruction Fuzzy Hash: 40112B71505201AFDB00DF69C885F9B77E8AF49314F18067EBD58DB286C739D900CB69
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000028), ref: 00453FDF
                                                    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00453FE5
                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00453FFE
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00454025
                                                    • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045402A
                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 0045403B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                    • String ID: SeShutdownPrivilege
                                                    • API String ID: 107509674-3733053543
                                                    • Opcode ID: aa53b8a4c532a0792c1f16c669ca2df8e9d0d34386d6851673ec589d4a813e21
                                                    • Instruction ID: fefb7ae41868014354d83cb3ae28757c4cdc7dcc71e7b198ec4e0078f4c74e40
                                                    • Opcode Fuzzy Hash: aa53b8a4c532a0792c1f16c669ca2df8e9d0d34386d6851673ec589d4a813e21
                                                    • Instruction Fuzzy Hash: 06F06270694702B5E620AA758C07F6B25989B80F8DF60492ABE45EF1C3D6BCC54C4A2A
                                                    APIs
                                                    • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045B86D
                                                    • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045B87D
                                                    • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045B88D
                                                    • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047A703,00000000,0047A72C), ref: 0045B8B2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$CryptVersion
                                                    • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                    • API String ID: 1951258720-508647305
                                                    • Opcode ID: c3c7ec0b1ce4a4f9ebe2d8e394cd6736047279cae241cd1696ff5e4f0e7e87a0
                                                    • Instruction ID: 302474af057a75e6aa59db1b8817eaeab706bde5883f342fd947c8368cb819cc
                                                    • Opcode Fuzzy Hash: c3c7ec0b1ce4a4f9ebe2d8e394cd6736047279cae241cd1696ff5e4f0e7e87a0
                                                    • Instruction Fuzzy Hash: BFF0F9B0529700DEEB06EF76AC866623699E79032AF14D43BE408961A2D77C0448CF1C
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00492A8E,?,?,00000000,00496628,?,00492C18,00000000,00492C6C,?,?,00000000,00496628), ref: 004929A7
                                                    • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00492A2A
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00492A66,?,00000000,?,00000000,00492A8E,?,?,00000000,00496628,?,00492C18,00000000), ref: 00492A42
                                                    • FindClose.KERNEL32(000000FF,00492A6D,00492A66,?,00000000,?,00000000,00492A8E,?,?,00000000,00496628,?,00492C18,00000000,00492C6C), ref: 00492A60
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FileFind$AttributesCloseFirstNext
                                                    • String ID: isRS-$isRS-???.tmp
                                                    • API String ID: 134685335-3422211394
                                                    • Opcode ID: d27fe0f24193e511b878a758be91fd0c4e23afc2a925b16491bfeb2c94ac3f61
                                                    • Instruction ID: 286ee2ae3c8b56d5374d1ec0bc713cc6e2b4982f587272b7ab9f3fbf4208c44f
                                                    • Opcode Fuzzy Hash: d27fe0f24193e511b878a758be91fd0c4e23afc2a925b16491bfeb2c94ac3f61
                                                    • Instruction Fuzzy Hash: 50317672A00618AFDF24EF65CD41ACEBBBCDB45704F5084B7A808A32A1D7789F458E58
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,?,?,?,00000000,00478C3A,?,00000000,?,00000000,?,00478D7E,00000000,00000000), ref: 004789D5
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00478AE5,?,00000000,?,?,?,?,00000000,00478C3A,?,00000000,?,00000000), ref: 00478AC1
                                                    • FindClose.KERNEL32(000000FF,00478AEC,00478AE5,?,00000000,?,?,?,?,00000000,00478C3A,?,00000000,?,00000000), ref: 00478ADF
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,?,00000000,00478C3A,?,00000000,?,00000000,?,00478D7E,00000000), ref: 00478B38
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Find$File$First$CloseNext
                                                    • String ID:
                                                    • API String ID: 2001080981-0
                                                    • Opcode ID: dd3e2cd766ac024d8eaa81bf20a5480732ec0dcd7530072d2a3cc548768fbdcb
                                                    • Instruction ID: ec7da244fd3c64442450cd76b0dee1e798b5e131759b3d65a5f6c20db64b1892
                                                    • Opcode Fuzzy Hash: dd3e2cd766ac024d8eaa81bf20a5480732ec0dcd7530072d2a3cc548768fbdcb
                                                    • Instruction Fuzzy Hash: 8271317090024DAFCF11EFA5CC85ADFBBB9EF49304F5084AAE508A7291D7399A45CF58
                                                    APIs
                                                    • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 0045587D
                                                    • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004558A4
                                                    • SetForegroundWindow.USER32(?), ref: 004558B5
                                                    • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00455B91,?,00000000,00455BCD), ref: 00455B7C
                                                    Strings
                                                    • Cannot evaluate variable because [Code] isn't running yet, xrefs: 004559FC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                    • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                    • API String ID: 2236967946-3182603685
                                                    • Opcode ID: 2bcc1b55d6ffa11ee2676675ab3981d64c04d517d945df6db30af2a5866b01ec
                                                    • Instruction ID: f00b899aaf274aee1d0f63a404ccf5120499af0da06c553b9c46179b69f9856b
                                                    • Opcode Fuzzy Hash: 2bcc1b55d6ffa11ee2676675ab3981d64c04d517d945df6db30af2a5866b01ec
                                                    • Instruction Fuzzy Hash: 8A91EF34604644EFD715CF64D965F6ABBF9EB48304F2180BAEC08A7792C639AE04CB58
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,0045492C), ref: 00454828
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045482E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                    • API String ID: 1646373207-3712701948
                                                    • Opcode ID: d491fdd5e24eb87a10d5c350d9ea1795cabf35363bd3c96444d5558f94b4467f
                                                    • Instruction ID: 4ed4d427c84f2e0797dfbcbbf1775a844099e9a297d380e2836bd8fb6971dfff
                                                    • Opcode Fuzzy Hash: d491fdd5e24eb87a10d5c350d9ea1795cabf35363bd3c96444d5558f94b4467f
                                                    • Instruction Fuzzy Hash: DA316275A04249AFCF01EFA5C8829EFB7B8EF89704F504567E800F7252D6385D098B68
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 00417C7F
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417C9D
                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 00417CD3
                                                    • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417CFA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$Placement$Iconic
                                                    • String ID: ,
                                                    • API String ID: 568898626-3772416878
                                                    • Opcode ID: 19f72ce89b61f3f302f2e8992f4a8506be845e6c48e785995f7b223ecf28f406
                                                    • Instruction ID: c7e48a005123f112bfb3c773aae920d88014dc0855fb7fe4f04d55f6c4297c8c
                                                    • Opcode Fuzzy Hash: 19f72ce89b61f3f302f2e8992f4a8506be845e6c48e785995f7b223ecf28f406
                                                    • Instruction Fuzzy Hash: 92213E71604204ABCF00EF69D8C4ADA77B8AF48314F11456AFD18DF346D678E984CBA8
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001,00000000,00460751), ref: 004605C5
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00460724,?,00000001,00000000,00460751), ref: 00460654
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00460706,?,00000000,?,00000000,00460724,?,00000001,00000000,00460751), ref: 004606E6
                                                    • FindClose.KERNEL32(000000FF,0046070D,00460706,?,00000000,?,00000000,00460724,?,00000001,00000000,00460751), ref: 00460700
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseErrorFirstModeNext
                                                    • String ID:
                                                    • API String ID: 4011626565-0
                                                    • Opcode ID: e9aa4447d405474a5b50f441922a0ec815d45731ae3b1b238bebb02588d32da7
                                                    • Instruction ID: f78dcee57c625dac1728093300786459247b71741faca452f92d1a4d7efbbe15
                                                    • Opcode Fuzzy Hash: e9aa4447d405474a5b50f441922a0ec815d45731ae3b1b238bebb02588d32da7
                                                    • Instruction Fuzzy Hash: D941B970A006189FDB11EF65DC85ADFB7B8EB88705F5044BAF804E7391D63C9E488E59
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001,00000000,00460BF7), ref: 00460A85
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00460BC2,?,00000001,00000000,00460BF7), ref: 00460ACB
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00460BA4,?,00000000,?,00000000,00460BC2,?,00000001,00000000,00460BF7), ref: 00460B80
                                                    • FindClose.KERNEL32(000000FF,00460BAB,00460BA4,?,00000000,?,00000000,00460BC2,?,00000001,00000000,00460BF7), ref: 00460B9E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseErrorFirstModeNext
                                                    • String ID:
                                                    • API String ID: 4011626565-0
                                                    • Opcode ID: e7e7782e2cfbf1928a8974a2d821f38d0fe83eaae54047f84741830c9e42e91f
                                                    • Instruction ID: c4fca8719043302f1557867009f5b54629f0d04ae6016422a46977757255b98a
                                                    • Opcode Fuzzy Hash: e7e7782e2cfbf1928a8974a2d821f38d0fe83eaae54047f84741830c9e42e91f
                                                    • Instruction Fuzzy Hash: D7417631A00618DFCB10EFA5DC859DFB7B8EB88709F5085A6F804A7341E7789E448E59
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00451B47,00000000,00451B68), ref: 0042E6FE
                                                    • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E729
                                                    • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00451B47,00000000,00451B68), ref: 0042E736
                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00451B47,00000000,00451B68), ref: 0042E73E
                                                    • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00451B47,00000000,00451B68), ref: 0042E744
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                    • String ID:
                                                    • API String ID: 1177325624-0
                                                    • Opcode ID: b398f5f594d3ce364fdf5cd670d1d6f1cfc7debce29cf4bfe02d4251d0372630
                                                    • Instruction ID: 405047736e0f3db58adf1e262a5124b738154ad7abc3b976f47152011cf6baa3
                                                    • Opcode Fuzzy Hash: b398f5f594d3ce364fdf5cd670d1d6f1cfc7debce29cf4bfe02d4251d0372630
                                                    • Instruction Fuzzy Hash: 12F0F0713917207AF620B1BA6CC6F7B018CC7C5B68F10823ABB04FF1C1D9A84C06056D
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 0047E222
                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 0047E240
                                                    • ShowWindow.USER32(00000000,00000005,00000000,000000F0,00497030,0047DA6E,0047DAA2,00000000,0047DAC2,?,?,00000001,00497030), ref: 0047E262
                                                    • ShowWindow.USER32(00000000,00000000,00000000,000000F0,00497030,0047DA6E,0047DAA2,00000000,0047DAC2,?,?,00000001,00497030), ref: 0047E276
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$IconicLong
                                                    • String ID:
                                                    • API String ID: 2754861897-0
                                                    • Opcode ID: f6c937e62bd4f7f33b8cff1129e0ff9e0c9ea1576419266ffb873d417130a402
                                                    • Instruction ID: 3d8de8e7dbf3304b0e4a2ade7d6fc44ae688e9bf26f9cdb75b037e63c213fef1
                                                    • Opcode Fuzzy Hash: f6c937e62bd4f7f33b8cff1129e0ff9e0c9ea1576419266ffb873d417130a402
                                                    • Instruction Fuzzy Hash: 3D017130625200DAEB00E776DC85B9A339E7B19344F0546FBF9059B3A3CA2D9C51974C
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,0045F0DC), ref: 0045F060
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0045F0BC,?,00000000,?,00000000,0045F0DC), ref: 0045F09C
                                                    • FindClose.KERNEL32(000000FF,0045F0C3,0045F0BC,?,00000000,?,00000000,0045F0DC), ref: 0045F0B6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNext
                                                    • String ID:
                                                    • API String ID: 3541575487-0
                                                    • Opcode ID: a40eba35bb65dfb44c555e969f67fc14cbfb519c76f94d808e63bdf78c063d01
                                                    • Instruction ID: 68591aebe15be66c02bfe18b1190825c6ab69d9b7e21385b208dddf45066949f
                                                    • Opcode Fuzzy Hash: a40eba35bb65dfb44c555e969f67fc14cbfb519c76f94d808e63bdf78c063d01
                                                    • Instruction Fuzzy Hash: 6D21DB315047086EDB11EB65CC41ADEBBACDB49714F5484F7BC08D35E3E6389E4C895A
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 00424154
                                                    • SetActiveWindow.USER32(?,?,?,00468BB4), ref: 00424161
                                                      • Part of subcall function 004235BC: ShowWindow.USER32(004105C0,00000009,?,00000000,0041ED14,004238AA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 004235D7
                                                      • Part of subcall function 00423A84: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021C25AC,0042417A,?,?,?,00468BB4), ref: 00423ABF
                                                    • SetFocus.USER32(00000000,?,?,?,00468BB4), ref: 0042418E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveFocusIconicShow
                                                    • String ID:
                                                    • API String ID: 649377781-0
                                                    • Opcode ID: bf39fc93c20dd362814a915e3816c2be519e9f0d9e4d58152530bfc1c9f789b4
                                                    • Instruction ID: 4136aac35a779e4733478972a6ab5bc4469f39141bd8f2cff661810d574da02b
                                                    • Opcode Fuzzy Hash: bf39fc93c20dd362814a915e3816c2be519e9f0d9e4d58152530bfc1c9f789b4
                                                    • Instruction Fuzzy Hash: 3EF03A717001208BDB40AFAA98C4B9633A8AF48304B55017BBD09EF34BCA7CDC5187A8
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 00417C7F
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417C9D
                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 00417CD3
                                                    • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417CFA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$Placement$Iconic
                                                    • String ID:
                                                    • API String ID: 568898626-0
                                                    • Opcode ID: 91503c347088ab1b31e476b4b3d9f425598c28f238555375b1126184f5575d32
                                                    • Instruction ID: f0313cfea0d4087130c3a657ee055cc65a4736f61d4b278e94d42609036002a6
                                                    • Opcode Fuzzy Hash: 91503c347088ab1b31e476b4b3d9f425598c28f238555375b1126184f5575d32
                                                    • Instruction Fuzzy Hash: 31015A31204104ABDF10EE6A98C5EEA73A8AF44324F114166FD08CF342E638EC8086A8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CaptureIconic
                                                    • String ID:
                                                    • API String ID: 2277910766-0
                                                    • Opcode ID: af1c5b43412e2fcaa88ec6dbe6a8b705b794b180b560b7f19973f3177c796014
                                                    • Instruction ID: 516534a0d685a41b5289b303ed97122a4deaa6af678778b669afb1f0a2bf06d6
                                                    • Opcode Fuzzy Hash: af1c5b43412e2fcaa88ec6dbe6a8b705b794b180b560b7f19973f3177c796014
                                                    • Instruction Fuzzy Hash: 80F04471B04602A7DB20E72EC8C5AA762F69F44394B54443FF415C7B96EA7CDCC48758
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 0042410B
                                                      • Part of subcall function 004239F4: EnumWindows.USER32(0042398C), ref: 00423A18
                                                      • Part of subcall function 004239F4: GetWindow.USER32(?,00000003), ref: 00423A2D
                                                      • Part of subcall function 004239F4: GetWindowLongA.USER32(?,000000EC), ref: 00423A3C
                                                      • Part of subcall function 004239F4: SetWindowPos.USER32(00000000,004240CC,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,0042411B,?,?,00423CE3), ref: 00423A72
                                                    • SetActiveWindow.USER32(?,?,?,00423CE3,00000000,004240CC), ref: 0042411F
                                                      • Part of subcall function 004235BC: ShowWindow.USER32(004105C0,00000009,?,00000000,0041ED14,004238AA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 004235D7
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveEnumIconicLongShowWindows
                                                    • String ID:
                                                    • API String ID: 2671590913-0
                                                    • Opcode ID: 42e4936c4a6647b65b5ab24117e0ac4ae5d8008d356746b3415a205c164669c5
                                                    • Instruction ID: b8e4b42960b6b3797255afb6d30997fccd36cf0c86298b6f3b138aeb4614201e
                                                    • Opcode Fuzzy Hash: 42e4936c4a6647b65b5ab24117e0ac4ae5d8008d356746b3415a205c164669c5
                                                    • Instruction Fuzzy Hash: 76E0E5A0300100C7EB00AFAAD8C9B9672A9BB48304F5501BABC08CF24BD6B8C8948724
                                                    APIs
                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,00412745), ref: 00412733
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: ccb3f07b2fee23e1b7d0b9fe211690240d667b5ade3c407fcf90e85793529408
                                                    • Instruction ID: 7676943622bfa1b87a175b7a8473920ed7b4936c8d574fb73453cf2521b2b913
                                                    • Opcode Fuzzy Hash: ccb3f07b2fee23e1b7d0b9fe211690240d667b5ade3c407fcf90e85793529408
                                                    • Instruction Fuzzy Hash: 5751D3356042059FC710DF5AD681A9BF3E5FF98304B3582ABE814C73A5D6B8AD92874C
                                                    APIs
                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0047419E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: 6c102dadd2193fa11663d1c7ca86bcbe0d2c13f3add75be133b62a74dbff0454
                                                    • Instruction ID: 0e0c1c6a3bad45fc63358d99e520748e4574e8c08e3966a9e663ff0580da8127
                                                    • Opcode Fuzzy Hash: 6c102dadd2193fa11663d1c7ca86bcbe0d2c13f3add75be133b62a74dbff0454
                                                    • Instruction Fuzzy Hash: 85415935604104DFDB10DF99CA848AAF7F5EB98310BA4C992E84CDB741D338EE81DB98
                                                    APIs
                                                    • ArcFourCrypt._ISCRYPT(?,?,?,00469CDC,?,?,00469CDC,00000000), ref: 0045B923
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CryptFour
                                                    • String ID:
                                                    • API String ID: 2153018856-0
                                                    • Opcode ID: 2fd5046d53dc597d3e4d98d458f148574003c2ec4f4f0757a2eee833ca150b3b
                                                    • Instruction ID: 2225761bf594105b04891f9a979b45a9a4731abcd3a6ed3030aefe2a2354edc5
                                                    • Opcode Fuzzy Hash: 2fd5046d53dc597d3e4d98d458f148574003c2ec4f4f0757a2eee833ca150b3b
                                                    • Instruction Fuzzy Hash: C7C09BF601420CBF65005795ECC9CB7F75CE6586647408126F6044210195716C108674
                                                    APIs
                                                    • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046994F), ref: 0045B936
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CryptFour
                                                    • String ID:
                                                    • API String ID: 2153018856-0
                                                    • Opcode ID: c27a93e1bdfdde7edc9fcc879cc72405f18f208b3af26568a1f388ef4ce3250e
                                                    • Instruction ID: 96b9a57d22d70392ad1d1cde2f2ee6f5b4e57433d8ae25836dc8224d98b85447
                                                    • Opcode Fuzzy Hash: c27a93e1bdfdde7edc9fcc879cc72405f18f208b3af26568a1f388ef4ce3250e
                                                    • Instruction Fuzzy Hash: A7A002B0A94300BAFD2157605D0EF67262C97D0F15F2084657201A91D085A46400C63C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2907270234.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000001.00000002.2907255285.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000001.00000002.2907283565.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_10000000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                    • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                    • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                    • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2907270234.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000001.00000002.2907255285.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000001.00000002.2907283565.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_10000000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                    • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                    • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                    • Instruction Fuzzy Hash:
                                                    APIs
                                                    • CreateMutexA.KERNEL32(00494AA4,00000001,00000000,00000000,004568ED,?,?,?,00000001,?,00456B07,00000000,00456B1D,?,00000000,00496628), ref: 00456605
                                                    • CreateFileMappingA.KERNEL32(000000FF,00494AA4,00000004,00000000,00002018,00000000), ref: 0045663D
                                                    • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,004568C3,?,00494AA4,00000001,00000000,00000000,004568ED,?,?,?), ref: 00456664
                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00456771
                                                    • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,004568C3,?,00494AA4,00000001,00000000,00000000,004568ED), ref: 004566C9
                                                      • Part of subcall function 004520A4: GetLastError.KERNEL32(00000000,00452B15,00000005,00000000,00452B4A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00492C51,00000000), ref: 004520A7
                                                    • CloseHandle.KERNEL32(00456B07,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00456788
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00456B07,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004567C1
                                                    • GetLastError.KERNEL32(00000000,000000FF,00456B07,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004567D3
                                                    • UnmapViewOfFile.KERNEL32(00000000,004568CA,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004568A5
                                                    • CloseHandle.KERNEL32(00000000,004568CA,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004568B4
                                                    • CloseHandle.KERNEL32(00000000,004568CA,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004568BD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateFileHandle$ErrorLastMutexView$MappingObjectProcessReleaseSingleUnmapWait
                                                    • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetProcAddress$LoadLibrary$MapViewOfFile$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d$ReleaseMutex$Spawning _RegDLL.tmp$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp
                                                    • API String ID: 4012871263-351310198
                                                    • Opcode ID: 2277cdb629d250e29f1b44ce90838d0d91dc40814d37f299759e78da10b3b726
                                                    • Instruction ID: 980461e75233d27168dbefb0458f3d7e1823a55311cdbdb2a0391f25a35d7111
                                                    • Opcode Fuzzy Hash: 2277cdb629d250e29f1b44ce90838d0d91dc40814d37f299759e78da10b3b726
                                                    • Instruction Fuzzy Hash: 32918170E002159FDB10EBA9C845B9EB7B4EF48305F91856BF914EB382DB789908CF59
                                                    APIs
                                                    • GetVersion.KERNEL32(?,00418F60,00000000,?,?,?,00000001), ref: 0041F096
                                                    • SetErrorMode.KERNEL32(00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0B2
                                                    • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0BE
                                                    • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0CC
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F0FC
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F125
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F13A
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F14F
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F164
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F179
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F18E
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F1A3
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F1B8
                                                    • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F1CD
                                                    • FreeLibrary.KERNEL32(00000001,?,00418F60,00000000,?,?,?,00000001), ref: 0041F1DF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                    • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                    • API String ID: 2323315520-3614243559
                                                    • Opcode ID: 3ee75083f87a6e9960b975f8ce9b4bab73ebc8e6f4ff35a6c1ea5a687f8926a0
                                                    • Instruction ID: da08133687b7634b50b6c6a847516dd753fa1eb4508864759417a9d87976edef
                                                    • Opcode Fuzzy Hash: 3ee75083f87a6e9960b975f8ce9b4bab73ebc8e6f4ff35a6c1ea5a687f8926a0
                                                    • Instruction Fuzzy Hash: 3531F0B1640740EBDB00EBF5EC86E653654F768B28756093BB608DB162D77D488ACB1C
                                                    Strings
                                                    • utCompiledCode[1] is invalid, xrefs: 00491C61
                                                    • Setup version: Inno Setup version 5.3.7 (a), xrefs: 00491A88
                                                    • Removed all? %s, xrefs: 00491EEA
                                                    • Install was done in 64-bit mode but not running 64-bit Windows now, xrefs: 00491C9B
                                                    • Original Uninstall EXE: , xrefs: 00491A92
                                                    • InitializeUninstall, xrefs: 00491DE0
                                                    • Cannot find utCompiledCode record for this version of the uninstaller, xrefs: 00491C26
                                                    • Uninstall DAT: , xrefs: 00491AB5
                                                    • Need to restart Windows? %s, xrefs: 00491FC1
                                                    • Will restart because UninstallNeedRestart returned True., xrefs: 00491F70
                                                    • Uninstall, xrefs: 00491A3B
                                                    • Uninstall command line: , xrefs: 00491AD8
                                                    • UninstallNeedRestart, xrefs: 00491F20, 00491F59
                                                    • Will not restart Windows automatically., xrefs: 00492094
                                                    • DeinitializeUninstall, xrefs: 0049212A
                                                    • InitializeUninstall returned False; aborting., xrefs: 00491E18
                                                    • Not calling UninstallNeedRestart because a restart has already been deemed necessary., xrefs: 00491F9F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$Show
                                                    • String ID: Cannot find utCompiledCode record for this version of the uninstaller$DeinitializeUninstall$InitializeUninstall$InitializeUninstall returned False; aborting.$Install was done in 64-bit mode but not running 64-bit Windows now$Need to restart Windows? %s$Not calling UninstallNeedRestart because a restart has already been deemed necessary.$Original Uninstall EXE: $Removed all? %s$Setup version: Inno Setup version 5.3.7 (a)$Uninstall$Uninstall DAT: $Uninstall command line: $UninstallNeedRestart$Will not restart Windows automatically.$Will restart because UninstallNeedRestart returned True.$utCompiledCode[1] is invalid
                                                    • API String ID: 3609083571-3737316763
                                                    • Opcode ID: e51d3b8a7bb35d44f02fce223183cbdb6a28827008003104327b5bb0362bba6b
                                                    • Instruction ID: e4df5b497e998d8061ee0c4d0425d281b25c02c334423a3fae617af4edb6fe38
                                                    • Opcode Fuzzy Hash: e51d3b8a7bb35d44f02fce223183cbdb6a28827008003104327b5bb0362bba6b
                                                    • Instruction Fuzzy Hash: 0312CF34A14244AFDF15EB65E942B9E7FA4EB19308F50807BF800A73A2CB7C9845CB5D
                                                    APIs
                                                    • 73A1A570.USER32(00000000,?,0041A8B4,?), ref: 0041C9B0
                                                    • 73A24C40.GDI32(?,00000000,?,0041A8B4,?), ref: 0041C9BC
                                                    • 73A26180.GDI32(0041A8B4,?,00000001,00000001,00000000,00000000,0041CBD2,?,?,00000000,?,0041A8B4,?), ref: 0041C9E0
                                                    • 73A24C00.GDI32(?,0041A8B4,?,00000000,0041CBD2,?,?,00000000,?,0041A8B4,?), ref: 0041C9F0
                                                    • SelectObject.GDI32(0041CDAC,00000000), ref: 0041CA0B
                                                    • FillRect.USER32(0041CDAC,?,?), ref: 0041CA46
                                                    • SetTextColor.GDI32(0041CDAC,00000000), ref: 0041CA5B
                                                    • SetBkColor.GDI32(0041CDAC,00000000), ref: 0041CA72
                                                    • PatBlt.GDI32(0041CDAC,00000000,00000000,0041A8B4,?,00FF0062), ref: 0041CA88
                                                    • 73A24C40.GDI32(?,00000000,0041CB8B,?,0041CDAC,00000000,?,0041A8B4,?,00000000,0041CBD2,?,?,00000000,?,0041A8B4), ref: 0041CA9B
                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041CACC
                                                    • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B,?,0041CDAC,00000000,?,0041A8B4), ref: 0041CAE4
                                                    • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B,?,0041CDAC,00000000,?), ref: 0041CAED
                                                    • 73A18830.GDI32(0041CDAC,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B), ref: 0041CAFC
                                                    • 73A122A0.GDI32(0041CDAC,0041CDAC,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B), ref: 0041CB05
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041CB1E
                                                    • SetBkColor.GDI32(00000000,00000000), ref: 0041CB35
                                                    • 73A24D40.GDI32(0041CDAC,00000000,00000000,0041A8B4,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CB7A,?,?,00000000), ref: 0041CB51
                                                    • SelectObject.GDI32(00000000,?), ref: 0041CB5E
                                                    • DeleteDC.GDI32(00000000), ref: 0041CB74
                                                      • Part of subcall function 00419FC8: GetSysColor.USER32(?), ref: 00419FD2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Color$ObjectSelect$A122A18830Text$A26180A570DeleteFillRect
                                                    • String ID:
                                                    • API String ID: 1381628555-0
                                                    • Opcode ID: cfb9a4aa0316584675bbd9561fe3aa782c3f36df23333f22850a8bd06049d846
                                                    • Instruction ID: 7128b10ae0d2f5501f58bad1f60f679124a592cf14607d549707b49f1954e982
                                                    • Opcode Fuzzy Hash: cfb9a4aa0316584675bbd9561fe3aa782c3f36df23333f22850a8bd06049d846
                                                    • Instruction Fuzzy Hash: 5961FC71A44609ABDF10EBE5DC86FAFB7B8EF48704F10446AF504E7281C67CA9418B69
                                                    APIs
                                                    • AllocateAndInitializeSid.ADVAPI32(00494788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DEF6
                                                    • GetVersion.KERNEL32(00000000,0042E0A0,?,00494788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF13
                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E0A0,?,00494788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF2C
                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DF32
                                                    • FreeSid.ADVAPI32(00000000,0042E0A7,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E09A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressAllocateFreeHandleInitializeModuleProcVersion
                                                    • String ID: )I$CheckTokenMembership$advapi32.dll
                                                    • API String ID: 1717332306-3626090451
                                                    • Opcode ID: 4bc6f7339c74b1b8bb784104df9af91cc6dea1c52e2dfd08a97b089f9a1e7a34
                                                    • Instruction ID: 5045d4bdae095839e21654112f0de3b8f2816e6eca6f617d5415efb28b53f152
                                                    • Opcode Fuzzy Hash: 4bc6f7339c74b1b8bb784104df9af91cc6dea1c52e2dfd08a97b089f9a1e7a34
                                                    • Instruction Fuzzy Hash: 6151C571B44629AEDB10EAE69C42F7F77ECEB09304F94447BB500F7282C5BC9806866D
                                                    APIs
                                                    • ShowWindow.USER32(?,00000005,00000000,00493014,?,?,00000000,?,00000000,00000000,?,00493355,00000000,0049335F,?,00000000), ref: 00492CFF
                                                    • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00493014,?,?,00000000,?,00000000,00000000,?,00493355,00000000), ref: 00492D12
                                                    • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00493014,?,?,00000000,?,00000000,00000000), ref: 00492D22
                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00492D43
                                                    • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00493014,?,?,00000000,?,00000000), ref: 00492D53
                                                      • Part of subcall function 0042D328: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D3B6,?,?,00000000,?,?,00492710,00000000,004928D9,?,?,00000005), ref: 0042D35D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                    • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup$U3I$_3I
                                                    • API String ID: 2000705611-4274964691
                                                    • Opcode ID: 12a45f9e54f5f3a4484da70a9156f81cdde5e5e51a6fa199751cd28ad3ac7fa2
                                                    • Instruction ID: d7afaff54a0ba67875ff15cc676309ef23a82e0cc3bcd8a5a50960f10f45bd16
                                                    • Opcode Fuzzy Hash: 12a45f9e54f5f3a4484da70a9156f81cdde5e5e51a6fa199751cd28ad3ac7fa2
                                                    • Instruction Fuzzy Hash: 1691E530A04244AFDF11EBA5D952BAFBFB4EB49304F914476F400AB396C6BC9D05DB29
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,0045907E,?,?,?,?,?,00000006,?,00000000,004921AA,?,00000000,0049224D), ref: 00458F30
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: .chm$.chw$.fts$.gid$.hlp$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                    • API String ID: 1452528299-1593206319
                                                    • Opcode ID: 3a0b93e244ab44925249bc87886bd4a521f6e2d24e286c114256bf36e4fb0805
                                                    • Instruction ID: e4eb3b4405a0979e1a2c77286c885a36d1837fd04eb9654633cb4fd66a7308d3
                                                    • Opcode Fuzzy Hash: 3a0b93e244ab44925249bc87886bd4a521f6e2d24e286c114256bf36e4fb0805
                                                    • Instruction Fuzzy Hash: 7B618E30B042549BDB10EB69C8827AE77A9AB48715F50486FF801EB383CB789D49C799
                                                    APIs
                                                    • 73A24C40.GDI32(00000000,?,00000000,?), ref: 0041B333
                                                    • 73A24C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B33D
                                                    • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B34F
                                                    • 73A26180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B366
                                                    • 73A1A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B372
                                                    • 73A24C00.GDI32(00000000,0000000B,?,00000000,0041B3CB,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B39F
                                                    • 73A1A480.USER32(00000000,00000000,0041B3D2,00000000,0041B3CB,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B3C5
                                                    • SelectObject.GDI32(00000000,?), ref: 0041B3E0
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B3EF
                                                    • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B41B
                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041B429
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B437
                                                    • DeleteDC.GDI32(00000000), ref: 0041B440
                                                    • DeleteDC.GDI32(?), ref: 0041B449
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$Delete$A26180A480A570Stretch
                                                    • String ID:
                                                    • API String ID: 359944910-0
                                                    • Opcode ID: e420a80018f5a27581da0c94fb8e2332c520fd2d58b05de39de388c6394c4d5d
                                                    • Instruction ID: ef99a8f9a6f00624a9096b2aeeb37702e3b70ceb3a8cbf3cb68c8f3869cb2bd7
                                                    • Opcode Fuzzy Hash: e420a80018f5a27581da0c94fb8e2332c520fd2d58b05de39de388c6394c4d5d
                                                    • Instruction Fuzzy Hash: 1541D071E40619AFDF10DAE9D846FEFB7BCEF08704F104466B614FB281C67869408BA4
                                                    APIs
                                                      • Part of subcall function 0042C6E0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C704
                                                    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0046EB5F
                                                    • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046EC56
                                                    • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0046EC6C
                                                    • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046EC91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                    • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                    • API String ID: 971782779-3668018701
                                                    • Opcode ID: 13667d3769a9039a792aac2c44e006656bd150cf4166f48d97a5956746075d52
                                                    • Instruction ID: 2e4868452920f6aa44bbca31fb97776c7fd145d2f521d1c12fbd4923643f3a69
                                                    • Opcode Fuzzy Hash: 13667d3769a9039a792aac2c44e006656bd150cf4166f48d97a5956746075d52
                                                    • Instruction Fuzzy Hash: 87D10074A00249AFDB01DF96D885BDEBBF5BF08314F54402AF900B7392D678AE45CB69
                                                    APIs
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    • RegQueryValueExA.ADVAPI32(00459246,00000000,00000000,?,00000000,?,00000000,004535D1,?,00459246,00000003,00000000,00000000,00453608), ref: 00453451
                                                      • Part of subcall function 0042E670: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00451E7B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E68F
                                                    • RegQueryValueExA.ADVAPI32(00459246,00000000,00000000,00000000,?,00000004,00000000,0045351B,?,00459246,00000000,00000000,?,00000000,?,00000000), ref: 004534D5
                                                    • RegQueryValueExA.ADVAPI32(00459246,00000000,00000000,00000000,?,00000004,00000000,0045351B,?,00459246,00000000,00000000,?,00000000,?,00000000), ref: 00453504
                                                    Strings
                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045336F
                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004533A8
                                                    • RegOpenKeyEx, xrefs: 004533D4
                                                    • , xrefs: 004533C2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: QueryValue$FormatMessageOpen
                                                    • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                    • API String ID: 2812809588-1577016196
                                                    • Opcode ID: 7d1a861fada28ebf303f9b86b642231452c70cd721ba97c12bf8ea57decbce6b
                                                    • Instruction ID: 553864e69fa8df29f0895cd1651d22ce7dcdc08a544756bbeb7b66468d6216b8
                                                    • Opcode Fuzzy Hash: 7d1a861fada28ebf303f9b86b642231452c70cd721ba97c12bf8ea57decbce6b
                                                    • Instruction Fuzzy Hash: DF912371A04208BBDB11DF95C942BDEB7F9EB08346F10446BF900F7282D6789F098B69
                                                    APIs
                                                    • CloseHandle.KERNEL32(?), ref: 0045723F
                                                    • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 0045725B
                                                    • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00457269
                                                    • GetExitCodeProcess.KERNEL32(?), ref: 0045727A
                                                    • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 004572C1
                                                    • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 004572DD
                                                    Strings
                                                    • Helper process exited., xrefs: 00457289
                                                    • Helper isn't responding; killing it., xrefs: 0045724B
                                                    • Helper process exited with failure code: 0x%x, xrefs: 004572A7
                                                    • Stopping 64-bit helper process. (PID: %u), xrefs: 00457231
                                                    • Helper process exited, but failed to get exit code., xrefs: 004572B3
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                    • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                    • API String ID: 3355656108-1243109208
                                                    • Opcode ID: 4f608ce2e55562868e1d3d515fe08639047c11ae1fbeba1f6c6f02804e7c0daf
                                                    • Instruction ID: cbbbea6dedd0d273467075bf502e8a2b7be663cd85a1a49bef8c8f37b48c8077
                                                    • Opcode Fuzzy Hash: 4f608ce2e55562868e1d3d515fe08639047c11ae1fbeba1f6c6f02804e7c0daf
                                                    • Instruction Fuzzy Hash: 89215C70608B009AC720E779D441B5BB7D4AF08305F04897FBC9ACB283D678E8489B6A
                                                    APIs
                                                      • Part of subcall function 0042DC1C: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DC48
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004531C3,?,00000000,00453287), ref: 00453113
                                                    • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004531C3,?,00000000,00453287), ref: 0045324F
                                                      • Part of subcall function 0042E670: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00451E7B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E68F
                                                    Strings
                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045302B
                                                    • , xrefs: 00453075
                                                    • RegCreateKeyEx, xrefs: 00453087
                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045305B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateFormatMessageQueryValue
                                                    • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                    • API String ID: 2481121983-1280779767
                                                    • Opcode ID: 16f8b7649e242f3db686f87bad44339019ddb4406f09b65b16db4e9f29182bc8
                                                    • Instruction ID: 2c0c5fe921886f73e21521b3bff8a538c4309916fb6f6cfb0a6381ca684f6e5a
                                                    • Opcode Fuzzy Hash: 16f8b7649e242f3db686f87bad44339019ddb4406f09b65b16db4e9f29182bc8
                                                    • Instruction Fuzzy Hash: C5812171A00609AFDB00DFE5C941BDEB7B9EB08345F54446AF901F7282D778AA09CB69
                                                    APIs
                                                      • Part of subcall function 004524C4: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004917A5,_iu,?,00000000,004525FE), ref: 004525B3
                                                      • Part of subcall function 004524C4: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004917A5,_iu,?,00000000,004525FE), ref: 004525C3
                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00491651
                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,004917A5), ref: 00491672
                                                    • CreateWindowExA.USER32(00000000,STATIC,004917B4,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00491699
                                                    • SetWindowLongA.USER32(?,000000FC,00490E2C), ref: 004916AC
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00491778,?,?,000000FC,00490E2C,00000000,STATIC,004917B4), ref: 004916DC
                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00491750
                                                    • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00491778,?,?,000000FC,00490E2C,00000000), ref: 0049175C
                                                      • Part of subcall function 00452814: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004528FB
                                                    • 73A25CF0.USER32(?,0049177F,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00491778,?,?,000000FC,00490E2C,00000000,STATIC), ref: 00491772
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FileWindow$CloseCreateHandle$AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                    • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                    • API String ID: 170458502-2312673372
                                                    • Opcode ID: 7fe438a87a4e7854b22ac457e51087ce51648800b7b4434e0d5f5cbaacc5215a
                                                    • Instruction ID: 97e3e56b228cfab66ee311f63bf2d1a519e5f3988aa163bdc866d11849aae5dc
                                                    • Opcode Fuzzy Hash: 7fe438a87a4e7854b22ac457e51087ce51648800b7b4434e0d5f5cbaacc5215a
                                                    • Instruction Fuzzy Hash: 8F416070A40209AFDF00EBA5DD42F9E7BF8EB19704F51457AF500F7292D6799E008B68
                                                    APIs
                                                    • GetActiveWindow.USER32 ref: 0042EBEC
                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042EC00
                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042EC0D
                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042EC1A
                                                    • GetWindowRect.USER32(?,00000000), ref: 0042EC66
                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042ECA4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                    • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                    • API String ID: 2610873146-3407710046
                                                    • Opcode ID: 4461e33e25747eae0eb75cc0e154fcb2324bf35f0d43541031b4b701864a71c7
                                                    • Instruction ID: 4a37ecb70f16d0e534201d00fe1897e1a246a2af0c0267f068437e20043e9251
                                                    • Opcode Fuzzy Hash: 4461e33e25747eae0eb75cc0e154fcb2324bf35f0d43541031b4b701864a71c7
                                                    • Instruction Fuzzy Hash: 1221CF72301624AFD300DAAADC81F3B3698EB84B10F09452EF944EB382DA78DC048A59
                                                    APIs
                                                    • GetActiveWindow.USER32 ref: 0045F2B4
                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 0045F2C8
                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0045F2D5
                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0045F2E2
                                                    • GetWindowRect.USER32(?,00000000), ref: 0045F32E
                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 0045F36C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                    • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                    • API String ID: 2610873146-3407710046
                                                    • Opcode ID: 7a3f746eb703baa2a6c8fe468f3a65e8486bf37448d54090c2a746816fab1748
                                                    • Instruction ID: 95483c6525a53468b4ec8186bc606c8502f0d91924da71a6d47f5662d43c45fd
                                                    • Opcode Fuzzy Hash: 7a3f746eb703baa2a6c8fe468f3a65e8486bf37448d54090c2a746816fab1748
                                                    • Instruction Fuzzy Hash: 112192757456046BE3109A68CC81F3F3799DB88715F09453EFD84DB382DA78ED0C8A9A
                                                    APIs
                                                    • SysFreeString.OLEAUT32(?), ref: 00454E69
                                                    • 756FE550.OLE32(00494A58,00000000,00000001,00494774,?,00000000,00454F64), ref: 00454CDA
                                                      • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                      • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                    • 756FE550.OLE32(00494764,00000000,00000001,00494774,?,00000000,00454F64), ref: 00454D00
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: E550String$AllocByteCharFreeMultiWide
                                                    • String ID: CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue$IShellLink::QueryInterface
                                                    • API String ID: 2757340368-2052886881
                                                    • Opcode ID: 4cf5a9f0d2c3ff61f195a7e98e170a747f28b341b0b15bd10d0dbd1e33f28952
                                                    • Instruction ID: 0b21da03975bca805d8248ee8d2b37e628922fffcf98328ca7261b0fae796446
                                                    • Opcode Fuzzy Hash: 4cf5a9f0d2c3ff61f195a7e98e170a747f28b341b0b15bd10d0dbd1e33f28952
                                                    • Instruction Fuzzy Hash: AA915071A00104AFDB50DFA9C885F9E77F8AF89709F50406AF904EB262DB78DD48CB59
                                                    APIs
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,004575BF,?,00000000,00457622,?,?,021C3858,00000000), ref: 0045743D
                                                    • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,021C3858,?,00000000,00457554,?,00000000,00000001,00000000,00000000,00000000,004575BF), ref: 0045749A
                                                    • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,021C3858,?,00000000,00457554,?,00000000,00000001,00000000,00000000,00000000,004575BF), ref: 004574A7
                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004574F3
                                                    • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,0045752D,?,-00000020,0000000C,-00004034,00000014,021C3858,?,00000000,00457554,?,00000000), ref: 00457519
                                                    • GetLastError.KERNEL32(?,?,00000000,00000001,0045752D,?,-00000020,0000000C,-00004034,00000014,021C3858,?,00000000,00457554,?,00000000), ref: 00457520
                                                      • Part of subcall function 004520A4: GetLastError.KERNEL32(00000000,00452B15,00000005,00000000,00452B4A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00492C51,00000000), ref: 004520A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                    • String ID: CreateEvent$TransactNamedPipe
                                                    • API String ID: 2182916169-3012584893
                                                    • Opcode ID: c1a3a8f9ea1166c106d188104454f7bffd3a84fcc42e4e20bcaa0ea938d488a9
                                                    • Instruction ID: 79c6e3806f75cd6c2156c397a36c552c7ebc7e0cdca09418cd540dcb18b715b5
                                                    • Opcode Fuzzy Hash: c1a3a8f9ea1166c106d188104454f7bffd3a84fcc42e4e20bcaa0ea938d488a9
                                                    • Instruction Fuzzy Hash: 98418E70A04608BFDB15DF99D981F9EBBF8EB09710F5040B6F904E7792D6789E44CA28
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,0045529D,?,?,00000031,?), ref: 00455160
                                                    • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00455166
                                                    • LoadTypeLib.OLEAUT32(00000000,?), ref: 004551B3
                                                      • Part of subcall function 004520A4: GetLastError.KERNEL32(00000000,00452B15,00000005,00000000,00452B4A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00492C51,00000000), ref: 004520A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressErrorHandleLastLoadModuleProcType
                                                    • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                    • API String ID: 1914119943-2711329623
                                                    • Opcode ID: 1ed3e8c5a2aa991d601313e4c083ed3eccbaf9bc08da749f5376dbd3bf59aa27
                                                    • Instruction ID: fb038adfd684185714a4e58cf340431a6a295a782a22b6c655451b98c415bd11
                                                    • Opcode Fuzzy Hash: 1ed3e8c5a2aa991d601313e4c083ed3eccbaf9bc08da749f5376dbd3bf59aa27
                                                    • Instruction Fuzzy Hash: DD31A571A00A04AFC711EFAACC61D6F77B9EB89B41B5044A6FD04D7352DA38D904CB29
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E379,?,?,00000001,00000000,?,?,00000001,00000000,00000002,00000000,0047BF7E), ref: 0042E29D
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E2A3
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E379,?,?,00000001,00000000,?,?,00000001), ref: 0042E2F1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressCloseHandleModuleProc
                                                    • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                    • API String ID: 4190037839-2401316094
                                                    • Opcode ID: 18d95e7a2ef5b710948a7f5a5b91e912b8a0bc74954c115ea7a280d32cc387ed
                                                    • Instruction ID: d6249f7fc2f92a5c557ffc1224eecf0a88ec9f0d2c320431a8896816ae334499
                                                    • Opcode Fuzzy Hash: 18d95e7a2ef5b710948a7f5a5b91e912b8a0bc74954c115ea7a280d32cc387ed
                                                    • Instruction Fuzzy Hash: 80212670B00215EBDB00EAA7DC55B9F77A9EB44315FD04477A900E7281DB7C9E05DB58
                                                    APIs
                                                    • RectVisible.GDI32(?,?), ref: 00416D83
                                                    • SaveDC.GDI32(?), ref: 00416D97
                                                    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416DBA
                                                    • RestoreDC.GDI32(?,?), ref: 00416DD5
                                                    • CreateSolidBrush.GDI32(00000000), ref: 00416E55
                                                    • FrameRect.USER32(?,?,?), ref: 00416E88
                                                    • DeleteObject.GDI32(?), ref: 00416E92
                                                    • CreateSolidBrush.GDI32(00000000), ref: 00416EA2
                                                    • FrameRect.USER32(?,?,?), ref: 00416ED5
                                                    • DeleteObject.GDI32(?), ref: 00416EDF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                    • String ID:
                                                    • API String ID: 375863564-0
                                                    • Opcode ID: bb506781a8005f130ed1390a977bd367d1192529f6fa5c382f887903f4f37290
                                                    • Instruction ID: 01d81588b69ff1f480347e903aed9c185fc6c29f227380d1fa6610f1b9ad60dd
                                                    • Opcode Fuzzy Hash: bb506781a8005f130ed1390a977bd367d1192529f6fa5c382f887903f4f37290
                                                    • Instruction Fuzzy Hash: A8513C712086449BDB50EF69C8C0B9B77E8EF48314F15566AFD48CB286C738EC81CB99
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                    • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                    • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                    • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                    • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                    • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                    • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                    • String ID:
                                                    • API String ID: 1694776339-0
                                                    • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                    • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                    • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                    • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                    APIs
                                                    • GetSystemMenu.USER32(00000000,00000000), ref: 004221A3
                                                    • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 004221C1
                                                    • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221CE
                                                    • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221DB
                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221E8
                                                    • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 004221F5
                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00422202
                                                    • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0042220F
                                                    • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 0042222D
                                                    • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 00422249
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$EnableItem$System
                                                    • String ID:
                                                    • API String ID: 3985193851-0
                                                    • Opcode ID: 05b40914ec909e1c9740d8afeb2cf42751dc2338b7eead5136cc8733da9e1836
                                                    • Instruction ID: e98f5eede000e984507cfb68b46ad6efe0a5c83d9602cc3651cf502f29ecaa29
                                                    • Opcode Fuzzy Hash: 05b40914ec909e1c9740d8afeb2cf42751dc2338b7eead5136cc8733da9e1836
                                                    • Instruction Fuzzy Hash: 23213370380744BAE720D725DD8BF9B7BD89B04708F0444A5BA487F2D7C6F9AE40869C
                                                    APIs
                                                    • FreeLibrary.KERNEL32(10000000), ref: 0047C630
                                                    • FreeLibrary.KERNEL32(00800000), ref: 0047C644
                                                    • SendNotifyMessageA.USER32(00010412,00000496,00002710,00000000), ref: 0047C6B6
                                                    Strings
                                                    • Not restarting Windows because Setup is being run from the debugger., xrefs: 0047C665
                                                    • DeinitializeSetup, xrefs: 0047C541
                                                    • Restarting Windows., xrefs: 0047C691
                                                    • GetCustomSetupExitCode, xrefs: 0047C4E5
                                                    • Deinitializing Setup., xrefs: 0047C4A6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary$MessageNotifySend
                                                    • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                    • API String ID: 3817813901-1884538726
                                                    • Opcode ID: 67ca87717aaee2838f85488956365213fc5d6e1d92313dc3eb233d350fd95e87
                                                    • Instruction ID: 86de7d2e110179f9c0f6961e1841d1c81b70162fb31f550e8d4f4cf42780f1f0
                                                    • Opcode Fuzzy Hash: 67ca87717aaee2838f85488956365213fc5d6e1d92313dc3eb233d350fd95e87
                                                    • Instruction Fuzzy Hash: DB519B34614200AFD721EB69D885B9A7BA8EB59304F50C57BFC08C72A2DB38AC44CB5D
                                                    APIs
                                                      • Part of subcall function 00457B28: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00457C5A,00000000,00457DA7,?,00000000,00000000,00000000), ref: 00457B75
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00457DA7,?,00000000,00000000,00000000), ref: 00457CB6
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00457DA7,?,00000000,00000000,00000000), ref: 00457D1C
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    Strings
                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00457C6A
                                                    • v2.0.50727, xrefs: 00457CA8
                                                    • .NET Framework not found, xrefs: 00457D6A
                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00457CD0
                                                    • v1.1.4322, xrefs: 00457D0E
                                                    • .NET Framework version %s not found, xrefs: 00457D56
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Close$Open
                                                    • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$v1.1.4322$v2.0.50727
                                                    • API String ID: 2976201327-1070292914
                                                    • Opcode ID: c17c578c93e0a8db98456f8d788463be5a92653714b36f08374d6c48a056d070
                                                    • Instruction ID: 1181c51870a89a76828bf4cdafa164266e6ab86bcafa1da5c5d87414d128b815
                                                    • Opcode Fuzzy Hash: c17c578c93e0a8db98456f8d788463be5a92653714b36f08374d6c48a056d070
                                                    • Instruction Fuzzy Hash: 5F41C730A081495FCB00DF65E851BEE77B6EF49309F5544BBE840DB292D739AA0ECB58
                                                    APIs
                                                      • Part of subcall function 004733E8: GetWindowThreadProcessId.USER32(00000000), ref: 004733F0
                                                      • Part of subcall function 004733E8: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004734E7,0pI,00000000), ref: 00473403
                                                      • Part of subcall function 004733E8: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00473409
                                                    • SendMessageA.USER32(00000000,0000004A,00000000,z8G), ref: 004734F5
                                                    • GetTickCount.KERNEL32 ref: 0047353A
                                                    • GetTickCount.KERNEL32 ref: 00473544
                                                    • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00473599
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                    • String ID: 0pI$CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d$z8G
                                                    • API String ID: 613034392-821243587
                                                    • Opcode ID: 6215bfa18e192c2b715081eaa2c021a31cf35164aa28bde1864b5a54543ada57
                                                    • Instruction ID: f2affe63f9f2e8fdd154fcc3a4725f23bfa3e4f1f474d5099b37abdb3590925f
                                                    • Opcode Fuzzy Hash: 6215bfa18e192c2b715081eaa2c021a31cf35164aa28bde1864b5a54543ada57
                                                    • Instruction Fuzzy Hash: EC318674F102155BDB10EFB9C8867EEB6A09F44705F50843BB548EB392D67C8E019B9D
                                                    APIs
                                                    • SHGetMalloc.SHELL32(?), ref: 0045E013
                                                    • GetActiveWindow.USER32 ref: 0045E077
                                                    • CoInitialize.OLE32(00000000), ref: 0045E08B
                                                    • SHBrowseForFolder.SHELL32(?), ref: 0045E0A2
                                                    • 756CD120.OLE32(0045E0E3,00000000,?,?,?,?,?,00000000,0045E167), ref: 0045E0B7
                                                    • SetActiveWindow.USER32(?,0045E0E3,00000000,?,?,?,?,?,00000000,0045E167), ref: 0045E0CD
                                                    • SetActiveWindow.USER32(?,?,0045E0E3,00000000,?,?,?,?,?,00000000,0045E167), ref: 0045E0D6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ActiveWindow$BrowseD120FolderInitializeMalloc
                                                    • String ID: A
                                                    • API String ID: 2698730301-3554254475
                                                    • Opcode ID: 4c93aed7974da8df2999b89a302ce796433789b5a6ec67c560a89b0d32607bd6
                                                    • Instruction ID: 6bfd7eabbe9e682b3dde037a987c9ea474e9b057d6f32f0a8e83a6328ca7ae7b
                                                    • Opcode Fuzzy Hash: 4c93aed7974da8df2999b89a302ce796433789b5a6ec67c560a89b0d32607bd6
                                                    • Instruction Fuzzy Hash: D0314471D00218AFDB04EFA6E886A9EBBF8EF09704F51447AF804E7252D7785A04CF59
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000E), ref: 00418BE0
                                                    • GetSystemMetrics.USER32(0000000D), ref: 00418BE8
                                                    • 6F552980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418BEE
                                                      • Part of subcall function 00409920: 6F54C400.COMCTL32((fI,000000FF,00000000,00418C1C,00000000,00418C78,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00409924
                                                    • 6F5BCB00.COMCTL32((fI,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C3E
                                                    • 6F5BC740.COMCTL32(00000000,?,(fI,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418C49
                                                    • 6F5BCB00.COMCTL32((fI,00000001,?,?,00000000,?,(fI,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000), ref: 00418C5C
                                                    • 6F550860.COMCTL32((fI,00418C7F,?,00000000,?,(fI,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000,0000000E), ref: 00418C72
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$C400C740F550860F552980
                                                    • String ID: (fI
                                                    • API String ID: 1828538299-4122540895
                                                    • Opcode ID: 65e0913070e1a46d1e4049ee6121461fcfbb365fe4eb4b9520eb625876ba3720
                                                    • Instruction ID: ebdf7d90a3a22d50ab8fd643d9f8c48181b88e499e337cf830e96f2c39c8652b
                                                    • Opcode Fuzzy Hash: 65e0913070e1a46d1e4049ee6121461fcfbb365fe4eb4b9520eb625876ba3720
                                                    • Instruction Fuzzy Hash: 19113675744204BADB50EBF5DC82F5E77B8DB48704F50406AB604E72D2E6799D408768
                                                    APIs
                                                    • GetProcAddress.KERNEL32(00800000,inflateInit_), ref: 0045B999
                                                    • GetProcAddress.KERNEL32(00800000,inflate), ref: 0045B9A9
                                                    • GetProcAddress.KERNEL32(00800000,inflateEnd), ref: 0045B9B9
                                                    • GetProcAddress.KERNEL32(00800000,inflateReset), ref: 0045B9C9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc
                                                    • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                    • API String ID: 190572456-3516654456
                                                    • Opcode ID: cdec3d2289940290433f74bcfb90cd33ccdd8b1be43608ea6e51ef040730019a
                                                    • Instruction ID: 02f39ce5c28d2ed3ade6aba6a28faafd9b0cc1bc692c698d2602f952355582ec
                                                    • Opcode Fuzzy Hash: cdec3d2289940290433f74bcfb90cd33ccdd8b1be43608ea6e51ef040730019a
                                                    • Instruction Fuzzy Hash: 020121B0518300DADB24DF379C81B263695E764356F14893BA944552A2D77C0549EBDC
                                                    APIs
                                                    • SetBkColor.GDI32(?,00000000), ref: 0041A929
                                                    • 73A24D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041A963
                                                    • SetBkColor.GDI32(?,?), ref: 0041A978
                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041A9C2
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041A9CD
                                                    • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041A9DD
                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AA1C
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041AA26
                                                    • SetBkColor.GDI32(00000000,?), ref: 0041AA33
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Color$StretchText
                                                    • String ID:
                                                    • API String ID: 2984075790-0
                                                    • Opcode ID: 231d1472213bb63a8f7401f1581157642b5e4f6e66826803df0d8dde294b24c9
                                                    • Instruction ID: 69ae49bf6c4e82acacdff2fe07525d2a8d99776db7c40e28fbb8516f53671917
                                                    • Opcode Fuzzy Hash: 231d1472213bb63a8f7401f1581157642b5e4f6e66826803df0d8dde294b24c9
                                                    • Instruction Fuzzy Hash: B461D6B5A00505EFCB40EFA9D985E9AB7F8EF48314B14816AF518DB252C734ED41CF58
                                                    APIs
                                                      • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                                    • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,004564E8,?, /s ",?,regsvr32.exe",?,004564E8), ref: 0045645A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseDirectoryHandleSystem
                                                    • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                    • API String ID: 2051275411-1862435767
                                                    • Opcode ID: dfa0f807b1572090b7f1970cc31e50ad8cdcaefbb48b57584fc950e7808c844c
                                                    • Instruction ID: 0727363c7f1249558044398805bdccd0d7d16a74982410126c53be3864fdc62d
                                                    • Opcode Fuzzy Hash: dfa0f807b1572090b7f1970cc31e50ad8cdcaefbb48b57584fc950e7808c844c
                                                    • Instruction Fuzzy Hash: 1B41E570E403086BDB10EFD5D881B9DB7F9AF49305F91407BA904BB296D7789A09CB1D
                                                    APIs
                                                    • OffsetRect.USER32(?,00000001,00000001), ref: 0044CBDD
                                                    • GetSysColor.USER32(00000014), ref: 0044CBE4
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0044CBFC
                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044CC25
                                                    • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044CC2F
                                                    • GetSysColor.USER32(00000010), ref: 0044CC36
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0044CC4E
                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044CC77
                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044CCA2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Text$Color$Draw$OffsetRect
                                                    • String ID:
                                                    • API String ID: 1005981011-0
                                                    • Opcode ID: 7a77650fe909f249a59d474b8f68baad46cccb45a36f5013b15eb15e2cf14de9
                                                    • Instruction ID: 1caa52e0a57a24b19c6a51c3cca57839e66ec70a0d40fc0ec19372c69ab55c34
                                                    • Opcode Fuzzy Hash: 7a77650fe909f249a59d474b8f68baad46cccb45a36f5013b15eb15e2cf14de9
                                                    • Instruction Fuzzy Hash: 1D21CFB42015007FC710FB2ACD8AE9BBBECDF19319B05457A7958EB3A3C678DD408669
                                                    APIs
                                                    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004528FB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfileStringWrite
                                                    • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]$_3I
                                                    • API String ID: 390214022-3184411878
                                                    • Opcode ID: e4c7ea0c5c9ad64a98d34f8b305de6a48bbafa0384da5757f5ee4346fa0e203d
                                                    • Instruction ID: cc9533ecac0167aba3f68936dda73933724a2a20dcf6fda83704f45a3cd3408f
                                                    • Opcode Fuzzy Hash: e4c7ea0c5c9ad64a98d34f8b305de6a48bbafa0384da5757f5ee4346fa0e203d
                                                    • Instruction Fuzzy Hash: C1912274A002099BDB11EFA5D982BDEB7B5EF49305F508067E800B7392D7B86E09CB59
                                                    APIs
                                                      • Part of subcall function 00450088: SetEndOfFile.KERNEL32(?,?,0045AA1E,00000000,0045ABA9,?,00000000,00000002,00000002), ref: 0045008F
                                                      • Part of subcall function 00406EB8: DeleteFileA.KERNEL32(00000000,00496628,00492F9D,00000000,00492FF2,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EC3
                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 00490F09
                                                    • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00490F1D
                                                    • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00490F37
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00490F43
                                                    • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00490F49
                                                    • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00490F5C
                                                    Strings
                                                    • Deleting Uninstall data files., xrefs: 00490E7F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                    • String ID: Deleting Uninstall data files.
                                                    • API String ID: 1570157960-2568741658
                                                    • Opcode ID: 15b03905d5d3c3d66d6554bdd54eee2183e2fa4846016aa340c4f76e102b4eec
                                                    • Instruction ID: a0aebabfc9e913fe554dc7ee14f6044b9d81755df2e210029017748f22872993
                                                    • Opcode Fuzzy Hash: 15b03905d5d3c3d66d6554bdd54eee2183e2fa4846016aa340c4f76e102b4eec
                                                    • Instruction Fuzzy Hash: EC217331358240AEEB10E76AEC42B2B3B9CEB18318F50053BB500972E7DAB85D448B6D
                                                    APIs
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,0046C325,?,?,?,?,00000000), ref: 0046C28F
                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,0046C325), ref: 0046C2A6
                                                    • AddFontResourceA.GDI32(00000000), ref: 0046C2C3
                                                    • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 0046C2D7
                                                    Strings
                                                    • Failed to set value in Fonts registry key., xrefs: 0046C298
                                                    • AddFontResource, xrefs: 0046C2E1
                                                    • Failed to open Fonts registry key., xrefs: 0046C2AD
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                    • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                    • API String ID: 955540645-649663873
                                                    • Opcode ID: 390191a2019e52d32397de3f68072b8852789bd3524ec1fa6b9b3a35e72429ef
                                                    • Instruction ID: a28cca9842f98a61cc9c199d18da08bec580a012eb358484f1d85ba921a9b760
                                                    • Opcode Fuzzy Hash: 390191a2019e52d32397de3f68072b8852789bd3524ec1fa6b9b3a35e72429ef
                                                    • Instruction Fuzzy Hash: A921A170B402007AEB10EAA69C92F7A679CDB44708F508077BD40EB3C2E67CA901966E
                                                    APIs
                                                      • Part of subcall function 00416380: GetClassInfoA.USER32(00400000,?,?), ref: 004163EF
                                                      • Part of subcall function 00416380: UnregisterClassA.USER32(?,00400000), ref: 0041641B
                                                      • Part of subcall function 00416380: RegisterClassA.USER32(?), ref: 0041643E
                                                    • GetVersion.KERNEL32 ref: 0045F718
                                                    • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 0045F756
                                                    • SHGetFileInfo.SHELL32(0045F7F4,00000000,?,00000160,00004011), ref: 0045F773
                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 0045F791
                                                    • SetCursor.USER32(00000000,00000000,00007F02,0045F7F4,00000000,?,00000160,00004011), ref: 0045F797
                                                    • SetCursor.USER32(?,0045F7D7,00007F02,0045F7F4,00000000,?,00000160,00004011), ref: 0045F7CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                    • String ID: Explorer
                                                    • API String ID: 2594429197-512347832
                                                    • Opcode ID: e3239e46c257503266597b56140d29e20775804faaf584886ec342b17592225d
                                                    • Instruction ID: 7ff7faf5247c26d25335c70635a1860a407a0e5f323aeaa6378cd2fc5b7ea516
                                                    • Opcode Fuzzy Hash: e3239e46c257503266597b56140d29e20775804faaf584886ec342b17592225d
                                                    • Instruction Fuzzy Hash: B121E7317403046BE710BBB98C47F9A76989B09709F4144BFBB05EA6C3DA7C9C09866D
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,0045869A,?,00000000,00000000,00000000,?,00000006,?,00000000,004921AA,?,00000000,0049224D), ref: 004585DE
                                                      • Part of subcall function 00452EB8: FindClose.KERNEL32(000000FF,00452FAE), ref: 00452F9D
                                                    Strings
                                                    • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00458653
                                                    • Failed to delete directory (%d). Will retry later., xrefs: 004585F7
                                                    • Failed to delete directory (%d)., xrefs: 00458674
                                                    • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 004585B8
                                                    • Deleting directory: %s, xrefs: 00458567
                                                    • Failed to strip read-only attribute., xrefs: 004585AC
                                                    • Stripped read-only attribute., xrefs: 004585A0
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseErrorFindLast
                                                    • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                    • API String ID: 754982922-1448842058
                                                    • Opcode ID: 27e4991687b6754b9ab66284589ea227f4c5255e99ef6650682fe7c62bcfbbea
                                                    • Instruction ID: dd70d7a7e9406b9190765920557ab5b8ad56b684bc2d1b190e3df41212a100e3
                                                    • Opcode Fuzzy Hash: 27e4991687b6754b9ab66284589ea227f4c5255e99ef6650682fe7c62bcfbbea
                                                    • Instruction Fuzzy Hash: 3B418630B042489BCB10DB6988427AE76E59B8930AF55857FAC05B7393DF7C890D8B5A
                                                    APIs
                                                    • GetCapture.USER32 ref: 00422E14
                                                    • GetCapture.USER32 ref: 00422E23
                                                    • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422E29
                                                    • ReleaseCapture.USER32 ref: 00422E2E
                                                    • GetActiveWindow.USER32 ref: 00422E3D
                                                    • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422EBC
                                                    • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422F20
                                                    • GetActiveWindow.USER32 ref: 00422F2F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CaptureMessageSend$ActiveWindow$Release
                                                    • String ID:
                                                    • API String ID: 862346643-0
                                                    • Opcode ID: 8d225d8a55f9a88f292a2c30a551b716c13a14df50b62869e123561c13ee422b
                                                    • Instruction ID: 3dc7d5c5dffcbd9cfc95175fcc265abaf37585ce791e678acf2218af3f88607c
                                                    • Opcode Fuzzy Hash: 8d225d8a55f9a88f292a2c30a551b716c13a14df50b62869e123561c13ee422b
                                                    • Instruction Fuzzy Hash: 19416270B00244AFDB50EBA9DA42B9E77F1EF04304F5540BAF404AB3A2D7B99E40DB18
                                                    APIs
                                                    • 73A1A570.USER32(00000000), ref: 004293FA
                                                    • GetTextMetricsA.GDI32(00000000), ref: 00429403
                                                      • Part of subcall function 0041A158: CreateFontIndirectA.GDI32(?), ref: 0041A217
                                                    • SelectObject.GDI32(00000000,00000000), ref: 00429412
                                                    • GetTextMetricsA.GDI32(00000000,?), ref: 0042941F
                                                    • SelectObject.GDI32(00000000,00000000), ref: 00429426
                                                    • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0042942E
                                                    • GetSystemMetrics.USER32(00000006), ref: 00429453
                                                    • GetSystemMetrics.USER32(00000006), ref: 0042946D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                                    • String ID:
                                                    • API String ID: 361401722-0
                                                    • Opcode ID: 4797f7473b11578367664d0c743f2f68aa598be2ff82e9d8e1b12d6339eceb8d
                                                    • Instruction ID: 6143225b0a8ca3b977d6363335e7cd80f7f8ea5cda66b8f0fa851fdc2eb08b32
                                                    • Opcode Fuzzy Hash: 4797f7473b11578367664d0c743f2f68aa598be2ff82e9d8e1b12d6339eceb8d
                                                    • Instruction Fuzzy Hash: 360104917087103BF710B2769CC2F6B6188DB9435CF44003FFA469A3D3D56C8C45866A
                                                    APIs
                                                    • 73A1A570.USER32(00000000,?,00418FC9,004933F1), ref: 0041DD97
                                                    • 73A24620.GDI32(00000000,0000005A,00000000,?,00418FC9,004933F1), ref: 0041DDA1
                                                    • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00418FC9,004933F1), ref: 0041DDAE
                                                    • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DDBD
                                                    • GetStockObject.GDI32(00000007), ref: 0041DDCB
                                                    • GetStockObject.GDI32(00000005), ref: 0041DDD7
                                                    • GetStockObject.GDI32(0000000D), ref: 0041DDE3
                                                    • LoadIconA.USER32(00000000,00007F00), ref: 0041DDF4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ObjectStock$A24620A480A570IconLoad
                                                    • String ID:
                                                    • API String ID: 3573811560-0
                                                    • Opcode ID: 79ba34301ffdcd870fce82e69020cd4fb5d8953881da513776c9bfc891f1925d
                                                    • Instruction ID: bf46a9fe5e63f1af167cdf0a983a4ac464f15f0dd566559e746e50b59b955e29
                                                    • Opcode Fuzzy Hash: 79ba34301ffdcd870fce82e69020cd4fb5d8953881da513776c9bfc891f1925d
                                                    • Instruction Fuzzy Hash: A11130706453419AE740BF655992BA63690DB64748F01813FF609AF2D2DB7A0C448B5E
                                                    APIs
                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 0045FBFC
                                                    • SetCursor.USER32(00000000,00000000,00007F02,00000000,0045FC91), ref: 0045FC02
                                                    • SetCursor.USER32(?,0045FC79,00007F02,00000000,0045FC91), ref: 0045FC6C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Cursor$Load
                                                    • String ID: $ $Internal error: Item already expanding
                                                    • API String ID: 1675784387-1948079669
                                                    • Opcode ID: 2a5e59fbc60391709db9e707cfb1b81175e986b7537cdf1dfc64ada719463c73
                                                    • Instruction ID: 7a834110d2e8282c1345bf2880c47fa17af2e43f078088a6ac64f542608522eb
                                                    • Opcode Fuzzy Hash: 2a5e59fbc60391709db9e707cfb1b81175e986b7537cdf1dfc64ada719463c73
                                                    • Instruction Fuzzy Hash: 81B14B30600604DFD711EF69C586B9ABBF1AF05305F1485BAE845AB7A3C778AD4CCB1A
                                                    APIs
                                                    • GetSystemDefaultLCID.KERNEL32(00000000,004088D0,?,?,?,?,00000000,00000000,00000000,?,004098D7,00000000,004098EA), ref: 004086A2
                                                      • Part of subcall function 004084D0: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004964C0,00000001,?,0040859B,?,00000000,0040867A), ref: 004084EE
                                                      • Part of subcall function 0040851C: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040871E,?,?,?,00000000,004088D0), ref: 0040852F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale$DefaultSystem
                                                    • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                    • API String ID: 1044490935-665933166
                                                    • Opcode ID: d28892a32a3756e591db26ccf56d4423c4b5dcf68a3e55eb2d1216e614db25d0
                                                    • Instruction ID: f7723302c3cbbcbb01f246a146743d61dec29c667e41bc47a3323a0acc4546db
                                                    • Opcode Fuzzy Hash: d28892a32a3756e591db26ccf56d4423c4b5dcf68a3e55eb2d1216e614db25d0
                                                    • Instruction Fuzzy Hash: CB514A35B00248ABDB01FBAA8941A9F7769DB98308F50D47FA141BB3C6DE3DDA05871D
                                                    APIs
                                                    • GetVersion.KERNEL32(00000000,00411869), ref: 004116FC
                                                    • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 004117BA
                                                      • Part of subcall function 00411A1C: CreatePopupMenu.USER32 ref: 00411A36
                                                    • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 00411846
                                                      • Part of subcall function 00411A1C: CreateMenu.USER32 ref: 00411A40
                                                    • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 0041182D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Menu$Insert$Create$ItemPopupVersion
                                                    • String ID: ,$?
                                                    • API String ID: 2359071979-2308483597
                                                    • Opcode ID: 707202716ce0eacd73986422125e9cfc2c5bbafe0b917296af86786c7eb30df7
                                                    • Instruction ID: 3f3527f43cca8a4f6c45e7f3696c032b38f9f6d147acb0657ff8a7652be0e8fd
                                                    • Opcode Fuzzy Hash: 707202716ce0eacd73986422125e9cfc2c5bbafe0b917296af86786c7eb30df7
                                                    • Instruction Fuzzy Hash: CC511774A001409BDB10EF6ADC81ADA7BF9BF49304B1585BBF904E73A6D738C942CB58
                                                    APIs
                                                    • GetObjectA.GDI32(?,00000018,?), ref: 0041BE98
                                                    • GetObjectA.GDI32(?,00000018,?), ref: 0041BEA7
                                                    • GetBitmapBits.GDI32(?,?,?), ref: 0041BEF8
                                                    • GetBitmapBits.GDI32(?,?,?), ref: 0041BF06
                                                    • DeleteObject.GDI32(?), ref: 0041BF0F
                                                    • DeleteObject.GDI32(?), ref: 0041BF18
                                                    • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BF35
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Object$BitmapBitsDelete$CreateIcon
                                                    • String ID:
                                                    • API String ID: 1030595962-0
                                                    • Opcode ID: c7b0e75b457b54f40c973da1b74c3022c367d96584a0130cfc4ac672875a8614
                                                    • Instruction ID: 2920a3410ecffe373541ee6f53742fd475180ef7da711f6faed1b6e94a947089
                                                    • Opcode Fuzzy Hash: c7b0e75b457b54f40c973da1b74c3022c367d96584a0130cfc4ac672875a8614
                                                    • Instruction Fuzzy Hash: 0C510571E00219AFCB14DFA9D8819EEB7F9EF48314B11446AF914E7391D738AD81CB64
                                                    APIs
                                                    • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CE6E
                                                    • 73A24620.GDI32(00000000,00000026), ref: 0041CE8D
                                                    • 73A18830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CEF3
                                                    • 73A122A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CF02
                                                    • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CF6C
                                                    • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041CFAA
                                                    • 73A18830.GDI32(?,?,00000001,0041CFDC,00000000,00000026), ref: 0041CFCF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Stretch$A18830$A122A24620BitsMode
                                                    • String ID:
                                                    • API String ID: 430401518-0
                                                    • Opcode ID: 132354002ca2fdf89728bebe702e6aaf01ac2d906efdfd832a76dcf97bd27496
                                                    • Instruction ID: 0295d75a013be80ecc2d975aeb153abe1d20fbb24d7cab5e263b7fb8805ed029
                                                    • Opcode Fuzzy Hash: 132354002ca2fdf89728bebe702e6aaf01ac2d906efdfd832a76dcf97bd27496
                                                    • Instruction Fuzzy Hash: 6A512970644600AFDB14DFA8C985FABBBF9AF08304F10459AF544DB292C778ED80CB58
                                                    APIs
                                                    • SendMessageA.USER32(00000000,?,?), ref: 0045559A
                                                      • Part of subcall function 004241EC: GetWindowTextA.USER32(?,?,00000100), ref: 0042420C
                                                      • Part of subcall function 0041EE14: GetCurrentThreadId.KERNEL32 ref: 0041EE63
                                                      • Part of subcall function 0041EE14: 73A25940.USER32(00000000,0041EDC4,00000000,00000000,0041EE80,?,00000000,0041EEB7,?,0042E908,?,00000001), ref: 0041EE69
                                                      • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00455601
                                                    • TranslateMessage.USER32(?), ref: 0045561F
                                                    • DispatchMessageA.USER32(?), ref: 00455628
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Message$TextWindow$A25940CurrentDispatchSendThreadTranslate
                                                    • String ID: [Paused]
                                                    • API String ID: 3047529653-4230553315
                                                    • Opcode ID: 87131fbabeff61aa087494a9bd6cb99b56a273a61ad0d92f36d1ca736c741be7
                                                    • Instruction ID: 1ea6cdf9f8c4d0006da5c53b80d4ab4df920001bdb03266b2b95788fb80fd04e
                                                    • Opcode Fuzzy Hash: 87131fbabeff61aa087494a9bd6cb99b56a273a61ad0d92f36d1ca736c741be7
                                                    • Instruction Fuzzy Hash: AA31E6309046886ECB11DBB5DC51BEEBBB8EB49314F91447BE804E7292D73C9909CB2D
                                                    APIs
                                                    • GetCursor.USER32(00000000,004676D3), ref: 00467650
                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 0046765E
                                                    • SetCursor.USER32(00000000,00000000,00007F02,00000000,004676D3), ref: 00467664
                                                    • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,004676D3), ref: 0046766E
                                                    • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,004676D3), ref: 00467674
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Cursor$LoadSleep
                                                    • String ID: CheckPassword
                                                    • API String ID: 4023313301-1302249611
                                                    • Opcode ID: 427c957dfc0c64996b45f6a9b27dff83d91464bfc18a5641d5cc6e4799274181
                                                    • Instruction ID: d11766500dfbebf7a637d4994fcf4657e507efc69e34d224277bfb6294cb5352
                                                    • Opcode Fuzzy Hash: 427c957dfc0c64996b45f6a9b27dff83d91464bfc18a5641d5cc6e4799274181
                                                    • Instruction Fuzzy Hash: 4531D334648704AFD701EB29C88AF9E7BE4AF05318F5580B6F8049F3A2E7789D00CB59
                                                    APIs
                                                    • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 00457F4B
                                                    Strings
                                                    • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 00457F56
                                                    • CreateAssemblyCache, xrefs: 00457F42
                                                    • Failed to load .NET Framework DLL "%s", xrefs: 00457F30
                                                    • Fusion.dll, xrefs: 00457EEB
                                                    • .NET Framework CreateAssemblyCache function failed, xrefs: 00457F6E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc
                                                    • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                    • API String ID: 190572456-3990135632
                                                    • Opcode ID: 9d1563ff9ecb901e69dd8b05e73535bfa4abecff0222a3c56b2ce7831d20d8ec
                                                    • Instruction ID: a43b4c24682a544c2646696e4a275acb35fc84741e5fc719d5cb135cb267c29f
                                                    • Opcode Fuzzy Hash: 9d1563ff9ecb901e69dd8b05e73535bfa4abecff0222a3c56b2ce7831d20d8ec
                                                    • Instruction Fuzzy Hash: 5331A771E046096FCB11EFA5D881A9FB7B4AF04715F50857AF814A7382DB3899088799
                                                    APIs
                                                      • Part of subcall function 0041BFB8: GetObjectA.GDI32(?,00000018), ref: 0041BFC5
                                                    • GetFocus.USER32 ref: 0041C0D8
                                                    • 73A1A570.USER32(?), ref: 0041C0E4
                                                    • 73A18830.GDI32(?,?,00000000,00000000,0041C163,?,?), ref: 0041C105
                                                    • 73A122A0.GDI32(?,?,?,00000000,00000000,0041C163,?,?), ref: 0041C111
                                                    • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C128
                                                    • 73A18830.GDI32(?,00000000,00000000,0041C16A,?,?), ref: 0041C150
                                                    • 73A1A480.USER32(?,?,0041C16A,?,?), ref: 0041C15D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: A18830$A122A480A570BitsFocusObject
                                                    • String ID:
                                                    • API String ID: 2231653193-0
                                                    • Opcode ID: b5ec816d879f7673cf2204928d24ade75243476a1e646848f60b5da6794254d2
                                                    • Instruction ID: be6d8328aec04e85a436dd0cf8ae2147a44d9b66c6d411dca3268b31211d8f12
                                                    • Opcode Fuzzy Hash: b5ec816d879f7673cf2204928d24ade75243476a1e646848f60b5da6794254d2
                                                    • Instruction Fuzzy Hash: B2116A71A40618BFDB10DBA9CC86FAFB7FCEF48700F54446AB514E7281D6789D008B68
                                                    APIs
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0047E5CC), ref: 0047E5B1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                    • API String ID: 47109696-2530820420
                                                    • Opcode ID: 2ef11d81c2f0073f3a0d78f6ba1eff764fcffbbddec84b22b1921f8f1a6f3ec2
                                                    • Instruction ID: 6db25a950214c5a285eb55075c3ceab9d6d0580579eb9920bdd8e9c14b595797
                                                    • Opcode Fuzzy Hash: 2ef11d81c2f0073f3a0d78f6ba1eff764fcffbbddec84b22b1921f8f1a6f3ec2
                                                    • Instruction Fuzzy Hash: D9118430714109AADB10E6A788417DB7BA99B5931CF51C5B6A804E7281E778DA05D71C
                                                    APIs
                                                    • SelectObject.GDI32(00000000,?), ref: 0041B3E0
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B3EF
                                                    • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B41B
                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041B429
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B437
                                                    • DeleteDC.GDI32(00000000), ref: 0041B440
                                                    • DeleteDC.GDI32(?), ref: 0041B449
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ObjectSelect$Delete$Stretch
                                                    • String ID:
                                                    • API String ID: 1458357782-0
                                                    • Opcode ID: 5d8119482a24acdf9dbc4f71c87d898742faec31f652e860e6f74a5bb4e0366a
                                                    • Instruction ID: 073f11bba2386bee955988a390c3df6f0cbda7ed7a331810ab0cae2060ca734e
                                                    • Opcode Fuzzy Hash: 5d8119482a24acdf9dbc4f71c87d898742faec31f652e860e6f74a5bb4e0366a
                                                    • Instruction Fuzzy Hash: F9114C72E40659ABDF10D6D9D985FAFB3BCEF08704F048456B614FB242C678A8418B54
                                                    APIs
                                                    • 73A1A570.USER32(00000000,?,?,00000000), ref: 0048FEB5
                                                      • Part of subcall function 0041A158: CreateFontIndirectA.GDI32(?), ref: 0041A217
                                                    • SelectObject.GDI32(00000000,00000000), ref: 0048FED7
                                                    • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,0049042D), ref: 0048FEEB
                                                    • GetTextMetricsA.GDI32(00000000,?), ref: 0048FF0D
                                                    • 73A1A480.USER32(00000000,00000000,0048FF37,0048FF30,?,00000000,?,?,00000000), ref: 0048FF2A
                                                    Strings
                                                    • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 0048FEE2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                                    • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                    • API String ID: 1435929781-222967699
                                                    • Opcode ID: f36c86f8cc66506b7807a573fc54b2c22a552e3815d576e6716b5e0c7d3d7ae0
                                                    • Instruction ID: 22738baed93f493b9476ae99ec544abefdbc15220e016e5f72ce0cdf583b82f4
                                                    • Opcode Fuzzy Hash: f36c86f8cc66506b7807a573fc54b2c22a552e3815d576e6716b5e0c7d3d7ae0
                                                    • Instruction Fuzzy Hash: 1C016576604604AFDB00EAE9CC41F5EB3ECDB49704F510477B700E7281D678AD008B68
                                                    APIs
                                                    • GetCursorPos.USER32 ref: 0042331F
                                                    • WindowFromPoint.USER32(?,?), ref: 0042332C
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0042333A
                                                    • GetCurrentThreadId.KERNEL32 ref: 00423341
                                                    • SendMessageA.USER32(00000000,00000084,?,?), ref: 0042335A
                                                    • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423371
                                                    • SetCursor.USER32(00000000), ref: 00423383
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                    • String ID:
                                                    • API String ID: 1770779139-0
                                                    • Opcode ID: 60706cbef7e7fd969e6117079794ea181f59045882c2055e97c618c29bc945ad
                                                    • Instruction ID: 4e500bdd1cb7c406dcecfc45487f359b17b305850d12e3c552a5b3a09f906ed3
                                                    • Opcode Fuzzy Hash: 60706cbef7e7fd969e6117079794ea181f59045882c2055e97c618c29bc945ad
                                                    • Instruction Fuzzy Hash: EC01D4223043103AD620BB795C86E3F26A8CFC5B55F50417FB909BE283DA3D8D0163AD
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 0048FCD8
                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 0048FCE5
                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0048FCF2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule
                                                    • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                    • API String ID: 667068680-2254406584
                                                    • Opcode ID: 4afe655d4be231ed049f5d4b63eca7bbb54b8877985ad86c6801b3ab239a4553
                                                    • Instruction ID: 03cd06ae35337b2e61cf00625c9be0ffe869972f6292e7a5317be99615af05d2
                                                    • Opcode Fuzzy Hash: 4afe655d4be231ed049f5d4b63eca7bbb54b8877985ad86c6801b3ab239a4553
                                                    • Instruction Fuzzy Hash: 3AF0F692B41B1866E62035BA4C81A7F61CCCB86760F140937BF46AB382F96C9C0D43ED
                                                    APIs
                                                    • GetProcAddress.KERNEL32(00800000,BZ2_bzDecompressInit), ref: 0045BD6D
                                                    • GetProcAddress.KERNEL32(00800000,BZ2_bzDecompress), ref: 0045BD7D
                                                    • GetProcAddress.KERNEL32(00800000,BZ2_bzDecompressEnd), ref: 0045BD8D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc
                                                    • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                    • API String ID: 190572456-212574377
                                                    • Opcode ID: e6e2d7970eb20b2f2d3a2813d8870e9f0062fcf45f3e9ec5bea086149b4b188d
                                                    • Instruction ID: 56c68a15e36e3577f8296096390340765d2f33f8892a2948cb77f36bf455d425
                                                    • Opcode Fuzzy Hash: e6e2d7970eb20b2f2d3a2813d8870e9f0062fcf45f3e9ec5bea086149b4b188d
                                                    • Instruction Fuzzy Hash: 55F01DB2D18700DADB04DF32AC8176236A5E768316F14803BAA45562A2D77C084CCB5C
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(oleacc.dll,?,0044EABD), ref: 0044C21F
                                                    • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C230
                                                    • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C240
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                    • API String ID: 2238633743-1050967733
                                                    • Opcode ID: 070ab4bd4afa3ae6b6d67b7cdbce7e38f91889c9ccd0faa5c964c3c5c3461b15
                                                    • Instruction ID: 433fed67622e38403ad12c2b69c23a269c66bc576510ece0f105dc57e33200d4
                                                    • Opcode Fuzzy Hash: 070ab4bd4afa3ae6b6d67b7cdbce7e38f91889c9ccd0faa5c964c3c5c3461b15
                                                    • Instruction Fuzzy Hash: 76F0FEB0A427018AEB50ABF5DDC57123294F32070CF1951BBA001561A1C7FE5588CA2D
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0049055E,QueryCancelAutoPlay,0049343C), ref: 0042E76A
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E770
                                                    • InterlockedExchange.KERNEL32(00496660,00000001), ref: 0042E781
                                                    • ChangeWindowMessageFilter.USER32(0000C1C1,00000001), ref: 0042E792
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressChangeExchangeFilterHandleInterlockedMessageModuleProcWindow
                                                    • String ID: ChangeWindowMessageFilter$user32.dll
                                                    • API String ID: 1365377179-2498399450
                                                    • Opcode ID: fa00e12cc4cdf4861ecf6d36c6a3bf7660c016f9e535c548e0154396b519efb6
                                                    • Instruction ID: 0b0503ffc39751afc322a6ee3a4e58809baba8ea613a81ff3af562a8b1a90306
                                                    • Opcode Fuzzy Hash: fa00e12cc4cdf4861ecf6d36c6a3bf7660c016f9e535c548e0154396b519efb6
                                                    • Instruction Fuzzy Hash: 7FE0ECA1741310EAEA207BA27D8AF5A39949764715F51403BF104651E2C6BD0C40C91C
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,00493432), ref: 004741B6
                                                    • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 004741C3
                                                    • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 004741D3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule
                                                    • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                    • API String ID: 667068680-222143506
                                                    • Opcode ID: c5d394108c0eaa0ce82741e7efda8094be80f38f20ddfcf1ed56e23def093627
                                                    • Instruction ID: 900be8b269e25e49a52aef8f82c4d31534d840d8b5c460cd7d1cacf93ec9ae33
                                                    • Opcode Fuzzy Hash: c5d394108c0eaa0ce82741e7efda8094be80f38f20ddfcf1ed56e23def093627
                                                    • Instruction Fuzzy Hash: CFC0C9E0685700E9AA00B7B22CC2D762648C550B68320843BB04879292DA7C08448F2C
                                                    APIs
                                                    • GetFocus.USER32 ref: 0041B6B5
                                                    • 73A1A570.USER32(?), ref: 0041B6C1
                                                    • 73A18830.GDI32(00000000,?,00000000,00000000,0041B78C,?,?), ref: 0041B6F6
                                                    • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041B78C,?,?), ref: 0041B702
                                                    • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B76A,?,00000000,0041B78C,?,?), ref: 0041B730
                                                    • 73A18830.GDI32(00000000,00000000,00000000,0041B771,?,?,00000000,00000000,0041B76A,?,00000000,0041B78C,?,?), ref: 0041B764
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: A18830$A122A26310A570Focus
                                                    • String ID:
                                                    • API String ID: 3906783838-0
                                                    • Opcode ID: 07ef95a0fb610648cfd8636f7bb4d0994a53704ba577931f4d82accc70482d19
                                                    • Instruction ID: 06dd750ffd38faa4806619bbf82afcbb6c92213719a6bc319da55d16d67b79f4
                                                    • Opcode Fuzzy Hash: 07ef95a0fb610648cfd8636f7bb4d0994a53704ba577931f4d82accc70482d19
                                                    • Instruction Fuzzy Hash: 8E512C70A00609AFDF11DFA9C895AEEBBB8FF49704F104466F510A7390D7789981CBA9
                                                    APIs
                                                    • GetFocus.USER32 ref: 0041B987
                                                    • 73A1A570.USER32(?), ref: 0041B993
                                                    • 73A18830.GDI32(00000000,?,00000000,00000000,0041BA59,?,?), ref: 0041B9CD
                                                    • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041BA59,?,?), ref: 0041B9D9
                                                    • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BA37,?,00000000,0041BA59,?,?), ref: 0041B9FD
                                                    • 73A18830.GDI32(00000000,00000000,00000000,0041BA3E,?,?,00000000,00000000,0041BA37,?,00000000,0041BA59,?,?), ref: 0041BA31
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: A18830$A122A26310A570Focus
                                                    • String ID:
                                                    • API String ID: 3906783838-0
                                                    • Opcode ID: 6e3cb66e1f03a8473b81b7a24d1d9b736a83310d04235b0cfb06a94d2ee0ce24
                                                    • Instruction ID: 49b1e422d63778e1935042bf56866254f806bc58ba08b8974fd4ee1451f7b7cb
                                                    • Opcode Fuzzy Hash: 6e3cb66e1f03a8473b81b7a24d1d9b736a83310d04235b0cfb06a94d2ee0ce24
                                                    • Instruction Fuzzy Hash: 4F512B74A006089FCB11DFA9C895AAEBBF9FF48700F118066F904EB750D7389D40CBA8
                                                    APIs
                                                    • GetFocus.USER32 ref: 0041B4EE
                                                    • 73A1A570.USER32(?,00000000,0041B5C8,?,?,?,?), ref: 0041B4FA
                                                    • 73A24620.GDI32(?,00000068,00000000,0041B59C,?,?,00000000,0041B5C8,?,?,?,?), ref: 0041B516
                                                    • 73A4E680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B59C,?,?,00000000,0041B5C8,?,?,?,?), ref: 0041B533
                                                    • 73A4E680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B59C,?,?,00000000,0041B5C8), ref: 0041B54A
                                                    • 73A1A480.USER32(?,?,0041B5A3,?,?), ref: 0041B596
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: E680$A24620A480A570Focus
                                                    • String ID:
                                                    • API String ID: 3709697839-0
                                                    • Opcode ID: dffe9a4686f16107f5e26edd6f51779d739af283e940a3615cd9a04b614b528f
                                                    • Instruction ID: a6e4b16520c9e4bc630ca31e265eea6a5194191570467489af8bdb357d288b52
                                                    • Opcode Fuzzy Hash: dffe9a4686f16107f5e26edd6f51779d739af283e940a3615cd9a04b614b528f
                                                    • Instruction Fuzzy Hash: 2D41C571A04254AFDF10DFA9C885AAFBBB5EF49704F1484AAE900E7351D2389D10CBA5
                                                    APIs
                                                    • SetLastError.KERNEL32(00000057,00000000,0045B7F4,?,?,?,?,00000000), ref: 0045B793
                                                    • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045B860,?,00000000,0045B7F4,?,?,?,?,00000000), ref: 0045B7D2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                    • API String ID: 1452528299-1580325520
                                                    • Opcode ID: c7af221143c3757ba6277ed71e4eb1831b258c6f2836e0d3f8732b0bdbf4d2ee
                                                    • Instruction ID: e717c2d1a7dc230ecc2a2e6fa1343dbc2c1f959998bf22c76ea0b4b3804cf210
                                                    • Opcode Fuzzy Hash: c7af221143c3757ba6277ed71e4eb1831b258c6f2836e0d3f8732b0bdbf4d2ee
                                                    • Instruction Fuzzy Hash: 59117835204608AFDB11EAA2C941B6A76ADD788306F608077AD0456783D77C5F0A959D
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000B), ref: 0041BD45
                                                    • GetSystemMetrics.USER32(0000000C), ref: 0041BD4F
                                                    • 73A1A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD59
                                                    • 73A24620.GDI32(00000000,0000000E,00000000,0041BDCC,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD80
                                                    • 73A24620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BDCC,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD8D
                                                    • 73A1A480.USER32(00000000,00000000,0041BDD3,0000000E,00000000,0041BDCC,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDC6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: A24620MetricsSystem$A480A570
                                                    • String ID:
                                                    • API String ID: 4042297458-0
                                                    • Opcode ID: 1c903c0536bb10720712021bcda66a401c12054db1b22576e6386974878fa910
                                                    • Instruction ID: 8181195c8b7ace5e518c23098daf85fccaa127339f370ed271397b7e8efdaee2
                                                    • Opcode Fuzzy Hash: 1c903c0536bb10720712021bcda66a401c12054db1b22576e6386974878fa910
                                                    • Instruction Fuzzy Hash: 1F212C74E046499FEB04EFA9C941BEEB7B4EB48714F10402AF514B7680D7785940CFA9
                                                    APIs
                                                    • RtlEnterCriticalSection.KERNEL32(00496420,00000000,00401B68), ref: 00401ABD
                                                    • LocalFree.KERNEL32(008429D8,00000000,00401B68), ref: 00401ACF
                                                    • VirtualFree.KERNEL32(?,00000000,00008000,008429D8,00000000,00401B68), ref: 00401AEE
                                                    • LocalFree.KERNEL32(00840BC0,?,00000000,00008000,008429D8,00000000,00401B68), ref: 00401B2D
                                                    • RtlLeaveCriticalSection.KERNEL32(00496420,00401B6F), ref: 00401B58
                                                    • RtlDeleteCriticalSection.KERNEL32(00496420,00401B6F), ref: 00401B62
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                    • String ID:
                                                    • API String ID: 3782394904-0
                                                    • Opcode ID: d7983087b8bcbabcafc2c9d8a305f4a93e6fa46b606c4ef3e584c6169f95cf8d
                                                    • Instruction ID: bf2c7a4256457c5f50c71aa29f18f829c6f6e2c919ab822836d088e606c14c70
                                                    • Opcode Fuzzy Hash: d7983087b8bcbabcafc2c9d8a305f4a93e6fa46b606c4ef3e584c6169f95cf8d
                                                    • Instruction Fuzzy Hash: 5D118F30A403405EEB15ABE99D82F263BE59761B4CF56407BF80067AF1D77C9850C76E
                                                    APIs
                                                    • GetWindowLongA.USER32(?,000000EC), ref: 004793A6
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,00468BAA), ref: 004793CC
                                                    • GetWindowLongA.USER32(?,000000EC), ref: 004793DC
                                                    • SetWindowLongA.USER32(?,000000EC,00000000), ref: 004793FD
                                                    • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 00479411
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047942D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$Show
                                                    • String ID:
                                                    • API String ID: 3609083571-0
                                                    • Opcode ID: 4baeb040c659457baa0950dbacd770f195bd58bd2d58639cdb23a12d95b308bb
                                                    • Instruction ID: e3a65d3b9f85db97a5af4074bbeb3f09705f22e1ba9b6b5c7efdea1cb04967d6
                                                    • Opcode Fuzzy Hash: 4baeb040c659457baa0950dbacd770f195bd58bd2d58639cdb23a12d95b308bb
                                                    • Instruction Fuzzy Hash: 8E015EB1685310ABD700D7A8DD81F663B98AB1D330F06426AB958EF3E7C639DC048B58
                                                    APIs
                                                      • Part of subcall function 0041A650: CreateBrushIndirect.GDI32 ref: 0041A6BB
                                                    • UnrealizeObject.GDI32(00000000), ref: 0041B1EC
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B1FE
                                                    • SetBkColor.GDI32(?,00000000), ref: 0041B221
                                                    • SetBkMode.GDI32(?,00000002), ref: 0041B22C
                                                    • SetBkColor.GDI32(?,00000000), ref: 0041B247
                                                    • SetBkMode.GDI32(?,00000001), ref: 0041B252
                                                      • Part of subcall function 00419FC8: GetSysColor.USER32(?), ref: 00419FD2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                    • String ID:
                                                    • API String ID: 3527656728-0
                                                    • Opcode ID: af92fd76f0ea33d52ebd072e8e43ea1c00ff5cbe0803c9f3aa53dd55169beb2c
                                                    • Instruction ID: 2be34f36c4bf399c8fa5e8a938e63ded300dcfd20fe04f8c9e05bbd916d2a40e
                                                    • Opcode Fuzzy Hash: af92fd76f0ea33d52ebd072e8e43ea1c00ff5cbe0803c9f3aa53dd55169beb2c
                                                    • Instruction Fuzzy Hash: 84F0BFB1511101ABCE00FFBAD9CAE4B27A89F443097048057B944DF19BC63CDC504B3E
                                                    APIs
                                                    • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 004725D6
                                                    • 73A259E0.USER32(00000000,000000FC,00472534,00000000,00472766,?,00000000,0047278B), ref: 004725FD
                                                    • GetACP.KERNEL32(00000000,00472766,?,00000000,0047278B), ref: 0047263A
                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00472680
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: A259ClassInfoMessageSend
                                                    • String ID: COMBOBOX
                                                    • API String ID: 3217714596-1136563877
                                                    • Opcode ID: a2a38fe825d86b9de6391f005fc952941fe7c1aa0daffd7e77b337ad2e4f891f
                                                    • Instruction ID: 3ae8385bc590c0542e92691a5aff6a427208ab959fbf931701ec20cc98185c60
                                                    • Opcode Fuzzy Hash: a2a38fe825d86b9de6391f005fc952941fe7c1aa0daffd7e77b337ad2e4f891f
                                                    • Instruction Fuzzy Hash: 25514F34A042059FCB14DF65DA85EDAB7B5EB49304F15C0BBE808EB362D778AD41CB98
                                                    APIs
                                                      • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                    • ShowWindow.USER32(?,00000005,00000000,0049290D,?,?,00000000), ref: 004926DE
                                                      • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                                      • Part of subcall function 00407210: SetCurrentDirectoryA.KERNEL32(00000000,?,00492706,00000000,004928D9,?,?,00000005,00000000,0049290D,?,?,00000000), ref: 0040721B
                                                      • Part of subcall function 0042D328: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D3B6,?,?,00000000,?,?,00492710,00000000,004928D9,?,?,00000005), ref: 0042D35D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                    • String ID: .dat$.msg$IMsg$Uninstall
                                                    • API String ID: 3312786188-1660910688
                                                    • Opcode ID: d802c0b3ee5a095353c795a11e766ed6f08cd000d056080e843878224d10d409
                                                    • Instruction ID: e5dac0791de011647aa7169d011a234a935d7f9afe33f293006ad98489edb6ae
                                                    • Opcode Fuzzy Hash: d802c0b3ee5a095353c795a11e766ed6f08cd000d056080e843878224d10d409
                                                    • Instruction Fuzzy Hash: 8A316434A10214AFCB01EF65DD5295EBBB5FB49304F91847AF400A7356CB78AD01DB69
                                                    APIs
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    • RegCloseKey.ADVAPI32(?,0048D9CE,?,?,00000001,00000000,00000000,0048D9E9), ref: 0048D9B7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: PI$%s\%s_is1$Inno Setup CodeFile: $Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                    • API String ID: 47109696-2023862778
                                                    • Opcode ID: c66c3a32dc4815bcaedbf61892b053120f13c88c3badf276267091914bc08b47
                                                    • Instruction ID: 05f0ef62881b2b80d86d0044578cd6af9af4eb013db1341f8811af2171cefcfd
                                                    • Opcode Fuzzy Hash: c66c3a32dc4815bcaedbf61892b053120f13c88c3badf276267091914bc08b47
                                                    • Instruction Fuzzy Hash: 19314174E042546FDB01EFA9CC51A9EBBF9EB48704F90487AE404E7391D778AE058B58
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042E802
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E808
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042E831
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressByteCharHandleModuleMultiProcWide
                                                    • String ID: ShutdownBlockReasonCreate$user32.dll
                                                    • API String ID: 828529508-2866557904
                                                    • Opcode ID: a8508c04b9d2f5bfbb96bb821981feec28a03bb8c83af4d38bd3e4f3c08e389f
                                                    • Instruction ID: ad48e71c188330483611c0ccbf5126987ea3f08380f38d7ba2466a98a55f956a
                                                    • Opcode Fuzzy Hash: a8508c04b9d2f5bfbb96bb821981feec28a03bb8c83af4d38bd3e4f3c08e389f
                                                    • Instruction Fuzzy Hash: 35F0C2D138066176E620B2BBAC82F6B158C8F94765F540036F148EB2C2EA6CC905426E
                                                    APIs
                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00456298
                                                    • GetExitCodeProcess.KERNEL32(?,00492FF2), ref: 004562B9
                                                    • CloseHandle.KERNEL32(?,004562EC,?,?,00456B07,00000000,00000000), ref: 004562DF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                    • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                    • API String ID: 2573145106-3235461205
                                                    • Opcode ID: 21d03c53b01fde65cdd9703383dfafc07d6d1bed5277dfcd15acae912a66671b
                                                    • Instruction ID: 30010b37e156efe240ce284c3751ee9f3f87d85e2b6a261707359958cd490efa
                                                    • Opcode Fuzzy Hash: 21d03c53b01fde65cdd9703383dfafc07d6d1bed5277dfcd15acae912a66671b
                                                    • Instruction Fuzzy Hash: 9801A234604204AFDB10FBA98D12A2A77E8EB49710F9104B7F910E73D3DA7D9D08861C
                                                    APIs
                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 004733F0
                                                    • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004734E7,0pI,00000000), ref: 00473403
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00473409
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProcProcessThreadWindow
                                                    • String ID: AllowSetForegroundWindow$user32.dll
                                                    • API String ID: 1782028327-3855017861
                                                    • Opcode ID: 413bf3bc10bfeb5148ad9fb948102942cda30883870591904b77865dc8fbdc3b
                                                    • Instruction ID: 2946c9a10b532315efb5f5856f5d08ef97c55f51666b490e3567cf9e0671b05f
                                                    • Opcode Fuzzy Hash: 413bf3bc10bfeb5148ad9fb948102942cda30883870591904b77865dc8fbdc3b
                                                    • Instruction Fuzzy Hash: B8D0A790210B0075D9157BF54D46D5F324C8D84712750C43B3444F3187CA3CDE006A7D
                                                    APIs
                                                    • BeginPaint.USER32(00000000,?), ref: 00416BC2
                                                    • SaveDC.GDI32(?), ref: 00416BF3
                                                    • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416CB5), ref: 00416C54
                                                    • RestoreDC.GDI32(?,?), ref: 00416C7B
                                                    • EndPaint.USER32(00000000,?,00416CBC,00000000,00416CB5), ref: 00416CAF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                    • String ID:
                                                    • API String ID: 3808407030-0
                                                    • Opcode ID: c06abe95da4831753d63b9634986ca39a884699dacb8f14d7531f4240f3d7fe3
                                                    • Instruction ID: 41fb8ea60d97978a9acdf236596d3a8a0d8a1996066437b2b943a95edf1585a8
                                                    • Opcode Fuzzy Hash: c06abe95da4831753d63b9634986ca39a884699dacb8f14d7531f4240f3d7fe3
                                                    • Instruction Fuzzy Hash: BF414E70A042049FDB14DB99C989FAA77F9EB48304F1580AEE4459B362D778DD40CB58
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 50d6a748b1b1338860e82f27f8761871ff193d734180217a0f8d82b491afa6e7
                                                    • Instruction ID: 41a7722d09b35ce9ade17cd18fdec9692d257bae8bd1aa266952c484067d5cda
                                                    • Opcode Fuzzy Hash: 50d6a748b1b1338860e82f27f8761871ff193d734180217a0f8d82b491afa6e7
                                                    • Instruction Fuzzy Hash: D3311F746047409FC320EB69C584BABB7E8AF89714F04991EF9E5C7791D738EC818B19
                                                    APIs
                                                    • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429778
                                                    • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 004297A7
                                                    • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 004297C3
                                                    • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 004297EE
                                                    • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 0042980C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: fe9210cf49636514123fe8028928f87ce2f158866a525e02be5b173165c2f537
                                                    • Instruction ID: 5c059f72bad19c8464015bcf3ba3f3fa2ba546ca9f5ab3c2e37583cf1b766786
                                                    • Opcode Fuzzy Hash: fe9210cf49636514123fe8028928f87ce2f158866a525e02be5b173165c2f537
                                                    • Instruction Fuzzy Hash: 2E217F70710714BAE710ABA6DC82F5B77ACEB46708F90443EB501BB3D2DB78AD41865C
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000B), ref: 0041BB3A
                                                    • GetSystemMetrics.USER32(0000000C), ref: 0041BB44
                                                    • 73A1A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BB82
                                                    • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BCED,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BBC9
                                                    • DeleteObject.GDI32(00000000), ref: 0041BC0A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$A26310A570DeleteObject
                                                    • String ID:
                                                    • API String ID: 4277397052-0
                                                    • Opcode ID: cb0e2adf6529593e89f90c831e9305c3e05f521d232314fc64d16b3fc11dbc77
                                                    • Instruction ID: e64c8cfb77975bfe1c5019289902123c5e37d94f13133d85ba8c481b6df62587
                                                    • Opcode Fuzzy Hash: cb0e2adf6529593e89f90c831e9305c3e05f521d232314fc64d16b3fc11dbc77
                                                    • Instruction Fuzzy Hash: 91316F74E00609EFDB00DFA5C941AAEB7F4EB48700F10846AF510AB781D7389E80DB98
                                                    APIs
                                                      • Part of subcall function 0045B728: SetLastError.KERNEL32(00000057,00000000,0045B7F4,?,?,?,?,00000000), ref: 0045B793
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,0046F4E8,?,?,00000001,00497154), ref: 0046F4A1
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,0046F4E8,?,?,00000001,00497154), ref: 0046F4B7
                                                    Strings
                                                    • Failed to set permissions on registry key (%d)., xrefs: 0046F4C8
                                                    • Could not set permissions on the registry key because it currently does not exist., xrefs: 0046F4AB
                                                    • Setting permissions on registry key: %s\%s, xrefs: 0046F466
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                    • API String ID: 1452528299-4018462623
                                                    • Opcode ID: 8987c29e9593e776d1cc6786b661d3f948655e79c521dc29ff2d79227fa09661
                                                    • Instruction ID: fce19b038866ff3eb3b5c1fa07efa3b807e35e20fe70dec3c85f1bf3a4e44b72
                                                    • Opcode Fuzzy Hash: 8987c29e9593e776d1cc6786b661d3f948655e79c521dc29ff2d79227fa09661
                                                    • Instruction Fuzzy Hash: BD21C570A046445FCB10DFA9D8416AFBBE8EB59314F90407BE444E7392EB7C5D0987AA
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                    • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                    • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$AllocString
                                                    • String ID:
                                                    • API String ID: 262959230-0
                                                    • Opcode ID: bbd83879051bbb61c82a419d540aea94b1d83442c47b8cdfd9cb13069dd9a881
                                                    • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                    • Opcode Fuzzy Hash: bbd83879051bbb61c82a419d540aea94b1d83442c47b8cdfd9cb13069dd9a881
                                                    • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                    APIs
                                                    • 73A18830.GDI32(00000000,00000000,00000000), ref: 00414389
                                                    • 73A122A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414391
                                                    • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143A5
                                                    • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143AB
                                                    • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143B6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: A122A18830$A480
                                                    • String ID:
                                                    • API String ID: 3325508737-0
                                                    • Opcode ID: 194e3fff164acdd9274630c615ac113e6c237e1a8584744cad8ee02aea33715e
                                                    • Instruction ID: 94861c3129a932f854b236b0087f7367a4de39103189020794ca85cb03cdcc47
                                                    • Opcode Fuzzy Hash: 194e3fff164acdd9274630c615ac113e6c237e1a8584744cad8ee02aea33715e
                                                    • Instruction Fuzzy Hash: 6F01DF7121C3806AD200B63E8C85A9F6BED8FCA314F15556EF498DB382CA7ACC018765
                                                    APIs
                                                    • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,00476ED5,?,00000000,00000000,00000001,00000000,00475979,?,00000000), ref: 0047593D
                                                    Strings
                                                    • lG, xrefs: 004758FD
                                                    • Failed to parse "reg" constant, xrefs: 00475944
                                                    • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 004757B1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant$lG
                                                    • API String ID: 3535843008-128830
                                                    • Opcode ID: fe4c74b1f91ca2a938073c3862f638596c35a701808e708806e01654e21120b8
                                                    • Instruction ID: bfaa3df954dd94b7bb7abbcb6a54f4a9a3045adc03dc369a3f41985634750c74
                                                    • Opcode Fuzzy Hash: fe4c74b1f91ca2a938073c3862f638596c35a701808e708806e01654e21120b8
                                                    • Instruction Fuzzy Hash: 3B8134B4E00548EFCB10EFA5C481ADEBBF9AF44314F50816AE814BB391D7789E45CB99
                                                    APIs
                                                      • Part of subcall function 0041EFE4: GetActiveWindow.USER32 ref: 0041EFE7
                                                      • Part of subcall function 0041EFE4: GetCurrentThreadId.KERNEL32 ref: 0041EFFC
                                                      • Part of subcall function 0041EFE4: 73A25940.USER32(00000000,Function_0001EFC0), ref: 0041F002
                                                      • Part of subcall function 00423118: GetSystemMetrics.USER32(00000000), ref: 0042311A
                                                    • OffsetRect.USER32(?,?,?), ref: 00424D39
                                                    • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424DFC
                                                    • OffsetRect.USER32(?,?,?), ref: 00424E0D
                                                      • Part of subcall function 004234D4: GetCurrentThreadId.KERNEL32 ref: 004234E9
                                                      • Part of subcall function 004234D4: SetWindowsHookExA.USER32(00000003,00423490,00000000,00000000), ref: 004234F9
                                                      • Part of subcall function 004234D4: CreateThread.KERNEL32(00000000,000003E8,00423440,00000000,00000000), ref: 0042351D
                                                      • Part of subcall function 00424A9C: SetTimer.USER32(00000000,00000001,?,00423424), ref: 00424AB7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Thread$CurrentOffsetRect$A25940ActiveCreateDrawHookMetricsSystemTextTimerWindowWindows
                                                    • String ID: KB
                                                    • API String ID: 1906964682-1869488878
                                                    • Opcode ID: 31ea76b2cfb8b8d31d816dd8a5017424b368cc5cbf5960be82e685410b9ea4b3
                                                    • Instruction ID: 8a1ca8d85bab54549b4d9d093631307a73357c8a1ef7de59c5480922928757da
                                                    • Opcode Fuzzy Hash: 31ea76b2cfb8b8d31d816dd8a5017424b368cc5cbf5960be82e685410b9ea4b3
                                                    • Instruction Fuzzy Hash: D6811771A002189FDB14DFA8D884ADEBBB5FF48314F5045AAE904AB296DB38AD45CF44
                                                    APIs
                                                    • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00406F6B
                                                    • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00406FE5
                                                    • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 0040703D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Enum$NameOpenResourceUniversal
                                                    • String ID: Z
                                                    • API String ID: 3604996873-1505515367
                                                    • Opcode ID: 92ba5960390d49c3d5abeb35786e3f2b2430fe15f73cbae2fbe59e8f9896e220
                                                    • Instruction ID: f15ffb13b1197877662b480f320dceb00dd84bb003a9336f5ebe52512d9587e7
                                                    • Opcode Fuzzy Hash: 92ba5960390d49c3d5abeb35786e3f2b2430fe15f73cbae2fbe59e8f9896e220
                                                    • Instruction Fuzzy Hash: B2515170E042099FDB11EF55C941A9EBBB9FB09304F5041BAE540BB3D1C778AE418F5A
                                                    APIs
                                                    • SetRectEmpty.USER32(?), ref: 0044CA82
                                                    • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044CAAD
                                                    • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044CB35
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: DrawText$EmptyRect
                                                    • String ID:
                                                    • API String ID: 182455014-2867612384
                                                    • Opcode ID: 5a5e35c0b9927254283f6f5e6f6635baca0854ca160d1567389dd8ac40fd3719
                                                    • Instruction ID: f2b81961a5c9452665bafda12c1e8f4b26a8e6b06f7f6a997a3587ccb4a7b75e
                                                    • Opcode Fuzzy Hash: 5a5e35c0b9927254283f6f5e6f6635baca0854ca160d1567389dd8ac40fd3719
                                                    • Instruction Fuzzy Hash: 6B516171900248AFDB50DFA5C8C5BDEBBF9EF49308F08447AE845EB251D778A944CB64
                                                    APIs
                                                    • 73A1A570.USER32(00000000,00000000,0042EB20,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042E9F6
                                                      • Part of subcall function 0041A158: CreateFontIndirectA.GDI32(?), ref: 0041A217
                                                    • SelectObject.GDI32(?,00000000), ref: 0042EA19
                                                    • 73A1A480.USER32(00000000,?,0042EB05,00000000,0042EAFE,?,00000000,00000000,0042EB20,?,?,?,?,00000000,00000000,00000000), ref: 0042EAF8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: A480A570CreateFontIndirectObjectSelect
                                                    • String ID: ...\
                                                    • API String ID: 2998766281-983595016
                                                    • Opcode ID: bfdbce468e6f78164e3d5997831c51c35a992f8f2b6219fe5b279da070e12fc4
                                                    • Instruction ID: f87e9a1f05be7c7dd371759d08ccf2a788e9820b1ab6f676742360811e2f955b
                                                    • Opcode Fuzzy Hash: bfdbce468e6f78164e3d5997831c51c35a992f8f2b6219fe5b279da070e12fc4
                                                    • Instruction Fuzzy Hash: 66315270B00128ABDF11EB9AD841BAEBBB8FF48304F91447BF410A7291D7789E45CA59
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004917A5,_iu,?,00000000,004525FE), ref: 004525B3
                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004917A5,_iu,?,00000000,004525FE), ref: 004525C3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateFileHandle
                                                    • String ID: .tmp$_iu
                                                    • API String ID: 3498533004-10593223
                                                    • Opcode ID: 0390d67cb0cdb1cdfe7b265348a3f126b325b0e84e7214b7738f97ac8063fbc8
                                                    • Instruction ID: e65077276ccf3fce125a3b1cef4711b6e1a57cb68d75bf9d1e013844d831b580
                                                    • Opcode Fuzzy Hash: 0390d67cb0cdb1cdfe7b265348a3f126b325b0e84e7214b7738f97ac8063fbc8
                                                    • Instruction Fuzzy Hash: CF31B870A40209ABCB11EBA5C942B9EBBB5AF45309F60447BF804B73C2E7785F05876D
                                                    APIs
                                                    • GetClassInfoA.USER32(00400000,?,?), ref: 004163EF
                                                    • UnregisterClassA.USER32(?,00400000), ref: 0041641B
                                                    • RegisterClassA.USER32(?), ref: 0041643E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Class$InfoRegisterUnregister
                                                    • String ID: @
                                                    • API String ID: 3749476976-2766056989
                                                    • Opcode ID: 5cbec8acbea9e71dae0b2083da7465dc5d1b6b33c382e5651f178c5e9f182fd1
                                                    • Instruction ID: e8561198b81c08f142b3a544c89b4739d35f798691a26b07e42a1fbbf62ba06a
                                                    • Opcode Fuzzy Hash: 5cbec8acbea9e71dae0b2083da7465dc5d1b6b33c382e5651f178c5e9f182fd1
                                                    • Instruction Fuzzy Hash: 94316E706042058BD760EF68C981B9B77E5AB88308F04447FF985DB392DB39D9448B6E
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00493389,00000000,00492BB2,?,?,00000000,00496628), ref: 00492B2C
                                                    • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00493389,00000000,00492BB2,?,?,00000000,00496628), ref: 00492B55
                                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00492B6E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: File$Attributes$Move
                                                    • String ID: isRS-%.3u.tmp
                                                    • API String ID: 3839737484-3657609586
                                                    • Opcode ID: 96c817263a69337c208493978905a76ab25535fe8716a6784b8c347cb33dcc20
                                                    • Instruction ID: b6abc3449b2c6a8d2bc093c4401a69172cf8bc832d26a9f3b7b777d09f5aa2e3
                                                    • Opcode Fuzzy Hash: 96c817263a69337c208493978905a76ab25535fe8716a6784b8c347cb33dcc20
                                                    • Instruction Fuzzy Hash: 87216171E00219AFCF00EFA9C981AAFBBF8AB44314F10457BF814B72D1D6786E018A59
                                                    APIs
                                                    • ShellExecuteEx.SHELL32(0000003C), ref: 00453D18
                                                    • GetLastError.KERNEL32(0000003C,00000000,00453D61,?,?,?), ref: 00453D29
                                                      • Part of subcall function 00453970: WaitForInputIdle.USER32(?,00000032), ref: 0045399C
                                                      • Part of subcall function 00453970: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004539BE
                                                      • Part of subcall function 00453970: GetExitCodeProcess.KERNEL32(?,?), ref: 004539CD
                                                      • Part of subcall function 00453970: CloseHandle.KERNEL32(?,004539FA,004539F3,?,?,?,00000000,?,?,00453BCD,?,?,?,00000044,00000000,00000000), ref: 004539ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Wait$CloseCodeErrorExecuteExitHandleIdleInputLastMultipleObjectsProcessShell
                                                    • String ID: ;@G$<
                                                    • API String ID: 35504260-546644179
                                                    • Opcode ID: e8b91242a12d659b0edb90bd4f2e1493ba0488e16d24a0467d27ac09c2255ed8
                                                    • Instruction ID: 33ba34e09f30df1b12b73ce0116b213a2e15e307ba7a65c56a6979caf0e15077
                                                    • Opcode Fuzzy Hash: e8b91242a12d659b0edb90bd4f2e1493ba0488e16d24a0467d27ac09c2255ed8
                                                    • Instruction Fuzzy Hash: 3C2153B0600209ABDB11DF65D8826DE7BF8AF09396F50443AF844E7381D7789E49CB98
                                                    APIs
                                                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                    • ExitProcess.KERNEL32 ref: 00404E0D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ExitMessageProcess
                                                    • String ID: Error$Runtime error at 00000000
                                                    • API String ID: 1220098344-2970929446
                                                    • Opcode ID: 8c8c0f2434a4a7f5450b7d1f87c82a5e4d49965682bc3ad0c70a84493f0d02f9
                                                    • Instruction ID: 7ca15834b35bf0f9f7e67f0c6f6a322a9a8b6c98d325c36795369cb21074e1e4
                                                    • Opcode Fuzzy Hash: 8c8c0f2434a4a7f5450b7d1f87c82a5e4d49965682bc3ad0c70a84493f0d02f9
                                                    • Instruction Fuzzy Hash: 9221B360A442418ADB11E7B9ECC1B163F919BE5348F06817BE700B73E6C67C884587AE
                                                    APIs
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 004914ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window
                                                    • String ID: (PI$/INITPROCWND=$%x $@
                                                    • API String ID: 2353593579-723503215
                                                    • Opcode ID: f8859339d020c2bdfbb15ace283c41902aee55fd26681dd3b4e3a25ee31f3165
                                                    • Instruction ID: 70e2cf0f75370ef4a96702fcae56945770e4a278af1930d40635126eb6c89731
                                                    • Opcode Fuzzy Hash: f8859339d020c2bdfbb15ace283c41902aee55fd26681dd3b4e3a25ee31f3165
                                                    • Instruction Fuzzy Hash: EA11A531B043499FDF01EBA4D841BEEBFE8EB48314F52447BE505E7291D67C99058758
                                                    APIs
                                                      • Part of subcall function 0042C6E0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C704
                                                      • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                      • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                    • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00455068
                                                    • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00455095
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                    • String ID: LoadTypeLib$RegisterTypeLib
                                                    • API String ID: 1312246647-2435364021
                                                    • Opcode ID: 10250a5388d3ee4e550ba31a3fe5ac1922547201747451197e41336d70963160
                                                    • Instruction ID: a0afcb3eee2e7d482a942a29ca59f5276f9681079562e2f4f26ed5ddc6a25d5d
                                                    • Opcode Fuzzy Hash: 10250a5388d3ee4e550ba31a3fe5ac1922547201747451197e41336d70963160
                                                    • Instruction Fuzzy Hash: B3119A30B00A04BFDB11DFA6DD61A5EBBBDDB49B05B108476FD00D3692DA399D04C654
                                                    APIs
                                                      • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                    • GetFocus.USER32 ref: 00473CE7
                                                    • GetKeyState.USER32(0000007A), ref: 00473CF9
                                                    • WaitMessage.USER32(?,00000000,00473D20,?,00000000,00473D47,?,?,00000001,00000000,?,?,?,?,0047B11F,00000000), ref: 00473D03
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: FocusMessageStateTextWaitWindow
                                                    • String ID: Wnd=$%x
                                                    • API String ID: 1381870634-2927251529
                                                    • Opcode ID: 3cb7fe4a36a7f13c83654092d8791d91489e6b2b6fc7b4b32d1a542dc2e4d1e9
                                                    • Instruction ID: cc7523eb17f6f6aa1628e13f98a2d7dd327602daf17d365f8cd224623487b23a
                                                    • Opcode Fuzzy Hash: 3cb7fe4a36a7f13c83654092d8791d91489e6b2b6fc7b4b32d1a542dc2e4d1e9
                                                    • Instruction Fuzzy Hash: 79115130604209AFC711FF65DC41A9EBBF8EB49714F5184BAF408E7641D7396E00EA6A
                                                    APIs
                                                    • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 0045540D
                                                    • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 0045549F
                                                    Strings
                                                    • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00455439
                                                    • 4II, xrefs: 00455454
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: 4II$Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)
                                                    • API String ID: 3850602802-2462613993
                                                    • Opcode ID: 7e00dbf5a0451253e09d3473d98c26a94a05d2280bd6e941967d50283516f96b
                                                    • Instruction ID: 4c570e4209e57c2caa1f7f29e601aec0370a146033672e50e1f0d2e359426f35
                                                    • Opcode Fuzzy Hash: 7e00dbf5a0451253e09d3473d98c26a94a05d2280bd6e941967d50283516f96b
                                                    • Instruction Fuzzy Hash: E811E5B16042406FD700AB29AC81B6F7A9C9791319F05403FF9859F393D3794804C7AA
                                                    APIs
                                                    • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046A590
                                                    • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046A59F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Time$File$LocalSystem
                                                    • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                    • API String ID: 1748579591-1013271723
                                                    • Opcode ID: cc245be8a82d1577430850e44f6e78df7ccebc23cfa51f4a89d8f0001b762753
                                                    • Instruction ID: a65b6893f9a7db42c2c9827e23727da8a7d1d987ad30a730bddf18d3ca5ef3b6
                                                    • Opcode Fuzzy Hash: cc245be8a82d1577430850e44f6e78df7ccebc23cfa51f4a89d8f0001b762753
                                                    • Instruction Fuzzy Hash: B311F5A040C3919AD340DF2AC44472BBAE4AB89708F04892EF9D8D6381E779C948DB77
                                                    APIs
                                                    • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00452A67
                                                      • Part of subcall function 00406EB8: DeleteFileA.KERNEL32(00000000,00496628,00492F9D,00000000,00492FF2,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EC3
                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 00452A8C
                                                      • Part of subcall function 004520A4: GetLastError.KERNEL32(00000000,00452B15,00000005,00000000,00452B4A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00492C51,00000000), ref: 004520A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: File$AttributesDeleteErrorLastMove
                                                    • String ID: DeleteFile$MoveFile
                                                    • API String ID: 3024442154-139070271
                                                    • Opcode ID: 1efb00023e2f3b5ade7778902ae8695828d7d41e96d1e586581ba2a4ec204eb2
                                                    • Instruction ID: f8b9d45963fbba9a2c353dd22a61e6c6557ef6b5226e77028bb226458c331aba
                                                    • Opcode Fuzzy Hash: 1efb00023e2f3b5ade7778902ae8695828d7d41e96d1e586581ba2a4ec204eb2
                                                    • Instruction Fuzzy Hash: 32F036757141055BE704FFA6DA5266F63ECEF4530AFA0443BB800B76C3EA7C9E094929
                                                    APIs
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 0047E4AD
                                                    • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 0047E4D0
                                                    Strings
                                                    • System\CurrentControlSet\Control\Windows, xrefs: 0047E47A
                                                    • CSDVersion, xrefs: 0047E4A4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseOpenQueryValue
                                                    • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                    • API String ID: 3677997916-1910633163
                                                    • Opcode ID: e74f1adfe30697c1088fbdf39eda33fd2962791cf27118530b94e60a65d9ea93
                                                    • Instruction ID: 70b4e4f41735eeb44a7d70a40781789a688d1f617de1adaa06e3c9e43f4886b2
                                                    • Opcode Fuzzy Hash: e74f1adfe30697c1088fbdf39eda33fd2962791cf27118530b94e60a65d9ea93
                                                    • Instruction Fuzzy Hash: 00F03B7594020DB6DF10DAD28C45BDF73BC9B04714F1086A7E918E7281E678D604CB59
                                                    APIs
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00457C5A,00000000,00457DA7,?,00000000,00000000,00000000), ref: 00457B75
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                    • API String ID: 47109696-2631785700
                                                    • Opcode ID: f9eae00d6f50b96f656bbf730e9fbbdfc34a2b3853ac091056cc615332175a87
                                                    • Instruction ID: d0e0819fb55c8f1190b2a98828cf62c2b63c39478ea79f7c0b5f5cfc857af762
                                                    • Opcode Fuzzy Hash: f9eae00d6f50b96f656bbf730e9fbbdfc34a2b3853ac091056cc615332175a87
                                                    • Instruction Fuzzy Hash: 0DF0AF317041205BC710EB1AF851B4A6689DB9131AF54403BF980D7256D77DEC0A875A
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00452762,00000000,00452805,?,?,00000000,00000000,00000000,00000000,00000000,?,00452AD1,00000000), ref: 0042D7E6
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D7EC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                    • API String ID: 1646373207-4063490227
                                                    • Opcode ID: 159a61d3abceb67132d836cbc908e23cdc840a77e135d0af2cc19f2b4bcaaff8
                                                    • Instruction ID: 4db8f333c9a0d948aa4d288d669557f69a64c6eaa67e0ad6c3f7b03414b73d9c
                                                    • Opcode Fuzzy Hash: 159a61d3abceb67132d836cbc908e23cdc840a77e135d0af2cc19f2b4bcaaff8
                                                    • Instruction Fuzzy Hash: 23E04F61B44B1112D7107ABA9C83A5B10898B88724FA0843B79A5E72C7EDBCD94A1A7D
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042E7F8), ref: 0042E88A
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E890
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                    • API String ID: 1646373207-260599015
                                                    • Opcode ID: 45ddc528c20c35e0718a7e9c00f94a1c84d7b78ddc924b0a461653c56359e4f8
                                                    • Instruction ID: 93babc8de609d28a759936f35cc35ab5444e0eee9e0897fa3c7a0f5d424eaefa
                                                    • Opcode Fuzzy Hash: 45ddc528c20c35e0718a7e9c00f94a1c84d7b78ddc924b0a461653c56359e4f8
                                                    • Instruction Fuzzy Hash: 5FD0C992352B726A6A1075FB3CD19EB02CCCE517B53A40077F684E7342EAADCC0535AD
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00493405), ref: 0044F1B3
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F1B9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: NotifyWinEvent$user32.dll
                                                    • API String ID: 1646373207-597752486
                                                    • Opcode ID: 1b77f3625f350db58ab3348097a305bf1d639b9e1269e079a5da3a737ffde695
                                                    • Instruction ID: 84f0676aae26238d79669219dc5dd421ce8b9c86ef8cbad31698c6a02a110ee9
                                                    • Opcode Fuzzy Hash: 1b77f3625f350db58ab3348097a305bf1d639b9e1269e079a5da3a737ffde695
                                                    • Instruction Fuzzy Hash: 25E012E0A01740DDEB10FBB5D942B0B3EA0EB5475DB01017BB4006619AC77C4C088B1D
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00493456,00000001,00000000,0049347A), ref: 004931DA
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 004931E0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: DisableProcessWindowsGhosting$user32.dll
                                                    • API String ID: 1646373207-834958232
                                                    • Opcode ID: 288954866f29174a2b574559f9ac7b755431419e2ea00f778515c667f85ad6c9
                                                    • Instruction ID: 4840928040dc85ac86b810352ff4c35d8c366539863576014f89c8deedef006b
                                                    • Opcode Fuzzy Hash: 288954866f29174a2b574559f9ac7b755431419e2ea00f778515c667f85ad6c9
                                                    • Instruction Fuzzy Hash: 1AB092C4642700508C203BF20C0BE1B0D48484372671400777410F50E3CE6ECB04082D
                                                    APIs
                                                      • Part of subcall function 0044B08C: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F1A9,00493405), ref: 0044B0B3
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B0CB
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B0DD
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B0EF
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B101
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B113
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B125
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B137
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B149
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B15B
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B16D
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B17F
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B191
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B1A3
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B1B5
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B1C7
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B1D9
                                                      • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B1EB
                                                    • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00493428), ref: 00460EBB
                                                    • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00460EC1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: SHPathPrepareForWriteA$shell32.dll
                                                    • API String ID: 2238633743-2683653824
                                                    • Opcode ID: 93fe2c06cf711e01664fd138f27f9ab14834f9042b92f4705049898ce8c901dd
                                                    • Instruction ID: c6d074b57e85807914eec84ee8616fe1a8135e5451870e443c9658575dc96a53
                                                    • Opcode Fuzzy Hash: 93fe2c06cf711e01664fd138f27f9ab14834f9042b92f4705049898ce8c901dd
                                                    • Instruction Fuzzy Hash: 4EB092D0A51B11E48E10B7B39C4390B1814C544B0E710493BB0607A083EB7E40044E6E
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 00413CB6
                                                    • GetDesktopWindow.USER32 ref: 00413D6E
                                                      • Part of subcall function 00418E30: 6F5BC6F0.COMCTL32(?,00000000,00413F33,00000000,00414043,?,?,00496628), ref: 00418E4C
                                                      • Part of subcall function 00418E30: ShowCursor.USER32(00000001,?,00000000,00413F33,00000000,00414043,?,?,00496628), ref: 00418E69
                                                    • SetCursor.USER32(00000000,?,?,?,?,00413A63,00000000,00413A76), ref: 00413DAC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CursorDesktopWindow$Show
                                                    • String ID:
                                                    • API String ID: 2074268717-0
                                                    • Opcode ID: 86f28fd5b8e67e4ed68fb8d3243ff4e40f6b005c19925ef4854e6769390e0e23
                                                    • Instruction ID: 370eb430aafb64f03e0c00a45e78fc31171da0b863367db60babd08861f95fe9
                                                    • Opcode Fuzzy Hash: 86f28fd5b8e67e4ed68fb8d3243ff4e40f6b005c19925ef4854e6769390e0e23
                                                    • Instruction Fuzzy Hash: 5C412A75600150AFCB10EF29F988B9677E1AB65325B17847FE404DB369DA38EC81CF58
                                                    APIs
                                                    • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 004089DD
                                                    • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408A4C
                                                    • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408AE7
                                                    • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408B26
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: LoadString$FileMessageModuleName
                                                    • String ID:
                                                    • API String ID: 704749118-0
                                                    • Opcode ID: 3ad30de8adde06992adcb1243033629fda3c93d42ee346dc6366a67b7f75c718
                                                    • Instruction ID: d4d784650a0269eb12294142f4e6c1e51b8c8d651a7e98bb559ca79e8df8d1d5
                                                    • Opcode Fuzzy Hash: 3ad30de8adde06992adcb1243033629fda3c93d42ee346dc6366a67b7f75c718
                                                    • Instruction Fuzzy Hash: 8F3141706083809FD730EB65C945B9B77E89B86304F40483FB6C8EB2D1DB7999098B67
                                                    APIs
                                                    • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E341
                                                      • Part of subcall function 0044C984: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044C9B6
                                                    • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E3C5
                                                      • Part of subcall function 0042BB24: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BB38
                                                    • IsRectEmpty.USER32(?), ref: 0044E387
                                                    • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E3AA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                    • String ID:
                                                    • API String ID: 855768636-0
                                                    • Opcode ID: 8cec2658574c2781cd46b199d30c57bcad16a5c495fe793d82a46849e2742cfe
                                                    • Instruction ID: f1327bf96be57b41a4daac13efecf4e5f8c8315b345326dd3a19bc45d13401f9
                                                    • Opcode Fuzzy Hash: 8cec2658574c2781cd46b199d30c57bcad16a5c495fe793d82a46849e2742cfe
                                                    • Instruction Fuzzy Hash: 55115E72B0030027E210BA7E8C86B6B76C99B89748F04083FB646EB383DE7DDC054399
                                                    APIs
                                                    • OffsetRect.USER32(?,?,00000000), ref: 00490324
                                                    • OffsetRect.USER32(?,00000000,?), ref: 0049033F
                                                    • OffsetRect.USER32(?,?,00000000), ref: 00490359
                                                    • OffsetRect.USER32(?,00000000,?), ref: 00490374
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: OffsetRect
                                                    • String ID:
                                                    • API String ID: 177026234-0
                                                    • Opcode ID: 97a19eecd35a996330e5ddff616d0d047c9bcbba03797eed9b922946f8ae9137
                                                    • Instruction ID: 4c31c6f684925cb9caa16eb1d7c1f9b0a5a44502720b043b88f07e8f74986840
                                                    • Opcode Fuzzy Hash: 97a19eecd35a996330e5ddff616d0d047c9bcbba03797eed9b922946f8ae9137
                                                    • Instruction Fuzzy Hash: 70214CB6704201AFD700DE69CD85E6BB7DEEBC4300F54CA2AF958C7289D634ED448796
                                                    APIs
                                                    • GetCursorPos.USER32 ref: 004171D0
                                                    • SetCursor.USER32(00000000), ref: 00417213
                                                    • GetLastActivePopup.USER32(?), ref: 0041723D
                                                    • GetForegroundWindow.USER32(?), ref: 00417244
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                    • String ID:
                                                    • API String ID: 1959210111-0
                                                    • Opcode ID: decabfd77b9cd2fc1a63c29c158c4a9157e33bbac6b9a6d0ed245d5d3675c505
                                                    • Instruction ID: 86e626badbabc243afb65fecb2564bdd41232683b3d9035b7095670fd5686afe
                                                    • Opcode Fuzzy Hash: decabfd77b9cd2fc1a63c29c158c4a9157e33bbac6b9a6d0ed245d5d3675c505
                                                    • Instruction Fuzzy Hash: BA2183313086018ACB20AB69D889AD737F1AF45714F0645ABF8589B392D73DDC86CB59
                                                    APIs
                                                    • MulDiv.KERNEL32(8B500000,00000008,?), ref: 0048FF8D
                                                    • MulDiv.KERNEL32(50142444,00000008,?), ref: 0048FFA1
                                                    • MulDiv.KERNEL32(F755D3E8,00000008,?), ref: 0048FFB5
                                                    • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 0048FFD3
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6335ae3c13ddf35d91c6dca3ece5bfa36ba83b479f3d3f49975b0228b2d303f4
                                                    • Instruction ID: 9678bff2d08b5e885a089da8a24c60995232a28bc22dbedf599dfad9d919c72a
                                                    • Opcode Fuzzy Hash: 6335ae3c13ddf35d91c6dca3ece5bfa36ba83b479f3d3f49975b0228b2d303f4
                                                    • Instruction Fuzzy Hash: FC113372604214AFCB40EFA9C8C4D9B77ECEF4D364B14456AFE18DB246D634ED408BA4
                                                    APIs
                                                    • GetClassInfoA.USER32(00400000,0041F3E0,?), ref: 0041F411
                                                    • UnregisterClassA.USER32(0041F3E0,00400000), ref: 0041F43A
                                                    • RegisterClassA.USER32(00494598), ref: 0041F444
                                                    • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F47F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Class$InfoLongRegisterUnregisterWindow
                                                    • String ID:
                                                    • API String ID: 4025006896-0
                                                    • Opcode ID: d848210eac8fa203de2a57be4a09b5e70b2efef1fc89853c1c9f6bba622f69a5
                                                    • Instruction ID: 124ae18f6ccee6cd3f50944003dafe19b4a4e3b77e192b7b2acb4d1f887b2837
                                                    • Opcode Fuzzy Hash: d848210eac8fa203de2a57be4a09b5e70b2efef1fc89853c1c9f6bba622f69a5
                                                    • Instruction Fuzzy Hash: 390152712401047BCB10EBE8ED81E9B379CA769314B12413BBA05E72E1D6359C164BAD
                                                    APIs
                                                    • WaitForInputIdle.USER32(?,00000032), ref: 0045399C
                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004539BE
                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 004539CD
                                                    • CloseHandle.KERNEL32(?,004539FA,004539F3,?,?,?,00000000,?,?,00453BCD,?,?,?,00000044,00000000,00000000), ref: 004539ED
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                    • String ID:
                                                    • API String ID: 4071923889-0
                                                    • Opcode ID: 20e0be94b20fee5318a7dd270181ebd7f7826156dd8631ad6b66e954ecbc8fc8
                                                    • Instruction ID: f26be41c5c034272f157e269139ed2410fa661b94adc91c278c581610335523b
                                                    • Opcode Fuzzy Hash: 20e0be94b20fee5318a7dd270181ebd7f7826156dd8631ad6b66e954ecbc8fc8
                                                    • Instruction Fuzzy Hash: 3301F9F06006087EEB219B998C06F6BBB9CDB457A1F600167F904D32C2C5F89E00CA69
                                                    APIs
                                                    • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D187
                                                    • LoadResource.KERNEL32(00400000,72756F73,0040A928,00400000,00000001,00000000,?,0040D0E4,00000000,?,00000000,?,?,00477C8C,0000000A,REGDLL_EXE), ref: 0040D1A1
                                                    • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A928,00400000,00000001,00000000,?,0040D0E4,00000000,?,00000000,?,?,00477C8C), ref: 0040D1BB
                                                    • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A928,00400000,00000001,00000000,?,0040D0E4,00000000,?,00000000,?), ref: 0040D1C5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLockSizeof
                                                    • String ID:
                                                    • API String ID: 3473537107-0
                                                    • Opcode ID: b3c15c4636e7b2139434bed422b55b0694fd43cf85b07dfc26612a38abd02691
                                                    • Instruction ID: a2e4909c1946fcd89949086e6ecb513f2c22862e5b7fa6f76d970aa484769738
                                                    • Opcode Fuzzy Hash: b3c15c4636e7b2139434bed422b55b0694fd43cf85b07dfc26612a38abd02691
                                                    • Instruction Fuzzy Hash: BEF0FF726056046F9754EE9DA881D5B76ECDE48264320416AF908EB246DE38DD118B78
                                                    APIs
                                                    • RtlInitializeCriticalSection.KERNEL32(00496420,00000000,00401A82,?,?,0040222E,02236484,00001B78,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                    • RtlEnterCriticalSection.KERNEL32(00496420,00496420,00000000,00401A82,?,?,0040222E,02236484,00001B78,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                    • LocalAlloc.KERNEL32(00000000,00000FF8,00496420,00000000,00401A82,?,?,0040222E,02236484,00001B78,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                    • RtlLeaveCriticalSection.KERNEL32(00496420,00401A89,00000000,00401A82,?,?,0040222E,02236484,00001B78,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                    • String ID:
                                                    • API String ID: 730355536-0
                                                    • Opcode ID: f176e8b5bc4d8de55a84342bec8c86950c68c795945543f3ab918003abf5a290
                                                    • Instruction ID: 5e78e1d922e44001d172df758a9733a16a6df98b74bc9f0da5c534ca1700ba01
                                                    • Opcode Fuzzy Hash: f176e8b5bc4d8de55a84342bec8c86950c68c795945543f3ab918003abf5a290
                                                    • Instruction Fuzzy Hash: EC01C0706442405EFB19ABE99802B253ED4D795B88F13803FF440A6AF1C67C4840CB2D
                                                    APIs
                                                    • GetLastError.KERNEL32(?,00000000), ref: 0046C61D
                                                    Strings
                                                    • Failed to set NTFS compression state (%d)., xrefs: 0046C62E
                                                    • Unsetting NTFS compression on file: %s, xrefs: 0046C603
                                                    • Setting NTFS compression on file: %s, xrefs: 0046C5EB
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                    • API String ID: 1452528299-3038984924
                                                    • Opcode ID: 28366d01871e122449bdfb8fb49611cd24c57d3e6e2ac0a821d27b13cc7c6b91
                                                    • Instruction ID: a1ef80d0d8a2e5f9201278ae6be69a1995d4015348ccf4bb3120fa271849e41d
                                                    • Opcode Fuzzy Hash: 28366d01871e122449bdfb8fb49611cd24c57d3e6e2ac0a821d27b13cc7c6b91
                                                    • Instruction Fuzzy Hash: FF016730E0424866CB04D7AD94812EDBBE49F4D304F44C1EFA499E7253EB7909098B9F
                                                    APIs
                                                      • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047E48B,?,00000001,?,?,0047E48B,?,00000001,00000000), ref: 0042DC70
                                                    • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,00459E8A,?,?,?,?,?,00000000,00459EB1), ref: 004547C4
                                                    • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,00459E8A,?,?,?,?,?,00000000), ref: 004547CD
                                                    • RemoveFontResourceA.GDI32(00000000), ref: 004547DA
                                                    • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004547EE
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                    • String ID:
                                                    • API String ID: 4283692357-0
                                                    • Opcode ID: bcf11773fd8c0b5a736241565fb97c7422f3f445fb67b5c6b4351f2791a5411c
                                                    • Instruction ID: 4674671b110c5257b68e85d971ffdb8cda5f86f627ed5b1345ff1e290f3286d1
                                                    • Opcode Fuzzy Hash: bcf11773fd8c0b5a736241565fb97c7422f3f445fb67b5c6b4351f2791a5411c
                                                    • Instruction Fuzzy Hash: A8F05EB575430136EA10B6B69C87F1B228C9F98749F10483BBA00EF2C3DA7CD805962D
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,00000000), ref: 0046BD2D
                                                    Strings
                                                    • Setting NTFS compression on directory: %s, xrefs: 0046BCFB
                                                    • Failed to set NTFS compression state (%d)., xrefs: 0046BD3E
                                                    • Unsetting NTFS compression on directory: %s, xrefs: 0046BD13
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                    • API String ID: 1452528299-1392080489
                                                    • Opcode ID: 90b96e0e361d620a62c9fd41cba8a120cdf1cb229718ceacbe7a7ae854c5f2a4
                                                    • Instruction ID: 04fc7c1443ac3458e58cefa80cc6c6a016b16a61cacdb00a41bc227bfc50919b
                                                    • Opcode Fuzzy Hash: 90b96e0e361d620a62c9fd41cba8a120cdf1cb229718ceacbe7a7ae854c5f2a4
                                                    • Instruction Fuzzy Hash: 02014430D0424866CB04D7AD544129DBBE4DF49305F44C1ABA458DB282EB790A4887DA
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CountSleepTick
                                                    • String ID:
                                                    • API String ID: 2227064392-0
                                                    • Opcode ID: a2b42f5d817999fa87d8c8debf1c72a2dd1cd4bafa442c689adcebc18bd8fdf0
                                                    • Instruction ID: 3f7f46c553d175f11705afd44f04f16a3e0c3f3e5dd1576458daa0be99b01b41
                                                    • Opcode Fuzzy Hash: a2b42f5d817999fa87d8c8debf1c72a2dd1cd4bafa442c689adcebc18bd8fdf0
                                                    • Instruction Fuzzy Hash: B8E0223230D50549CE2131BE29826BF4688CBC53A8F288DBFF0CCDA282E81C4C05857E
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000008,?,0047B6D1,?,?,00000001,00000000,00000002,00000000,0047BF7E,?,?,?,?,?,004934F9), ref: 00473A61
                                                    • OpenProcessToken.ADVAPI32(00000000,00000008,?,0047B6D1,?,?,00000001,00000000,00000002,00000000,0047BF7E), ref: 00473A67
                                                    • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,0047B6D1,?,?,00000001,00000000,00000002,00000000,0047BF7E), ref: 00473A89
                                                    • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,0047B6D1,?,?,00000001,00000000,00000002,00000000), ref: 00473A9A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                    • String ID:
                                                    • API String ID: 215268677-0
                                                    • Opcode ID: ff2391ec0fdb544e1084d01c30a85baa6c0b7e947b20136262a29b15e6141ec5
                                                    • Instruction ID: 5b03ca49c7660b30f14589363ce0977c388da779ad74aac2ec8a68411ee37624
                                                    • Opcode Fuzzy Hash: ff2391ec0fdb544e1084d01c30a85baa6c0b7e947b20136262a29b15e6141ec5
                                                    • Instruction Fuzzy Hash: 53F030616443016BD600EAB5CD82E9B77DCEB44354F04883A7E98D72C1D678DD08AB26
                                                    APIs
                                                    • GetLastActivePopup.USER32(?), ref: 004241BC
                                                    • IsWindowVisible.USER32(?), ref: 004241CD
                                                    • IsWindowEnabled.USER32(?), ref: 004241D7
                                                    • SetForegroundWindow.USER32(?), ref: 004241E1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                    • String ID:
                                                    • API String ID: 2280970139-0
                                                    • Opcode ID: facee3049e27e4d38ce5cbb0d038dae1ce3a8dc847ab17f9709ae615e70c1cf2
                                                    • Instruction ID: 7a261241521d5f36110480f60a41559dbc21bd8b6604a945fb8666e4bf107b55
                                                    • Opcode Fuzzy Hash: facee3049e27e4d38ce5cbb0d038dae1ce3a8dc847ab17f9709ae615e70c1cf2
                                                    • Instruction Fuzzy Hash: 0DE08699B06531139E31FA251885ABB25ACCD54B883C60127BC04F7243DF1CCFA0C1AC
                                                    APIs
                                                    • GetSystemMenu.USER32(00000000,00000000,0000F060,00000001), ref: 00467191
                                                    • EnableMenuItem.USER32(00000000,00000000,00000000), ref: 00467197
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Menu$EnableItemSystem
                                                    • String ID: CurPageChanged
                                                    • API String ID: 3692539535-2490978513
                                                    • Opcode ID: 44ab54edaae432540a07ca2ee1b6cb6266bb15343d351a7e2ada7686f5a11d4e
                                                    • Instruction ID: 92e155edbcccdd4ff8e2ab0b339112d692a3ef364cd3f34adbae7c183047029a
                                                    • Opcode Fuzzy Hash: 44ab54edaae432540a07ca2ee1b6cb6266bb15343d351a7e2ada7686f5a11d4e
                                                    • Instruction Fuzzy Hash: F0A1F734614204DFC711DB69D985EE973F5EB49308F2640B6F804AB322EB38AE41DB59
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 004248D5
                                                    • WaitMessage.USER32(00000000,004249C9,?,?,?,?), ref: 004249A9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CursorMessageWait
                                                    • String ID: z4I
                                                    • API String ID: 4021538199-302857815
                                                    • Opcode ID: cf3c892d132cc1d72853f016a121e31cf203e898c01e4da307d38d5edbf9349a
                                                    • Instruction ID: f5903591994a5646776cc1cabcb36018c201e103d356dd97604095ae9f7807b1
                                                    • Opcode Fuzzy Hash: cf3c892d132cc1d72853f016a121e31cf203e898c01e4da307d38d5edbf9349a
                                                    • Instruction Fuzzy Hash: C831D4B07002249BCB21EF39D48179FB7B5EFC8304F96456AEC049B385DB789D80CA99
                                                    APIs
                                                    • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 0044FB19
                                                    • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0044FB4A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ExecuteMessageSendShell
                                                    • String ID: open
                                                    • API String ID: 812272486-2758837156
                                                    • Opcode ID: 8a0605ed0c381f0a74a086ec1471ed6555b23fb8dcfb2e81ee34f57c50cf0fe2
                                                    • Instruction ID: 724f47e86b4f4745380ee9597168f1c8a72dce230288f2328438c3862ccb2892
                                                    • Opcode Fuzzy Hash: 8a0605ed0c381f0a74a086ec1471ed6555b23fb8dcfb2e81ee34f57c50cf0fe2
                                                    • Instruction Fuzzy Hash: F8214470E00244AFEB00DF69C992F9EB7F9EF45704F1085BAB500E7391D678BA45CA58
                                                    Strings
                                                    • Failed to proceed to next wizard page; aborting., xrefs: 00468B85
                                                    • Failed to proceed to next wizard page; showing wizard., xrefs: 00468B99
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                    • API String ID: 0-1974262853
                                                    • Opcode ID: 4ca5ce4578e3ff033a875813a6d0a92324b5f473aded730f063a1ba54573552a
                                                    • Instruction ID: 32e47b4048d1eb33eb59ea1ab9d95bd44b70aa9c3acb443f86b245d757d9b421
                                                    • Opcode Fuzzy Hash: 4ca5ce4578e3ff033a875813a6d0a92324b5f473aded730f063a1ba54573552a
                                                    • Instruction Fuzzy Hash: 13217C706042049FDB01EBA9E985E99B7E4EB05714F6541BFF404AB392EB38AE40CB59
                                                    APIs
                                                    • RtlEnterCriticalSection.KERNEL32(00496420,00000000,)), ref: 004025C7
                                                    • RtlLeaveCriticalSection.KERNEL32(00496420,0040263D), ref: 00402630
                                                      • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(00496420,00000000,00401A82,?,?,0040222E,02236484,00001B78,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                      • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(00496420,00496420,00000000,00401A82,?,?,0040222E,02236484,00001B78,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                      • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,00496420,00000000,00401A82,?,?,0040222E,02236484,00001B78,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                      • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(00496420,00401A89,00000000,00401A82,?,?,0040222E,02236484,00001B78,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                    • String ID: )
                                                    • API String ID: 2227675388-1084416617
                                                    • Opcode ID: 3eb0375ff62f3d3bcca9cc60adac25dafbf9b9e3c2e27b1e4b69ca31af3a3358
                                                    • Instruction ID: 5893b1754cd22d93ac955961316eccc987691ebf6da7ca014f8aac44d7effe1a
                                                    • Opcode Fuzzy Hash: 3eb0375ff62f3d3bcca9cc60adac25dafbf9b9e3c2e27b1e4b69ca31af3a3358
                                                    • Instruction Fuzzy Hash: 851101317042046FEB25ABB99F5A62A6AD4D795758B25087FF404F32D2D9BD8C02826C
                                                    APIs
                                                      • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                      • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                    • SysFreeString.OLEAUT32(?), ref: 00446EFA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: String$AllocByteCharFreeMultiWide
                                                    • String ID: NIL Interface Exception$Unknown Method
                                                    • API String ID: 3952431833-1023667238
                                                    • Opcode ID: 87cbfea59f1259fc6e468aac4867c83fbc8f3f1cc130e6dbee1779124e49575a
                                                    • Instruction ID: 5f9b3b73cb94db711a986a3f2247f7757ae34ed1a40e252d8aaeb61a96a19159
                                                    • Opcode Fuzzy Hash: 87cbfea59f1259fc6e468aac4867c83fbc8f3f1cc130e6dbee1779124e49575a
                                                    • Instruction Fuzzy Hash: 3E1196706042489FEB10DFA5DC52AAEBBBCEB49704F52407AF900E7681D7799D04CA6A
                                                    APIs
                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00490DEC,?,00490DE0,00000000,00490DC7), ref: 00490D92
                                                    • CloseHandle.KERNEL32(00490E2C,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00490DEC,?,00490DE0,00000000), ref: 00490DA9
                                                      • Part of subcall function 00490C7C: GetLastError.KERNEL32(00000000,00490D14,?,?,?,?), ref: 00490CA0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateErrorHandleLastProcess
                                                    • String ID: D
                                                    • API String ID: 3798668922-2746444292
                                                    • Opcode ID: b8ff0d34599ebc0a6a471ce56cb010bf3c456ccb2db53499eac47297560f1341
                                                    • Instruction ID: 5e82f4a0d21cbda80c6ce08effc49d0adb440ccb399f6cbc5ca3bfcf7dfd4046
                                                    • Opcode Fuzzy Hash: b8ff0d34599ebc0a6a471ce56cb010bf3c456ccb2db53499eac47297560f1341
                                                    • Instruction Fuzzy Hash: 8D0161B1604248AFDF04DBD5CC42E9FBBACDF48714F51013AB504E7291D6786E058628
                                                    APIs
                                                    • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DBB0
                                                    • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DBF0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Value$EnumQuery
                                                    • String ID: Inno Setup: No Icons
                                                    • API String ID: 1576479698-2016326496
                                                    • Opcode ID: 0890946b5df0c49e4954d7290b96ce305c787ba9704d15fe4295c439bd8e9102
                                                    • Instruction ID: 08e9f6bdc79701da45a7e076aae250b208fcb3010747ef376bcb555be2d5621c
                                                    • Opcode Fuzzy Hash: 0890946b5df0c49e4954d7290b96ce305c787ba9704d15fe4295c439bd8e9102
                                                    • Instruction Fuzzy Hash: F5018431B8933069F73045266D41F6B558C9B85B64F65003BFA41AA3C0D6DCDC45E26A
                                                    APIs
                                                      • Part of subcall function 00453FD0: GetCurrentProcess.KERNEL32(00000028), ref: 00453FDF
                                                      • Part of subcall function 00453FD0: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00453FE5
                                                    • SetForegroundWindow.USER32(?), ref: 004921E3
                                                    Strings
                                                    • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 0049220E
                                                    • Restarting Windows., xrefs: 004921C0
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentForegroundOpenTokenWindow
                                                    • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                    • API String ID: 3179053593-4147564754
                                                    • Opcode ID: d70852b700c5fe17cfeda57a2b257f12c0ee17bc7baf24d39bddf8f63885e3c0
                                                    • Instruction ID: ca6496b34cb9ec78dac67e7394f91f2135c7556ad547c2e64824be1fa04380a0
                                                    • Opcode Fuzzy Hash: d70852b700c5fe17cfeda57a2b257f12c0ee17bc7baf24d39bddf8f63885e3c0
                                                    • Instruction Fuzzy Hash: 6D01B1706041407AEB00EBA5E942F9C3FA89B54308F80807BF400BB2D7C6BC9949C71D
                                                    APIs
                                                      • Part of subcall function 00406EB8: DeleteFileA.KERNEL32(00000000,00496628,00492F9D,00000000,00492FF2,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EC3
                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 00471566
                                                      • Part of subcall function 004713B8: GetLastError.KERNEL32(00000000,004714A4,?,?,?,00497138,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0047152B,00000001), ref: 004713D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: File$DeleteErrorLastMove
                                                    • String ID: DeleteFile$MoveFile
                                                    • API String ID: 3195829115-139070271
                                                    • Opcode ID: c3238b34af4bed3e3f1b4dd7445b3da06ec74b495593ac98db43db9feb42aea9
                                                    • Instruction ID: 1df28c0314ec5a34e70582bf50e943cd8d66b3b20714d59025502d0011df5b9d
                                                    • Opcode Fuzzy Hash: c3238b34af4bed3e3f1b4dd7445b3da06ec74b495593ac98db43db9feb42aea9
                                                    • Instruction Fuzzy Hash: FAF0AFA010020077DE147A6D88436DA238C8F8135DB50C17BBC4A7B3A2CA3C9C028BAE
                                                    APIs
                                                    • SetFocus.USER32(00000000,z4I,00000000,004219E4,00000000,00000000,00418568,00000000,00000001,?,?,00461C6A,00000001,00000000,00000000,00467001), ref: 00421CBB
                                                    • GetFocus.USER32 ref: 00421CC9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: Focus
                                                    • String ID: z4I
                                                    • API String ID: 2734777837-302857815
                                                    • Opcode ID: 3f32ba2741d037c575fda7d925cf4946f91f8e5880ea911c7a4e9013d85ebfcf
                                                    • Instruction ID: 6a781247274b35bf802f0d5c88fcb4425cf39f3bc7fec05fcedd95d7989a6849
                                                    • Opcode Fuzzy Hash: 3f32ba2741d037c575fda7d925cf4946f91f8e5880ea911c7a4e9013d85ebfcf
                                                    • Instruction Fuzzy Hash: ADE09A35B002205ACB1027BA6886BAB21844B64348F58957FB501EB353DD7C8C80068C
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2906563092.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2906536381.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906642476.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906664837.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2906684391.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_qgdf1HLJno.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastSleep
                                                    • String ID:
                                                    • API String ID: 1458359878-0
                                                    • Opcode ID: 8b4360f2b479ea038ec97fb2a00d6f0221d541355e91bee91f30916643827583
                                                    • Instruction ID: 017d81aa95838fcb6bb112513f86caaf4ff52444f8b7b5a451e770b39712fdff
                                                    • Opcode Fuzzy Hash: 8b4360f2b479ea038ec97fb2a00d6f0221d541355e91bee91f30916643827583
                                                    • Instruction Fuzzy Hash: B8F0F632A00524578E20A9AE998192F62CDDAC0B6D730052BEF04DF283D439CC854AAE

                                                    Execution Graph

                                                    Execution Coverage:9.3%
                                                    Dynamic/Decrypted Code Coverage:83.7%
                                                    Signature Coverage:2.9%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:43
                                                    execution_graph 18721 4026c2 18722 40d612 RegQueryValueExA 18721->18722 18723 4028ac RegCloseKey 18721->18723 18724 402568 18722->18724 18727 40d626 18722->18727 18725 40db2f 18723->18725 18724->18723 18725->18725 18726 40da53 lstrcmpiW 18726->18727 18727->18726 18728 40d35e lstrcmpiW 18727->18728 18730 40d6c2 18734 2ba3d0f 18730->18734 18732 40d87c 18735 2ba3d18 18734->18735 18736 2ba3d1d 18734->18736 18748 2bab8e1 18735->18748 18740 2ba3d32 18736->18740 18739 40d6c4 Sleep 18739->18732 18741 2ba3d3e CallCatchBlock 18740->18741 18745 2ba3d8c ___DllMainCRTStartup 18741->18745 18747 2ba3de9 CallCatchBlock 18741->18747 18752 2ba3b9d 18741->18752 18743 2ba3dc6 18744 2ba3b9d __CRT_INIT@12 138 API calls 18743->18744 18743->18747 18744->18747 18745->18743 18746 2ba3b9d __CRT_INIT@12 138 API calls 18745->18746 18745->18747 18746->18743 18747->18739 18749 2bab911 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 18748->18749 18750 2bab904 18748->18750 18751 2bab908 18749->18751 18750->18749 18750->18751 18751->18736 18753 2ba3ba9 CallCatchBlock 18752->18753 18754 2ba3c2b 18753->18754 18755 2ba3bb1 18753->18755 18756 2ba3c2f 18754->18756 18757 2ba3c94 18754->18757 18800 2ba81e7 GetProcessHeap 18755->18800 18762 2ba3c50 18756->18762 18793 2ba3bba CallCatchBlock __CRT_INIT@12 18756->18793 18901 2ba845c 18756->18901 18760 2ba3c99 18757->18760 18761 2ba3cf7 18757->18761 18759 2ba3bb6 18759->18793 18801 2ba5d94 18759->18801 18932 2ba91cb 18760->18932 18761->18793 18960 2ba5c24 18761->18960 18904 2ba8333 RtlDecodePointer 18762->18904 18767 2ba3ca4 18767->18793 18935 2ba8a6d 18767->18935 18769 2ba3bc6 __RTC_Initialize 18777 2ba3bd6 GetCommandLineA 18769->18777 18769->18793 18772 2ba3c66 __CRT_INIT@12 18928 2ba3c7f 18772->18928 18774 2bab57f __ioterm 60 API calls 18776 2ba3c61 18774->18776 18779 2ba5e0a __mtterm 62 API calls 18776->18779 18822 2bab97d GetEnvironmentStringsW 18777->18822 18779->18772 18781 2ba3ccd 18783 2ba3ceb 18781->18783 18784 2ba3cd3 18781->18784 18954 2ba2f74 18783->18954 18944 2ba5ce1 18784->18944 18788 2ba3bf0 18790 2ba3bf4 18788->18790 18854 2bab5d1 18788->18854 18789 2ba3cdb GetCurrentThreadId 18789->18793 18887 2ba5e0a 18790->18887 18793->18745 18795 2ba3c14 18795->18793 18896 2bab57f 18795->18896 18800->18759 18968 2ba8503 RtlEncodePointer 18801->18968 18803 2ba5d99 18973 2ba8a1f 18803->18973 18806 2ba5da2 18807 2ba5e0a __mtterm 62 API calls 18806->18807 18809 2ba5da7 18807->18809 18809->18769 18811 2ba5dbf 18812 2ba8a6d __calloc_crt 59 API calls 18811->18812 18813 2ba5dcc 18812->18813 18814 2ba5e01 18813->18814 18816 2ba91ea __threadstartex@4 TlsSetValue 18813->18816 18815 2ba5e0a __mtterm 62 API calls 18814->18815 18818 2ba5e06 18815->18818 18817 2ba5de0 18816->18817 18817->18814 18819 2ba5de6 18817->18819 18818->18769 18820 2ba5ce1 __initptd 59 API calls 18819->18820 18821 2ba5dee GetCurrentThreadId 18820->18821 18821->18769 18823 2bab990 WideCharToMultiByte 18822->18823 18828 2ba3be6 18822->18828 18825 2bab9fa FreeEnvironmentStringsW 18823->18825 18826 2bab9c3 18823->18826 18825->18828 18984 2ba8ab5 18826->18984 18835 2bab2cb 18828->18835 18830 2bab9d0 WideCharToMultiByte 18831 2bab9ef FreeEnvironmentStringsW 18830->18831 18832 2bab9e6 18830->18832 18831->18828 18833 2ba2f74 _free 59 API calls 18832->18833 18834 2bab9ec 18833->18834 18834->18831 18836 2bab2d7 CallCatchBlock 18835->18836 18837 2ba88ee __lock 59 API calls 18836->18837 18838 2bab2de 18837->18838 18839 2ba8a6d __calloc_crt 59 API calls 18838->18839 18841 2bab2ef 18839->18841 18840 2bab35a GetStartupInfoW 18848 2bab36f 18840->18848 18849 2bab49e 18840->18849 18841->18840 18842 2bab2fa CallCatchBlock @_EH4_CallFilterFunc@8 18841->18842 18842->18788 18843 2bab566 19237 2bab576 18843->19237 18845 2ba8a6d __calloc_crt 59 API calls 18845->18848 18846 2bab4eb GetStdHandle 18846->18849 18847 2bab4fe GetFileType 18847->18849 18848->18845 18848->18849 18850 2bab3bd 18848->18850 18849->18843 18849->18846 18849->18847 18853 2ba920c __getstream InitializeCriticalSectionAndSpinCount 18849->18853 18850->18849 18851 2bab3f1 GetFileType 18850->18851 18852 2ba920c __getstream InitializeCriticalSectionAndSpinCount 18850->18852 18851->18850 18852->18850 18853->18849 18855 2bab5df 18854->18855 18856 2bab5e4 GetModuleFileNameA 18854->18856 19247 2ba528a 18855->19247 18858 2bab611 18856->18858 19241 2bab684 18858->19241 18860 2ba3c00 18860->18795 18865 2bab800 18860->18865 18862 2ba8ab5 __malloc_crt 59 API calls 18863 2bab64a 18862->18863 18863->18860 18864 2bab684 _parse_cmdline 59 API calls 18863->18864 18864->18860 18866 2bab809 18865->18866 18869 2bab80e _strlen 18865->18869 18867 2ba528a ___initmbctable 71 API calls 18866->18867 18867->18869 18868 2ba8a6d __calloc_crt 59 API calls 18877 2bab844 _strlen 18868->18877 18869->18868 18872 2ba3c09 18869->18872 18870 2bab896 18871 2ba2f74 _free 59 API calls 18870->18871 18871->18872 18872->18795 18881 2ba846b 18872->18881 18873 2ba8a6d __calloc_crt 59 API calls 18873->18877 18874 2bab8bd 18875 2ba2f74 _free 59 API calls 18874->18875 18875->18872 18877->18870 18877->18872 18877->18873 18877->18874 18878 2bab8d4 18877->18878 19411 2ba6cbc 18877->19411 18879 2ba4f05 __invoke_watson 8 API calls 18878->18879 18880 2bab8e0 18879->18880 18882 2ba8477 __IsNonwritableInCurrentImage 18881->18882 19420 2bad2df 18882->19420 18884 2ba8495 __initterm_e 18886 2ba84b4 _doexit __IsNonwritableInCurrentImage 18884->18886 19423 2ba33a4 18884->19423 18886->18795 18888 2ba5e14 18887->18888 18893 2ba5e1a 18887->18893 19489 2ba91ac 18888->19489 18890 2ba8938 RtlDeleteCriticalSection 18892 2ba2f74 _free 59 API calls 18890->18892 18891 2ba8954 18894 2ba8960 RtlDeleteCriticalSection 18891->18894 18895 2ba8973 18891->18895 18892->18893 18893->18890 18893->18891 18894->18891 18895->18793 18897 2bab586 18896->18897 18898 2bab5ce 18897->18898 18899 2ba2f74 _free 59 API calls 18897->18899 18900 2bab59f RtlDeleteCriticalSection 18897->18900 18898->18790 18899->18897 18900->18897 18902 2ba85a5 _doexit 59 API calls 18901->18902 18903 2ba8467 18902->18903 18903->18762 18905 2ba834d 18904->18905 18906 2ba835f 18904->18906 18905->18906 18908 2ba2f74 _free 59 API calls 18905->18908 18907 2ba2f74 _free 59 API calls 18906->18907 18909 2ba836c 18907->18909 18908->18905 18910 2ba8390 18909->18910 18913 2ba2f74 _free 59 API calls 18909->18913 18911 2ba2f74 _free 59 API calls 18910->18911 18912 2ba839c 18911->18912 18914 2ba2f74 _free 59 API calls 18912->18914 18913->18909 18915 2ba83ad 18914->18915 18916 2ba2f74 _free 59 API calls 18915->18916 18917 2ba83b8 18916->18917 18918 2ba83dd RtlEncodePointer 18917->18918 18921 2ba2f74 _free 59 API calls 18917->18921 18919 2ba83f8 18918->18919 18920 2ba83f2 18918->18920 18923 2ba840e 18919->18923 18924 2ba2f74 _free 59 API calls 18919->18924 18922 2ba2f74 _free 59 API calls 18920->18922 18926 2ba83dc 18921->18926 18922->18919 18925 2ba3c55 18923->18925 18927 2ba2f74 _free 59 API calls 18923->18927 18924->18923 18925->18772 18925->18774 18926->18918 18927->18925 18929 2ba3c83 18928->18929 18930 2ba3c91 18928->18930 18929->18930 18931 2ba5e0a __mtterm 62 API calls 18929->18931 18930->18793 18931->18930 18933 2ba91de 18932->18933 18934 2ba91e2 TlsGetValue 18932->18934 18933->18767 18934->18767 18936 2ba8a74 18935->18936 18938 2ba3cb5 18936->18938 18940 2ba8a92 18936->18940 19492 2bb04b8 18936->19492 18938->18793 18941 2ba91ea 18938->18941 18940->18936 18940->18938 19500 2ba9505 Sleep 18940->19500 18942 2ba9200 18941->18942 18943 2ba9204 TlsSetValue 18941->18943 18942->18781 18943->18781 18945 2ba5ced CallCatchBlock 18944->18945 18946 2ba88ee __lock 59 API calls 18945->18946 18947 2ba5d2a 18946->18947 19501 2ba5d82 18947->19501 18950 2ba88ee __lock 59 API calls 18951 2ba5d4b ___addlocaleref 18950->18951 19504 2ba5d8b 18951->19504 18953 2ba5d76 CallCatchBlock 18953->18789 18955 2ba2f7d HeapFree 18954->18955 18959 2ba2fa6 __dosmaperr 18954->18959 18956 2ba2f92 18955->18956 18955->18959 18957 2ba5e5b _malloc 57 API calls 18956->18957 18958 2ba2f98 GetLastError 18957->18958 18958->18959 18959->18793 18961 2ba5c31 18960->18961 18967 2ba5c57 18960->18967 18962 2ba5c3f 18961->18962 18964 2ba91cb __threadstartex@4 TlsGetValue 18961->18964 18963 2ba91ea __threadstartex@4 TlsSetValue 18962->18963 18965 2ba5c4f 18963->18965 18964->18962 19509 2ba5aef 18965->19509 18967->18793 18969 2ba8514 __init_pointers __initp_misc_winsig 18968->18969 18980 2ba3a07 RtlEncodePointer 18969->18980 18971 2ba852c __init_pointers 18972 2ba927a 34 API calls 18971->18972 18972->18803 18974 2ba8a2b 18973->18974 18976 2ba5d9e 18974->18976 18981 2ba920c 18974->18981 18976->18806 18977 2ba918e 18976->18977 18978 2ba5db4 18977->18978 18979 2ba91a5 TlsAlloc 18977->18979 18978->18806 18978->18811 18980->18971 18982 2ba9229 InitializeCriticalSectionAndSpinCount 18981->18982 18983 2ba921c 18981->18983 18982->18974 18983->18974 18988 2ba8ac3 18984->18988 18986 2ba8af5 18986->18825 18986->18830 18988->18986 18989 2ba2fac 18988->18989 19006 2ba9505 Sleep 18988->19006 18990 2ba3027 18989->18990 18994 2ba2fb8 18989->18994 18991 2ba8204 _malloc RtlDecodePointer 18990->18991 18992 2ba302d 18991->18992 18995 2ba5e5b _malloc 58 API calls 18992->18995 18993 2ba2fc3 18993->18994 19007 2ba86d4 18993->19007 19016 2ba8731 18993->19016 19051 2ba831d 18993->19051 18994->18993 18997 2ba2feb RtlAllocateHeap 18994->18997 19000 2ba3013 18994->19000 19004 2ba3011 18994->19004 19054 2ba8204 RtlDecodePointer 18994->19054 18998 2ba301f 18995->18998 18997->18994 18997->18998 18998->18988 19056 2ba5e5b 19000->19056 19005 2ba5e5b _malloc 58 API calls 19004->19005 19005->18998 19006->18988 19059 2bb017e 19007->19059 19009 2ba86db 19010 2bb017e __NMSG_WRITE 59 API calls 19009->19010 19012 2ba86e8 19009->19012 19010->19012 19011 2ba8731 __NMSG_WRITE 59 API calls 19013 2ba8700 19011->19013 19012->19011 19014 2ba870a 19012->19014 19015 2ba8731 __NMSG_WRITE 59 API calls 19013->19015 19014->18993 19015->19014 19017 2ba874f __NMSG_WRITE 19016->19017 19019 2bb017e __NMSG_WRITE 55 API calls 19017->19019 19050 2ba8876 19017->19050 19021 2ba8762 19019->19021 19020 2ba88df 19020->18993 19022 2ba887b GetStdHandle 19021->19022 19023 2bb017e __NMSG_WRITE 55 API calls 19021->19023 19026 2ba8889 _strlen 19022->19026 19022->19050 19024 2ba8773 19023->19024 19024->19022 19025 2ba8785 19024->19025 19025->19050 19075 2baf53d 19025->19075 19029 2ba88c2 WriteFile 19026->19029 19026->19050 19029->19050 19030 2ba87b2 GetModuleFileNameW 19032 2ba87e2 __NMSG_WRITE 19030->19032 19033 2ba87d2 19030->19033 19031 2ba88e3 19134 2ba4f05 IsProcessorFeaturePresent 19031->19134 19032->19031 19045 2ba8828 19032->19045 19084 2baf5b2 19032->19084 19035 2baf53d __NMSG_WRITE 55 API calls 19033->19035 19035->19032 19043 2baf4d1 __NMSG_WRITE 55 API calls 19046 2ba885f 19043->19046 19045->19031 19093 2baf4d1 19045->19093 19046->19031 19127 2ba454b 19050->19127 19220 2ba82e9 GetModuleHandleExW 19051->19220 19055 2ba8217 19054->19055 19055->18994 19223 2ba5c72 GetLastError 19056->19223 19058 2ba5e60 19058->19004 19060 2bb0188 19059->19060 19061 2ba5e5b _malloc 59 API calls 19060->19061 19062 2bb0192 19060->19062 19063 2bb01ae 19061->19063 19062->19009 19066 2ba4ef5 19063->19066 19069 2ba4eca RtlDecodePointer 19066->19069 19070 2ba4edd 19069->19070 19071 2ba4f05 __invoke_watson 8 API calls 19070->19071 19072 2ba4ef4 19071->19072 19073 2ba4eca _vscan_fn 8 API calls 19072->19073 19074 2ba4f01 19073->19074 19074->19009 19076 2baf556 19075->19076 19077 2baf548 19075->19077 19078 2ba5e5b _malloc 59 API calls 19076->19078 19077->19076 19082 2baf56f 19077->19082 19079 2baf560 19078->19079 19080 2ba4ef5 _vscan_fn 9 API calls 19079->19080 19081 2ba87a5 19080->19081 19081->19030 19081->19031 19082->19081 19083 2ba5e5b _malloc 59 API calls 19082->19083 19083->19079 19088 2baf5c0 19084->19088 19085 2baf5c4 19086 2baf5c9 19085->19086 19087 2ba5e5b _malloc 59 API calls 19085->19087 19086->19045 19092 2baf5f4 19087->19092 19088->19085 19088->19086 19090 2baf603 19088->19090 19089 2ba4ef5 _vscan_fn 9 API calls 19089->19086 19090->19086 19091 2ba5e5b _malloc 59 API calls 19090->19091 19091->19092 19092->19089 19094 2baf4eb 19093->19094 19097 2baf4dd 19093->19097 19095 2ba5e5b _malloc 59 API calls 19094->19095 19096 2baf4f5 19095->19096 19098 2ba4ef5 _vscan_fn 9 API calls 19096->19098 19097->19094 19100 2baf517 19097->19100 19099 2ba8848 19098->19099 19099->19031 19099->19043 19100->19099 19101 2ba5e5b _malloc 59 API calls 19100->19101 19101->19096 19128 2ba4553 19127->19128 19129 2ba4555 IsProcessorFeaturePresent 19127->19129 19128->19020 19131 2ba958f 19129->19131 19169 2ba953e IsDebuggerPresent 19131->19169 19135 2ba4f10 19134->19135 19177 2ba4d98 19135->19177 19170 2ba9553 __call_reportfault 19169->19170 19175 2ba9528 SetUnhandledExceptionFilter UnhandledExceptionFilter 19170->19175 19172 2ba955b __call_reportfault 19176 2ba9513 GetCurrentProcess TerminateProcess 19172->19176 19174 2ba9578 19174->19020 19175->19172 19176->19174 19178 2ba4db2 setSBCS __call_reportfault 19177->19178 19179 2ba4dd2 IsDebuggerPresent 19178->19179 19185 2ba9528 SetUnhandledExceptionFilter UnhandledExceptionFilter 19179->19185 19183 2ba4e96 __call_reportfault 19185->19183 19221 2ba8314 ExitProcess 19220->19221 19222 2ba8302 GetProcAddress 19220->19222 19222->19221 19224 2ba91cb __threadstartex@4 TlsGetValue 19223->19224 19225 2ba5c87 19224->19225 19226 2ba5cd5 SetLastError 19225->19226 19227 2ba8a6d __calloc_crt 56 API calls 19225->19227 19226->19058 19228 2ba5c9a 19227->19228 19228->19226 19229 2ba91ea __threadstartex@4 TlsSetValue 19228->19229 19230 2ba5cae 19229->19230 19231 2ba5ccc 19230->19231 19232 2ba5cb4 19230->19232 19234 2ba2f74 _free 56 API calls 19231->19234 19233 2ba5ce1 __initptd 56 API calls 19232->19233 19235 2ba5cbc GetCurrentThreadId 19233->19235 19236 2ba5cd2 19234->19236 19235->19226 19236->19226 19240 2ba8a58 RtlLeaveCriticalSection 19237->19240 19239 2bab57d 19239->18842 19240->19239 19243 2bab6a6 19241->19243 19246 2bab70a 19243->19246 19251 2bb15d6 19243->19251 19244 2bab627 19244->18860 19244->18862 19245 2bb15d6 _parse_cmdline 59 API calls 19245->19246 19246->19244 19246->19245 19248 2ba5293 19247->19248 19249 2ba529a 19247->19249 19307 2ba55e7 19248->19307 19249->18856 19254 2bb157c 19251->19254 19257 2ba227b 19254->19257 19258 2ba228c 19257->19258 19262 2ba22d9 19257->19262 19265 2ba5c5a 19258->19265 19260 2ba2292 19261 2ba22b9 19260->19261 19270 2ba51bf 19260->19270 19261->19262 19285 2ba5541 19261->19285 19262->19243 19266 2ba5c72 __getptd_noexit 59 API calls 19265->19266 19267 2ba5c60 19266->19267 19268 2ba8440 __amsg_exit 59 API calls 19267->19268 19269 2ba5c6d 19267->19269 19268->19269 19269->19260 19271 2ba51cb CallCatchBlock 19270->19271 19272 2ba5c5a CallCatchBlock 59 API calls 19271->19272 19286 2ba554d CallCatchBlock 19285->19286 19308 2ba55f3 CallCatchBlock 19307->19308 19309 2ba5c5a CallCatchBlock 59 API calls 19308->19309 19310 2ba55fb 19309->19310 19311 2ba5541 _LocaleUpdate::_LocaleUpdate 59 API calls 19310->19311 19312 2ba5605 19311->19312 19332 2ba52e2 19312->19332 19315 2ba8ab5 __malloc_crt 59 API calls 19316 2ba5627 19315->19316 19317 2ba5754 CallCatchBlock 19316->19317 19339 2ba578f 19316->19339 19317->19249 19333 2ba227b _LocaleUpdate::_LocaleUpdate 59 API calls 19332->19333 19334 2ba52f2 19333->19334 19335 2ba5313 19334->19335 19336 2ba5301 GetOEMCP 19334->19336 19337 2ba532a 19335->19337 19338 2ba5318 GetACP 19335->19338 19336->19337 19337->19315 19337->19317 19338->19337 19412 2ba6cd5 19411->19412 19413 2ba6cc7 19411->19413 19414 2ba5e5b _malloc 59 API calls 19412->19414 19413->19412 19416 2ba6ceb 19413->19416 19415 2ba6cdc 19414->19415 19417 2ba4ef5 _vscan_fn 9 API calls 19415->19417 19418 2ba6ce6 19416->19418 19419 2ba5e5b _malloc 59 API calls 19416->19419 19417->19418 19418->18877 19419->19415 19421 2bad2e2 RtlEncodePointer 19420->19421 19421->19421 19422 2bad2fc 19421->19422 19422->18884 19490 2ba91bf 19489->19490 19491 2ba91c3 TlsFree 19489->19491 19490->18893 19491->18893 19493 2bb04c3 19492->19493 19499 2bb04de 19492->19499 19494 2bb04cf 19493->19494 19493->19499 19495 2ba5e5b _malloc 58 API calls 19494->19495 19497 2bb04d4 19495->19497 19496 2bb04ee RtlAllocateHeap 19496->19497 19496->19499 19497->18936 19498 2ba8204 _malloc RtlDecodePointer 19498->19499 19499->19496 19499->19497 19499->19498 19500->18940 19507 2ba8a58 RtlLeaveCriticalSection 19501->19507 19503 2ba5d44 19503->18950 19508 2ba8a58 RtlLeaveCriticalSection 19504->19508 19506 2ba5d92 19506->18953 19507->19503 19508->19506 19510 2ba5afb CallCatchBlock 19509->19510 19511 2ba5b14 19510->19511 19512 2ba5c03 CallCatchBlock 19510->19512 19513 2ba2f74 _free 59 API calls 19510->19513 19514 2ba5b23 19511->19514 19515 2ba2f74 _free 59 API calls 19511->19515 19512->18967 19513->19511 19516 2ba2f74 _free 59 API calls 19514->19516 19520 2ba5b32 19514->19520 19515->19514 19516->19520 19517 2ba2f74 _free 59 API calls 19518 2ba5b41 19517->19518 19519 2ba5b50 19518->19519 19521 2ba2f74 _free 59 API calls 19518->19521 19522 2ba5b5f 19519->19522 19523 2ba2f74 _free 59 API calls 19519->19523 19520->19517 19520->19518 19521->19519 19524 2ba5b6e 19522->19524 19526 2ba2f74 _free 59 API calls 19522->19526 19523->19522 19525 2ba5b80 19524->19525 19527 2ba2f74 _free 59 API calls 19524->19527 19528 2ba88ee __lock 59 API calls 19525->19528 19526->19524 19527->19525 19531 2ba5b88 19528->19531 19529 2ba5bab 19541 2ba5c0f 19529->19541 19531->19529 19533 2ba2f74 _free 59 API calls 19531->19533 19533->19529 19534 2ba88ee __lock 59 API calls 19539 2ba5bbf ___removelocaleref 19534->19539 19535 2ba5bf0 19574 2ba5c1b 19535->19574 19538 2ba2f74 _free 59 API calls 19538->19512 19539->19535 19544 2ba4fc5 19539->19544 19577 2ba8a58 RtlLeaveCriticalSection 19541->19577 19543 2ba5bb8 19543->19534 19545 2ba503e 19544->19545 19546 2ba4fda 19544->19546 19547 2ba508b 19545->19547 19548 2ba2f74 _free 59 API calls 19545->19548 19546->19545 19555 2ba2f74 _free 59 API calls 19546->19555 19558 2ba500b 19546->19558 19552 2ba50b4 19547->19552 19618 2bad53d 19547->19618 19550 2ba505f 19548->19550 19553 2ba2f74 _free 59 API calls 19550->19553 19557 2ba5113 19552->19557 19568 2ba2f74 59 API calls _free 19552->19568 19559 2ba5072 19553->19559 19554 2ba2f74 _free 59 API calls 19562 2ba5033 19554->19562 19563 2ba5000 19555->19563 19556 2ba2f74 _free 59 API calls 19556->19552 19564 2ba2f74 _free 59 API calls 19557->19564 19560 2ba2f74 _free 59 API calls 19558->19560 19573 2ba5029 19558->19573 19561 2ba2f74 _free 59 API calls 19559->19561 19565 2ba501e 19560->19565 19566 2ba5080 19561->19566 19567 2ba2f74 _free 59 API calls 19562->19567 19578 2bad3da 19563->19578 19570 2ba5119 19564->19570 19606 2bad4d6 19565->19606 19572 2ba2f74 _free 59 API calls 19566->19572 19567->19545 19568->19552 19570->19535 19572->19547 19573->19554 19794 2ba8a58 RtlLeaveCriticalSection 19574->19794 19576 2ba5bfd 19576->19538 19577->19543 19579 2bad3e9 19578->19579 19605 2bad4d2 19578->19605 19580 2bad3fa 19579->19580 19581 2ba2f74 _free 59 API calls 19579->19581 19582 2bad40c 19580->19582 19583 2ba2f74 _free 59 API calls 19580->19583 19581->19580 19584 2bad41e 19582->19584 19585 2ba2f74 _free 59 API calls 19582->19585 19583->19582 19586 2bad430 19584->19586 19588 2ba2f74 _free 59 API calls 19584->19588 19585->19584 19587 2bad442 19586->19587 19589 2ba2f74 _free 59 API calls 19586->19589 19590 2bad454 19587->19590 19591 2ba2f74 _free 59 API calls 19587->19591 19588->19586 19589->19587 19592 2ba2f74 _free 59 API calls 19590->19592 19594 2bad466 19590->19594 19591->19590 19592->19594 19593 2bad478 19595 2bad48a 19593->19595 19597 2ba2f74 _free 59 API calls 19593->19597 19594->19593 19596 2ba2f74 _free 59 API calls 19594->19596 19598 2bad49c 19595->19598 19599 2ba2f74 _free 59 API calls 19595->19599 19596->19593 19597->19595 19600 2bad4ae 19598->19600 19601 2ba2f74 _free 59 API calls 19598->19601 19599->19598 19602 2bad4c0 19600->19602 19603 2ba2f74 _free 59 API calls 19600->19603 19601->19600 19604 2ba2f74 _free 59 API calls 19602->19604 19602->19605 19603->19602 19604->19605 19605->19558 19607 2bad4e1 19606->19607 19617 2bad539 19606->19617 19608 2bad4f1 19607->19608 19610 2ba2f74 _free 59 API calls 19607->19610 19609 2bad503 19608->19609 19611 2ba2f74 _free 59 API calls 19608->19611 19612 2bad515 19609->19612 19613 2ba2f74 _free 59 API calls 19609->19613 19610->19608 19611->19609 19614 2bad527 19612->19614 19615 2ba2f74 _free 59 API calls 19612->19615 19613->19612 19616 2ba2f74 _free 59 API calls 19614->19616 19614->19617 19615->19614 19616->19617 19617->19573 19619 2ba50a9 19618->19619 19620 2bad54c 19618->19620 19619->19556 19621 2ba2f74 _free 59 API calls 19620->19621 19622 2bad554 19621->19622 19623 2ba2f74 _free 59 API calls 19622->19623 19624 2bad55c 19623->19624 19625 2ba2f74 _free 59 API calls 19624->19625 19626 2bad564 19625->19626 19627 2ba2f74 _free 59 API calls 19626->19627 19628 2bad56c 19627->19628 19629 2ba2f74 _free 59 API calls 19628->19629 19630 2bad574 19629->19630 19631 2ba2f74 _free 59 API calls 19630->19631 19632 2bad57c 19631->19632 19633 2ba2f74 _free 59 API calls 19632->19633 19634 2bad583 19633->19634 19635 2ba2f74 _free 59 API calls 19634->19635 19794->19576 19795 2be50f9 19796 2be5761 CreateFileA 19795->19796 19797 2bd2ee0 19796->19797 19798 40d24a 19799 40d251 19798->19799 19802 401f64 FindResourceA 19799->19802 19801 40d26d 19803 401f86 GetLastError SizeofResource 19802->19803 19809 401f9f 19802->19809 19804 401fa6 LoadResource LockResource GlobalAlloc 19803->19804 19803->19809 19805 401fd2 19804->19805 19806 401ffb GetTickCount 19805->19806 19807 402005 GlobalAlloc 19806->19807 19807->19809 19809->19801 19810 40d90c 19811 40d626 19810->19811 19812 40da53 lstrcmpiW 19811->19812 19813 40d35e lstrcmpiW 19811->19813 19812->19811 19815 2c0eecd 19816 2c109cd FindCloseChangeNotification 19815->19816 19817 2c19cfa 19816->19817 19818 40254d VirtualAlloc 19819 402838 19818->19819 19820 402193 GetLocalTime 19823 401f27 19820->19823 19824 401f3c 19823->19824 19827 401a1d 19824->19827 19826 401f45 19828 401a2c 19827->19828 19833 401a4f CreateFileA 19828->19833 19832 401a3e 19832->19826 19834 401a35 19833->19834 19840 401a7d 19833->19840 19841 401b4b LoadLibraryA 19834->19841 19835 401a98 DeviceIoControl 19835->19840 19837 401b3a FindCloseChangeNotification 19837->19834 19838 401b0e GetLastError 19838->19837 19838->19840 19840->19835 19840->19837 19840->19838 19850 402ca6 19840->19850 19853 402c98 19840->19853 19842 401c21 19841->19842 19843 401b6e GetProcAddress 19841->19843 19842->19832 19844 401b85 19843->19844 19845 401c18 FreeLibrary 19843->19845 19846 401b95 GetAdaptersInfo 19844->19846 19847 402ca6 7 API calls 19844->19847 19848 401c15 19844->19848 19849 402c98 12 API calls 19844->19849 19845->19842 19846->19844 19847->19844 19848->19845 19849->19844 19856 4030a1 19850->19856 19886 403001 19853->19886 19857 4030ad 19856->19857 19865 402caf 19856->19865 19860 4030b7 19857->19860 19861 4030cd 19857->19861 19858 4030f8 19859 4030f9 HeapFree 19858->19859 19859->19865 19860->19859 19862 4030c3 19860->19862 19861->19858 19864 4030e7 19861->19864 19867 40443e 19862->19867 19873 404ecf 19864->19873 19865->19840 19868 40447c 19867->19868 19872 404732 19867->19872 19869 404678 VirtualFree 19868->19869 19868->19872 19870 4046dc 19869->19870 19871 4046eb VirtualFree HeapFree 19870->19871 19870->19872 19871->19872 19872->19865 19874 404f12 19873->19874 19875 404efc 19873->19875 19874->19865 19875->19874 19877 404db6 19875->19877 19880 404dc3 19877->19880 19878 404e73 19878->19874 19879 404de4 VirtualFree 19879->19880 19880->19878 19880->19879 19882 404d60 VirtualFree 19880->19882 19883 404d7d 19882->19883 19884 404dad 19883->19884 19885 404d8d HeapFree 19883->19885 19884->19880 19885->19880 19887 402ca3 19886->19887 19889 403008 19886->19889 19887->19840 19889->19887 19890 40302d 19889->19890 19891 40303c 19890->19891 19894 403051 19890->19894 19898 40304a 19891->19898 19899 404767 19891->19899 19893 403090 HeapAlloc 19895 40309f 19893->19895 19894->19893 19894->19898 19905 404f14 19894->19905 19895->19889 19896 40304f 19896->19889 19898->19893 19898->19895 19898->19896 19902 404799 19899->19902 19900 404838 19904 404847 19900->19904 19919 404b21 19900->19919 19902->19900 19902->19904 19912 404a70 19902->19912 19904->19898 19910 404f22 19905->19910 19906 40500e VirtualAlloc 19911 404fdf 19906->19911 19907 4050e3 19923 404c1c 19907->19923 19910->19906 19910->19907 19910->19911 19911->19898 19911->19911 19913 404ab3 HeapAlloc 19912->19913 19914 404a83 HeapReAlloc 19912->19914 19916 404b03 19913->19916 19917 404ad9 VirtualAlloc 19913->19917 19915 404aa2 19914->19915 19914->19916 19915->19913 19916->19900 19917->19916 19918 404af3 HeapFree 19917->19918 19918->19916 19920 404b33 VirtualAlloc 19919->19920 19922 404b7c 19920->19922 19922->19904 19924 404c30 HeapAlloc 19923->19924 19925 404c29 19923->19925 19926 404c4d VirtualAlloc 19924->19926 19931 404c85 19924->19931 19925->19926 19927 404d42 19926->19927 19928 404c6d VirtualAlloc 19926->19928 19929 404d4a HeapFree 19927->19929 19927->19931 19930 404d34 VirtualFree 19928->19930 19928->19931 19929->19931 19930->19927 19931->19911 19932 402655 RegCloseKey 19933 40265b 19932->19933 19934 4026d7 CopyFileA 19935 4026e5 19934->19935 19936 4025d8 Sleep 19937 40d7a9 19936->19937 19938 402759 19939 40275a LoadLibraryExA 19938->19939 19941 40d0cd 19939->19941 19942 2b9f8a3 CreateFileA 19943 2b9f99f 19942->19943 19948 2b9f8d4 19942->19948 19944 2b9f8ec DeviceIoControl 19944->19948 19945 2b9f995 FindCloseChangeNotification 19945->19943 19946 2b9f961 GetLastError 19946->19945 19946->19948 19948->19944 19948->19945 19948->19946 19949 2ba3b4c 19948->19949 19952 2ba3b54 19949->19952 19950 2ba2fac _malloc 59 API calls 19950->19952 19951 2ba3b6e 19951->19948 19952->19950 19952->19951 19953 2ba8204 _malloc RtlDecodePointer 19952->19953 19954 2ba3b72 std::exception::exception 19952->19954 19953->19952 19957 2ba455a 19954->19957 19956 2ba3b9c 19959 2ba4579 RaiseException 19957->19959 19959->19956 19960 2b972a7 InternetOpenA 19961 2b972c5 InternetSetOptionA InternetSetOptionA InternetSetOptionA 19960->19961 19995 2b966f0 shared_ptr setSBCS 19960->19995 19967 2b9733e setSBCS 19961->19967 19962 2b9731e InternetOpenUrlA 19963 2b9737e InternetCloseHandle 19962->19963 19962->19967 19963->19995 19964 2b97342 InternetReadFile 19964->19967 19968 2b97373 InternetCloseHandle 19964->19968 19965 2b96704 Sleep 19966 2b9670a RtlEnterCriticalSection RtlLeaveCriticalSection 19965->19966 19966->19995 19967->19962 19967->19964 19968->19963 19969 2b973e5 RtlEnterCriticalSection RtlLeaveCriticalSection 20071 2ba233c 19969->20071 19971 2ba2fac _malloc 59 API calls 19972 2b97499 RtlEnterCriticalSection RtlLeaveCriticalSection 19971->19972 19972->19995 19973 2ba233c 66 API calls 19973->19995 19974 2b97766 RtlEnterCriticalSection RtlLeaveCriticalSection 19974->19995 19976 2ba2fac 59 API calls _malloc 19976->19995 19979 2b978de RtlEnterCriticalSection 19980 2b9790b RtlLeaveCriticalSection 19979->19980 19979->19995 20121 2b93c67 19980->20121 19985 2ba2f74 59 API calls _free 19985->19995 19987 2b9a725 73 API calls 19987->19995 19988 2ba3b4c _Allocate 60 API calls 19988->19995 19993 2ba35e6 60 API calls _strtok 19993->19995 19995->19960 19995->19965 19995->19966 19995->19969 19995->19971 19995->19973 19995->19974 19995->19976 19995->19979 19995->19980 19995->19985 19995->19987 19995->19988 19995->19993 19995->19995 19999 2b976e8 Sleep 19995->19999 20000 2b976e3 shared_ptr 19995->20000 20003 2b95119 19995->20003 20032 2b9ac0f 19995->20032 20042 2b961f1 19995->20042 20045 2b9833b 19995->20045 20051 2b9d117 19995->20051 20056 2b983ea 19995->20056 20064 2b933b2 19995->20064 20081 2ba2850 19995->20081 20084 2b99737 19995->20084 20091 2b9a84f 19995->20091 20099 2b94100 19995->20099 20103 2ba2418 19995->20103 20112 2b91ba7 19995->20112 20128 2b93d7e 19995->20128 20135 2b99003 19995->20135 20142 2b9534d 19995->20142 20095 2ba18f0 19999->20095 20000->19999 20004 2b95123 __EH_prolog 20003->20004 20152 2ba0b10 20004->20152 20007 2b93c67 72 API calls 20008 2b9514a 20007->20008 20009 2b93d7e 64 API calls 20008->20009 20010 2b95158 20009->20010 20011 2b9833b 89 API calls 20010->20011 20012 2b9516c 20011->20012 20015 2b95322 shared_ptr 20012->20015 20156 2b9a725 20012->20156 20015->19995 20016 2b951c4 20018 2b9a725 73 API calls 20016->20018 20017 2b951f6 20019 2b9a725 73 API calls 20017->20019 20020 2b951d4 20018->20020 20021 2b95207 20019->20021 20020->20015 20023 2b9a725 73 API calls 20020->20023 20021->20015 20022 2b9a725 73 API calls 20021->20022 20024 2b9524a 20022->20024 20025 2b952b4 20023->20025 20024->20015 20026 2b9a725 73 API calls 20024->20026 20025->20015 20027 2b9a725 73 API calls 20025->20027 20026->20020 20028 2b952da 20027->20028 20028->20015 20029 2b9a725 73 API calls 20028->20029 20030 2b95304 20029->20030 20161 2b9ced9 20030->20161 20033 2b9ac19 __EH_prolog 20032->20033 20212 2b9d0ee 20033->20212 20035 2b9ac3a shared_ptr 20215 2ba20f0 20035->20215 20037 2b9ac51 20038 2b9ac67 20037->20038 20221 2b93fb0 20037->20221 20038->19995 20043 2ba2fac _malloc 59 API calls 20042->20043 20044 2b96204 20043->20044 20046 2b98374 20045->20046 20047 2b98353 20045->20047 20050 2b98399 20046->20050 20666 2b92ac7 20046->20666 20663 2b995fd 20047->20663 20050->19995 20052 2ba0b10 Mailbox 68 API calls 20051->20052 20053 2b9d12d 20052->20053 20054 2b9d21b 20053->20054 20055 2b92db5 73 API calls 20053->20055 20054->19995 20055->20053 20057 2b98405 WSASetLastError shutdown 20056->20057 20058 2b983f5 20056->20058 20060 2b9a509 69 API calls 20057->20060 20059 2ba0b10 Mailbox 68 API calls 20058->20059 20061 2b983fa 20059->20061 20062 2b98422 20060->20062 20061->19995 20062->20061 20063 2ba0b10 Mailbox 68 API calls 20062->20063 20063->20061 20065 2b933e1 20064->20065 20066 2b933c4 InterlockedCompareExchange 20064->20066 20068 2b929ee 76 API calls 20065->20068 20066->20065 20067 2b933d6 20066->20067 20760 2b932ab 20067->20760 20070 2b933f1 20068->20070 20070->19995 20074 2ba2348 20071->20074 20075 2ba236b 20071->20075 20073 2ba234e 20077 2ba5e5b _malloc 59 API calls 20073->20077 20074->20073 20074->20075 20813 2ba2383 20075->20813 20076 2ba237e 20076->19995 20078 2ba2353 20077->20078 20079 2ba4ef5 _vscan_fn 9 API calls 20078->20079 20080 2ba235e 20079->20080 20080->19995 20823 2ba286e 20081->20823 20083 2ba2869 20083->19995 20085 2b99741 __EH_prolog 20084->20085 20086 2b91ba7 210 API calls 20085->20086 20087 2b99796 20086->20087 20088 2b997b3 RtlEnterCriticalSection 20087->20088 20089 2b997ce 20088->20089 20090 2b997d1 RtlLeaveCriticalSection 20088->20090 20089->20090 20090->19995 20092 2b9a859 __EH_prolog 20091->20092 20829 2b9e000 20092->20829 20094 2b9a877 shared_ptr 20094->19995 20096 2ba18fd 20095->20096 20097 2ba1921 20095->20097 20096->20097 20098 2ba1911 GetProcessHeap HeapFree 20096->20098 20097->19995 20098->20097 20100 2b94118 20099->20100 20101 2b94112 20099->20101 20100->19995 20833 2b9a703 20101->20833 20104 2ba2449 20103->20104 20105 2ba2434 20103->20105 20104->20105 20107 2ba2450 20104->20107 20106 2ba5e5b _malloc 59 API calls 20105->20106 20108 2ba2439 20106->20108 20110 2ba2444 20107->20110 20835 2ba5f01 20107->20835 20109 2ba4ef5 _vscan_fn 9 API calls 20108->20109 20109->20110 20110->19995 21036 2bb53f0 20112->21036 20114 2b91bb1 RtlEnterCriticalSection 20115 2b91be9 RtlLeaveCriticalSection 20114->20115 20117 2b91bd1 20114->20117 21037 2b9e330 20115->21037 20117->20115 20118 2b91c55 RtlLeaveCriticalSection 20117->20118 20118->19995 20119 2b91c22 20119->20118 20122 2ba0b10 Mailbox 68 API calls 20121->20122 20123 2b93c7e 20122->20123 21119 2b93ca2 20123->21119 20129 2b93d99 htons 20128->20129 20130 2b93dcb htons 20128->20130 21146 2b93bd3 20129->21146 21152 2b93c16 20130->21152 20134 2b93ded 20134->19995 20136 2b9900d __EH_prolog 20135->20136 21183 2b9373f 20136->21183 20138 2b99027 RtlEnterCriticalSection 20139 2b99036 RtlLeaveCriticalSection 20138->20139 20141 2b99070 20139->20141 20141->19995 20143 2ba2fac _malloc 59 API calls 20142->20143 20144 2b95362 SHGetSpecialFolderPathA 20143->20144 20145 2b95378 20144->20145 21192 2ba3771 20145->21192 20149 2b953dc 21208 2ba3a84 20149->21208 20151 2b953e2 20151->19995 20153 2ba0b39 20152->20153 20154 2b9513d 20152->20154 20155 2ba33a4 __cinit 68 API calls 20153->20155 20154->20007 20155->20154 20157 2ba0b10 Mailbox 68 API calls 20156->20157 20158 2b9a73f 20157->20158 20159 2b9519d 20158->20159 20166 2b92db5 20158->20166 20159->20015 20159->20016 20159->20017 20162 2ba0b10 Mailbox 68 API calls 20161->20162 20163 2b9cef3 20162->20163 20164 2b9d002 20163->20164 20193 2b92b95 20163->20193 20164->20015 20167 2b92dca 20166->20167 20168 2b92de4 20166->20168 20169 2ba0b10 Mailbox 68 API calls 20167->20169 20170 2b92dfc 20168->20170 20172 2b92def 20168->20172 20171 2b92dcf 20169->20171 20180 2b92d39 WSASetLastError WSASend 20170->20180 20171->20158 20174 2ba0b10 Mailbox 68 API calls 20172->20174 20174->20171 20175 2b92e54 WSASetLastError select 20190 2b9a509 20175->20190 20176 2ba0b10 68 API calls Mailbox 20178 2b92e0c 20176->20178 20178->20171 20178->20175 20178->20176 20179 2b92d39 71 API calls 20178->20179 20179->20178 20181 2b9a509 69 API calls 20180->20181 20182 2b92d6e 20181->20182 20183 2b92d82 20182->20183 20184 2b92d75 20182->20184 20186 2b92d7a 20183->20186 20187 2ba0b10 Mailbox 68 API calls 20183->20187 20185 2ba0b10 Mailbox 68 API calls 20184->20185 20185->20186 20188 2ba0b10 Mailbox 68 API calls 20186->20188 20189 2b92d9c 20186->20189 20187->20186 20188->20189 20189->20178 20191 2ba0b10 Mailbox 68 API calls 20190->20191 20192 2b9a515 WSAGetLastError 20191->20192 20192->20178 20194 2b92bb1 20193->20194 20195 2b92bc7 20193->20195 20196 2ba0b10 Mailbox 68 API calls 20194->20196 20197 2b92bdf 20195->20197 20199 2b92bd2 20195->20199 20202 2b92bb6 20196->20202 20198 2b92be2 WSASetLastError WSARecv 20197->20198 20197->20202 20203 2b92d22 20197->20203 20205 2b92cbc WSASetLastError select 20197->20205 20207 2ba0b10 68 API calls Mailbox 20197->20207 20201 2b9a509 69 API calls 20198->20201 20200 2ba0b10 Mailbox 68 API calls 20199->20200 20200->20202 20201->20197 20202->20163 20208 2b91996 20203->20208 20206 2b9a509 69 API calls 20205->20206 20206->20197 20207->20197 20209 2b9199f 20208->20209 20211 2b919bb 20208->20211 20210 2ba33a4 __cinit 68 API calls 20209->20210 20210->20211 20211->20202 20234 2b9e280 20212->20234 20214 2b9d100 20214->20035 20315 2ba33b9 20215->20315 20218 2ba2114 20218->20037 20219 2ba213d ResumeThread 20219->20037 20220 2ba2136 CloseHandle 20220->20219 20222 2ba0b10 Mailbox 68 API calls 20221->20222 20223 2b93fb8 20222->20223 20634 2b91815 20223->20634 20226 2b9a68b 20227 2b9a695 __EH_prolog 20226->20227 20640 2b9cc43 20227->20640 20232 2ba455a __CxxThrowException@8 RaiseException 20233 2b9a6c9 20232->20233 20235 2b9e28a __EH_prolog 20234->20235 20240 2b94030 20235->20240 20239 2b9e2b8 20239->20214 20252 2bb53f0 20240->20252 20242 2b9403a GetProcessHeap RtlAllocateHeap 20243 2b9407c 20242->20243 20244 2b94053 std::exception::exception 20242->20244 20243->20239 20246 2b9408a 20243->20246 20253 2b9a6ca 20244->20253 20247 2b94094 __EH_prolog 20246->20247 20297 2b9a2e9 20247->20297 20252->20242 20254 2b9a6d4 __EH_prolog 20253->20254 20261 2b9cc79 20254->20261 20259 2ba455a __CxxThrowException@8 RaiseException 20260 2b9a702 20259->20260 20267 2b9d7d9 20261->20267 20264 2b9cc93 20289 2b9d811 20264->20289 20266 2b9a6f1 20266->20259 20270 2ba2513 20267->20270 20273 2ba2541 20270->20273 20274 2ba254f 20273->20274 20275 2b9a6e3 20273->20275 20279 2ba25d7 20274->20279 20275->20264 20280 2ba2554 20279->20280 20281 2ba25e0 20279->20281 20280->20275 20283 2ba2599 20280->20283 20282 2ba2f74 _free 59 API calls 20281->20282 20282->20280 20284 2ba25ca 20283->20284 20285 2ba25a5 _strlen 20283->20285 20284->20275 20286 2ba2fac _malloc 59 API calls 20285->20286 20287 2ba25b7 20286->20287 20287->20284 20288 2ba6cbc __fltout2 59 API calls 20287->20288 20288->20284 20290 2b9d81b __EH_prolog 20289->20290 20293 2b9b73c 20290->20293 20292 2b9d852 Mailbox 20292->20266 20294 2b9b746 __EH_prolog 20293->20294 20295 2ba2513 std::exception::exception 59 API calls 20294->20295 20296 2b9b757 Mailbox 20295->20296 20296->20292 20308 2b9b100 20297->20308 20299 2b940c1 20300 2b93fdc 20299->20300 20314 2bb53f0 20300->20314 20302 2b93fe6 CreateEventA 20303 2b93ffd 20302->20303 20304 2b9400f 20302->20304 20305 2b93fb0 Mailbox 68 API calls 20303->20305 20304->20239 20306 2b94005 20305->20306 20307 2b9a68b Mailbox 60 API calls 20306->20307 20307->20304 20309 2b9b10c 20308->20309 20311 2b9b11c std::exception::exception 20308->20311 20310 2ba3b4c _Allocate 60 API calls 20309->20310 20309->20311 20310->20311 20311->20299 20312 2ba455a __CxxThrowException@8 RaiseException 20311->20312 20313 2b9fb31 20312->20313 20314->20302 20316 2ba33db 20315->20316 20317 2ba33c7 20315->20317 20319 2ba8a6d __calloc_crt 59 API calls 20316->20319 20318 2ba5e5b _malloc 59 API calls 20317->20318 20320 2ba33cc 20318->20320 20321 2ba33e8 20319->20321 20322 2ba4ef5 _vscan_fn 9 API calls 20320->20322 20323 2ba3439 20321->20323 20325 2ba5c5a CallCatchBlock 59 API calls 20321->20325 20328 2ba210b 20322->20328 20324 2ba2f74 _free 59 API calls 20323->20324 20326 2ba343f 20324->20326 20327 2ba33f5 20325->20327 20326->20328 20334 2ba5e3a 20326->20334 20329 2ba5ce1 __initptd 59 API calls 20327->20329 20328->20218 20328->20219 20328->20220 20331 2ba33fe CreateThread 20329->20331 20331->20328 20333 2ba3431 GetLastError 20331->20333 20342 2ba3519 20331->20342 20333->20323 20339 2ba5e27 20334->20339 20336 2ba5e43 __dosmaperr 20337 2ba5e5b _malloc 59 API calls 20336->20337 20338 2ba5e56 20337->20338 20338->20328 20340 2ba5c72 __getptd_noexit 59 API calls 20339->20340 20341 2ba5e2c 20340->20341 20341->20336 20343 2ba3522 __threadstartex@4 20342->20343 20344 2ba91cb __threadstartex@4 TlsGetValue 20343->20344 20345 2ba3528 20344->20345 20346 2ba355b 20345->20346 20347 2ba352f __threadstartex@4 20345->20347 20348 2ba5aef __freefls@4 59 API calls 20346->20348 20349 2ba91ea __threadstartex@4 TlsSetValue 20347->20349 20352 2ba3576 ___crtIsPackagedApp 20348->20352 20350 2ba353e 20349->20350 20353 2ba3551 GetCurrentThreadId 20350->20353 20354 2ba3544 GetLastError RtlExitUserThread 20350->20354 20351 2ba358a 20364 2ba3452 20351->20364 20352->20351 20358 2ba34c1 20352->20358 20353->20352 20354->20353 20359 2ba34ca LoadLibraryExW GetProcAddress 20358->20359 20360 2ba3503 RtlDecodePointer 20358->20360 20361 2ba34ec 20359->20361 20362 2ba34ed RtlEncodePointer 20359->20362 20363 2ba3513 20360->20363 20361->20351 20362->20360 20363->20351 20365 2ba345e CallCatchBlock 20364->20365 20366 2ba5c5a CallCatchBlock 59 API calls 20365->20366 20367 2ba3463 20366->20367 20374 2ba2160 20367->20374 20392 2ba1610 20374->20392 20377 2ba21a8 TlsSetValue 20378 2ba21b0 20377->20378 20414 2b9ddb4 20378->20414 20406 2ba1674 20392->20406 20393 2ba168c 20396 2ba16ce ResetEvent 20393->20396 20400 2ba16a5 OpenEventA 20393->20400 20430 2ba1c10 20393->20430 20394 2ba16f0 20395 2ba1706 20394->20395 20397 2ba1703 CloseHandle 20394->20397 20398 2ba454b __except_handler4 6 API calls 20395->20398 20402 2ba16d5 20396->20402 20397->20395 20401 2ba171e 20398->20401 20399 2ba179c WaitForSingleObject 20399->20406 20404 2ba16bf 20400->20404 20405 2ba16c7 20400->20405 20401->20377 20401->20378 20434 2ba1850 20402->20434 20404->20405 20408 2ba16c4 CloseHandle 20404->20408 20405->20396 20405->20402 20406->20393 20406->20394 20406->20399 20409 2ba1770 CreateEventA 20406->20409 20411 2ba1c10 GetCurrentProcessId 20406->20411 20413 2ba178e CloseHandle 20406->20413 20407 2ba16a2 20407->20400 20408->20405 20409->20406 20411->20406 20413->20406 20415 2b9ddd6 20414->20415 20445 2b94d86 20415->20445 20416 2b9ddd9 20418 2ba1f30 20416->20418 20419 2ba1f69 TlsGetValue 20418->20419 20425 2ba1f61 Mailbox 20418->20425 20419->20425 20444 2ba0c70 20430->20444 20432 2ba1c62 GetCurrentProcessId 20433 2ba1c75 20432->20433 20433->20407 20435 2ba185f 20434->20435 20438 2ba1895 CreateEventA 20435->20438 20439 2ba1c10 GetCurrentProcessId 20435->20439 20441 2ba18b7 20435->20441 20436 2ba16ed 20436->20394 20437 2ba18c3 SetEvent 20437->20436 20440 2ba18ab 20438->20440 20438->20441 20442 2ba1892 20439->20442 20440->20441 20443 2ba18b0 CloseHandle 20440->20443 20441->20436 20441->20437 20442->20438 20443->20441 20444->20432 20446 2b94d90 __EH_prolog 20445->20446 20447 2ba0b10 Mailbox 68 API calls 20446->20447 20448 2b94da6 RtlEnterCriticalSection RtlLeaveCriticalSection 20447->20448 20449 2b950d4 shared_ptr 20448->20449 20455 2b94dd1 std::bad_exception::bad_exception 20448->20455 20449->20416 20451 2b950a1 RtlEnterCriticalSection RtlLeaveCriticalSection 20452 2b950b3 RtlEnterCriticalSection RtlLeaveCriticalSection 20451->20452 20452->20449 20452->20455 20453 2b9a725 73 API calls 20453->20455 20455->20451 20455->20452 20455->20453 20456 2b94e8d RtlEnterCriticalSection RtlLeaveCriticalSection 20455->20456 20457 2b94e9f RtlEnterCriticalSection RtlLeaveCriticalSection 20455->20457 20458 2b9ced9 73 API calls 20455->20458 20463 2ba18f0 2 API calls 20455->20463 20464 2b94100 2 API calls 20455->20464 20465 2b94bed 20455->20465 20489 2b97d24 20455->20489 20493 2b9d00b 20455->20493 20499 2b97cfe 20455->20499 20502 2b9a9b2 20455->20502 20514 2b9aa8a 20455->20514 20456->20457 20457->20455 20458->20455 20463->20455 20464->20455 20466 2b94bf7 __EH_prolog 20465->20466 20467 2b91ba7 209 API calls 20466->20467 20490 2b97d40 20489->20490 20587 2b990b2 20490->20587 20494 2b9d015 __EH_prolog 20493->20494 20498 2b9d03e 20494->20498 20594 2b9921e 20494->20594 20608 2b988f8 20499->20608 20503 2b9a9bc __EH_prolog 20502->20503 20504 2b97cfe std::bad_exception::bad_exception 60 API calls 20503->20504 20515 2b9aa94 __EH_prolog 20514->20515 20623 2b9d096 20515->20623 20609 2b9890d 20608->20609 20610 2b98981 20608->20610 20637 2ba24d3 20634->20637 20638 2ba2599 std::exception::_Copy_str 59 API calls 20637->20638 20639 2b9182a 20638->20639 20639->20226 20646 2b9d70a 20640->20646 20643 2b9cc5d 20655 2b9d742 20643->20655 20645 2b9a6b8 20645->20232 20649 2b9b22e 20646->20649 20650 2b9b238 __EH_prolog 20649->20650 20651 2ba2513 std::exception::exception 59 API calls 20650->20651 20652 2b9b249 20651->20652 20653 2b97cfe std::bad_exception::bad_exception 60 API calls 20652->20653 20654 2b9a6aa 20653->20654 20654->20643 20656 2b9d74c __EH_prolog 20655->20656 20659 2b9b626 20656->20659 20658 2b9d783 Mailbox 20658->20645 20660 2b9b630 __EH_prolog 20659->20660 20661 2b9b22e std::bad_exception::bad_exception 60 API calls 20660->20661 20662 2b9b641 Mailbox 20661->20662 20662->20658 20684 2b9353e 20663->20684 20667 2b92ae8 WSASetLastError connect 20666->20667 20668 2b92ad8 20666->20668 20670 2b9a509 69 API calls 20667->20670 20669 2ba0b10 Mailbox 68 API calls 20668->20669 20671 2b92add 20669->20671 20672 2b92b07 20670->20672 20674 2ba0b10 Mailbox 68 API calls 20671->20674 20672->20671 20673 2ba0b10 Mailbox 68 API calls 20672->20673 20673->20671 20675 2b92b1b 20674->20675 20677 2ba0b10 Mailbox 68 API calls 20675->20677 20679 2b92b38 20675->20679 20677->20679 20680 2b92b87 20679->20680 20744 2b93027 20679->20744 20680->20050 20683 2ba0b10 Mailbox 68 API calls 20683->20680 20685 2b93548 __EH_prolog 20684->20685 20686 2b93557 20685->20686 20687 2b93576 20685->20687 20688 2b91996 68 API calls 20686->20688 20706 2b92edd WSASetLastError WSASocketA 20687->20706 20694 2b9355f 20688->20694 20691 2b935ad CreateIoCompletionPort 20692 2b935db 20691->20692 20693 2b935c5 GetLastError 20691->20693 20696 2ba0b10 Mailbox 68 API calls 20692->20696 20695 2ba0b10 Mailbox 68 API calls 20693->20695 20694->20046 20697 2b935d2 20695->20697 20696->20697 20698 2b935ef 20697->20698 20699 2b93626 20697->20699 20700 2ba0b10 Mailbox 68 API calls 20698->20700 20732 2b9def3 20699->20732 20701 2b93608 20700->20701 20714 2b929ee 20701->20714 20704 2b93659 20705 2ba0b10 Mailbox 68 API calls 20704->20705 20705->20694 20707 2ba0b10 Mailbox 68 API calls 20706->20707 20708 2b92f0a WSAGetLastError 20707->20708 20709 2b92f21 20708->20709 20713 2b92f41 20708->20713 20710 2b92f3c 20709->20710 20711 2b92f27 setsockopt 20709->20711 20712 2ba0b10 Mailbox 68 API calls 20710->20712 20711->20710 20712->20713 20713->20691 20713->20694 20715 2b92a0c 20714->20715 20731 2b92aad 20714->20731 20716 2b92a39 WSASetLastError closesocket 20715->20716 20720 2ba0b10 Mailbox 68 API calls 20715->20720 20718 2b9a509 69 API calls 20716->20718 20717 2ba0b10 Mailbox 68 API calls 20719 2b92ab8 20717->20719 20721 2b92a51 20718->20721 20719->20694 20722 2b92a21 20720->20722 20723 2ba0b10 Mailbox 68 API calls 20721->20723 20721->20731 20736 2b92f50 20722->20736 20725 2b92a5c 20723->20725 20727 2b92a7b ioctlsocket WSASetLastError closesocket 20725->20727 20728 2ba0b10 Mailbox 68 API calls 20725->20728 20730 2b9a509 69 API calls 20727->20730 20729 2b92a6e 20728->20729 20729->20727 20729->20731 20730->20731 20731->20717 20731->20719 20733 2b9defd __EH_prolog 20732->20733 20734 2ba3b4c _Allocate 60 API calls 20733->20734 20735 2b9df11 20734->20735 20735->20704 20737 2b92f5b 20736->20737 20738 2b92f70 WSASetLastError setsockopt 20736->20738 20739 2ba0b10 Mailbox 68 API calls 20737->20739 20740 2b9a509 69 API calls 20738->20740 20743 2b92a36 20739->20743 20741 2b92f9e 20740->20741 20742 2ba0b10 Mailbox 68 API calls 20741->20742 20741->20743 20742->20743 20743->20716 20745 2b9303b 20744->20745 20746 2b9304d WSASetLastError select 20744->20746 20747 2ba0b10 Mailbox 68 API calls 20745->20747 20748 2b9a509 69 API calls 20746->20748 20751 2b92b59 20747->20751 20749 2b93095 20748->20749 20750 2ba0b10 Mailbox 68 API calls 20749->20750 20749->20751 20750->20751 20751->20680 20752 2b92fb4 20751->20752 20753 2b92fc0 20752->20753 20754 2b92fd5 WSASetLastError getsockopt 20752->20754 20755 2ba0b10 Mailbox 68 API calls 20753->20755 20756 2b9a509 69 API calls 20754->20756 20759 2b92b7a 20755->20759 20757 2b9300f 20756->20757 20758 2ba0b10 Mailbox 68 API calls 20757->20758 20757->20759 20758->20759 20759->20680 20759->20683 20767 2bb53f0 20760->20767 20762 2b932b5 RtlEnterCriticalSection 20763 2ba0b10 Mailbox 68 API calls 20762->20763 20764 2b932d6 20763->20764 20768 2b93307 20764->20768 20767->20762 20770 2b93311 __EH_prolog 20768->20770 20771 2b93350 20770->20771 20780 2b97e82 20770->20780 20784 2b9239d 20771->20784 20774 2ba0b10 Mailbox 68 API calls 20776 2b9337c 20774->20776 20778 2b92d39 71 API calls 20776->20778 20779 2b93390 20778->20779 20790 2b97e2b 20779->20790 20783 2b97e90 20780->20783 20781 2b97f06 20781->20770 20783->20781 20794 2b989e7 20783->20794 20787 2b923ab 20784->20787 20785 2b92417 20785->20774 20785->20779 20786 2b923c1 PostQueuedCompletionStatus 20786->20787 20788 2b923da RtlEnterCriticalSection 20786->20788 20787->20785 20787->20786 20789 2b923f8 InterlockedExchange RtlLeaveCriticalSection 20787->20789 20788->20787 20789->20787 20792 2b97e30 20790->20792 20791 2b932ee RtlLeaveCriticalSection 20791->20065 20792->20791 20810 2b91e7f 20792->20810 20795 2b98a11 20794->20795 20796 2b97e2b 68 API calls 20795->20796 20798 2b98a57 20796->20798 20797 2b98a7e 20797->20781 20798->20797 20800 2b9a274 20798->20800 20801 2b9a28e 20800->20801 20802 2b9a27e 20800->20802 20801->20797 20802->20801 20805 2b9fb32 20802->20805 20806 2ba24d3 std::exception::exception 59 API calls 20805->20806 20807 2b9fb4a 20806->20807 20808 2ba455a __CxxThrowException@8 RaiseException 20807->20808 20809 2b9fb5f 20808->20809 20811 2ba0b10 Mailbox 68 API calls 20810->20811 20812 2b91e90 20811->20812 20812->20792 20814 2ba227b _LocaleUpdate::_LocaleUpdate 59 API calls 20813->20814 20815 2ba2397 20814->20815 20816 2ba23a5 20815->20816 20820 2ba23bc 20815->20820 20817 2ba5e5b _malloc 59 API calls 20816->20817 20818 2ba23aa 20817->20818 20819 2ba4ef5 _vscan_fn 9 API calls 20818->20819 20821 2ba23b5 ___ascii_stricmp 20819->20821 20820->20821 20822 2ba597a 66 API calls __tolower_l 20820->20822 20821->20076 20822->20820 20824 2ba288b 20823->20824 20825 2ba5e5b _malloc 59 API calls 20824->20825 20828 2ba289b _strlen 20824->20828 20826 2ba2890 20825->20826 20827 2ba4ef5 _vscan_fn 9 API calls 20826->20827 20827->20828 20828->20083 20830 2b9e00a __EH_prolog 20829->20830 20831 2ba3b4c _Allocate 60 API calls 20830->20831 20832 2b9e021 20831->20832 20832->20094 20834 2b9a712 GetProcessHeap HeapFree 20833->20834 20834->20100 20856 2ba9e31 20835->20856 20837 2ba5f0f 20838 2ba5f1a 20837->20838 20839 2ba5f31 20837->20839 20840 2ba5e5b _malloc 59 API calls 20838->20840 20841 2ba5f36 20839->20841 20846 2ba5f43 __flsbuf 20839->20846 20843 2ba5f1f 20840->20843 20842 2ba5e5b _malloc 59 API calls 20841->20842 20842->20843 20843->20110 20844 2ba6021 20847 2ba9e55 __write 79 API calls 20844->20847 20845 2ba5fa7 20848 2ba5fc1 20845->20848 20850 2ba5fd8 20845->20850 20846->20843 20852 2ba5f92 20846->20852 20855 2ba5f9d 20846->20855 20863 2baf7a2 20846->20863 20847->20843 20875 2ba9e55 20848->20875 20850->20843 20903 2baf7f6 20850->20903 20852->20855 20872 2baf965 20852->20872 20855->20844 20855->20845 20857 2ba9e3b 20856->20857 20858 2ba9e50 20856->20858 20859 2ba5e5b _malloc 59 API calls 20857->20859 20858->20837 20860 2ba9e40 20859->20860 20861 2ba4ef5 _vscan_fn 9 API calls 20860->20861 20862 2ba9e4b 20861->20862 20862->20837 20864 2baf7ad 20863->20864 20866 2baf7ba 20863->20866 20865 2ba5e5b _malloc 59 API calls 20864->20865 20867 2baf7b2 20865->20867 20868 2baf7c6 20866->20868 20869 2ba5e5b _malloc 59 API calls 20866->20869 20867->20852 20868->20852 20870 2baf7e7 20869->20870 20871 2ba4ef5 _vscan_fn 9 API calls 20870->20871 20871->20867 20873 2ba8ab5 __malloc_crt 59 API calls 20872->20873 20874 2baf97a 20873->20874 20874->20855 20876 2ba9e61 CallCatchBlock 20875->20876 20877 2ba9e6e 20876->20877 20878 2ba9e85 20876->20878 20879 2ba5e27 __close 59 API calls 20877->20879 20880 2ba9f24 20878->20880 20883 2ba9e99 20878->20883 20882 2ba9e73 20879->20882 20881 2ba5e27 __close 59 API calls 20880->20881 20884 2ba9ebc 20881->20884 20885 2ba5e5b _malloc 59 API calls 20882->20885 20886 2ba9ec1 20883->20886 20887 2ba9eb7 20883->20887 20890 2ba5e5b _malloc 59 API calls 20884->20890 20898 2ba9e7a CallCatchBlock 20885->20898 20928 2bb0c87 20886->20928 20889 2ba5e27 __close 59 API calls 20887->20889 20889->20884 20892 2ba9f30 20890->20892 20891 2ba9ec7 20893 2ba9eda 20891->20893 20894 2ba9eed 20891->20894 20895 2ba4ef5 _vscan_fn 9 API calls 20892->20895 20937 2ba9f44 20893->20937 20897 2ba5e5b _malloc 59 API calls 20894->20897 20895->20898 20900 2ba9ef2 20897->20900 20898->20843 20899 2ba9ee6 20996 2ba9f1c 20899->20996 20901 2ba5e27 __close 59 API calls 20900->20901 20901->20899 20904 2baf802 CallCatchBlock 20903->20904 20905 2baf82b 20904->20905 20906 2baf813 20904->20906 20908 2baf8d0 20905->20908 20912 2baf860 20905->20912 20907 2ba5e27 __close 59 API calls 20906->20907 20909 2baf818 20907->20909 20910 2ba5e27 __close 59 API calls 20908->20910 20911 2ba5e5b _malloc 59 API calls 20909->20911 20913 2baf8d5 20910->20913 20914 2baf820 CallCatchBlock 20911->20914 20915 2bb0c87 ___lock_fhandle 60 API calls 20912->20915 20916 2ba5e5b _malloc 59 API calls 20913->20916 20914->20843 20917 2baf866 20915->20917 20918 2baf8dd 20916->20918 20919 2baf87c 20917->20919 20920 2baf894 20917->20920 20921 2ba4ef5 _vscan_fn 9 API calls 20918->20921 20923 2baf8f2 __lseeki64_nolock 61 API calls 20919->20923 20922 2ba5e5b _malloc 59 API calls 20920->20922 20921->20914 20924 2baf899 20922->20924 20925 2baf88b 20923->20925 20926 2ba5e27 __close 59 API calls 20924->20926 21032 2baf8c8 20925->21032 20926->20925 20929 2bb0c93 CallCatchBlock 20928->20929 20930 2bb0ce2 RtlEnterCriticalSection 20929->20930 20932 2ba88ee __lock 59 API calls 20929->20932 20931 2bb0d08 CallCatchBlock 20930->20931 20931->20891 20933 2bb0cb8 20932->20933 20934 2bb0cd0 20933->20934 20935 2ba920c __getstream InitializeCriticalSectionAndSpinCount 20933->20935 20999 2bb0d0c 20934->20999 20935->20934 20938 2ba9f51 __write_nolock 20937->20938 20939 2ba9faf 20938->20939 20940 2ba9f90 20938->20940 20969 2ba9f85 20938->20969 20943 2baa007 20939->20943 20944 2ba9feb 20939->20944 20942 2ba5e27 __close 59 API calls 20940->20942 20941 2ba454b __except_handler4 6 API calls 20945 2baa7a5 20941->20945 20946 2ba9f95 20942->20946 20948 2baa020 20943->20948 21003 2baf8f2 20943->21003 20947 2ba5e27 __close 59 API calls 20944->20947 20945->20899 20949 2ba5e5b _malloc 59 API calls 20946->20949 20950 2ba9ff0 20947->20950 20953 2baf7a2 __write_nolock 59 API calls 20948->20953 20952 2ba9f9c 20949->20952 20955 2ba5e5b _malloc 59 API calls 20950->20955 20956 2ba4ef5 _vscan_fn 9 API calls 20952->20956 20954 2baa02e 20953->20954 20957 2baa387 20954->20957 20962 2ba5c5a CallCatchBlock 59 API calls 20954->20962 20958 2ba9ff7 20955->20958 20956->20969 20959 2baa71a WriteFile 20957->20959 20960 2baa3a5 20957->20960 20961 2ba4ef5 _vscan_fn 9 API calls 20958->20961 20963 2baa37a GetLastError 20959->20963 20968 2baa347 20959->20968 20964 2baa4c9 20960->20964 20972 2baa3bb 20960->20972 20961->20969 20965 2baa05a GetConsoleMode 20962->20965 20963->20968 20975 2baa4d4 20964->20975 20988 2baa5be 20964->20988 20965->20957 20967 2baa099 20965->20967 20966 2baa753 20966->20969 20973 2ba5e5b _malloc 59 API calls 20966->20973 20967->20957 20970 2baa0a9 GetConsoleCP 20967->20970 20968->20966 20968->20969 20974 2baa4a7 20968->20974 20969->20941 20970->20966 20994 2baa0d8 20970->20994 20971 2baa42a WriteFile 20971->20963 20971->20972 20972->20966 20972->20968 20972->20971 20976 2baa781 20973->20976 20978 2baa74a 20974->20978 20979 2baa4b2 20974->20979 20975->20966 20975->20968 20981 2baa539 WriteFile 20975->20981 20977 2ba5e27 __close 59 API calls 20976->20977 20977->20969 20983 2ba5e3a __dosmaperr 59 API calls 20978->20983 20982 2ba5e5b _malloc 59 API calls 20979->20982 20980 2baa633 WideCharToMultiByte 20980->20963 20980->20988 20981->20963 20981->20975 20984 2baa4b7 20982->20984 20983->20969 20986 2ba5e27 __close 59 API calls 20984->20986 20985 2baa682 WriteFile 20985->20988 20989 2baa6d5 GetLastError 20985->20989 20986->20969 20988->20966 20988->20968 20988->20980 20988->20985 20989->20988 20990 2bb000a 61 API calls __write_nolock 20990->20994 20991 2bb1053 WriteConsoleW CreateFileW __putwch_nolock 20991->20994 20992 2baa1c1 WideCharToMultiByte 20992->20968 20993 2baa1fc WriteFile 20992->20993 20993->20963 20993->20994 20994->20963 20994->20968 20994->20990 20994->20991 20994->20992 20995 2baa256 WriteFile 20994->20995 21012 2badd48 20994->21012 20995->20963 20995->20994 21031 2bb102d RtlLeaveCriticalSection 20996->21031 20998 2ba9f22 20998->20898 21002 2ba8a58 RtlLeaveCriticalSection 20999->21002 21001 2bb0d13 21001->20930 21002->21001 21015 2bb0f44 21003->21015 21005 2baf902 21006 2baf90a 21005->21006 21007 2baf91b SetFilePointerEx 21005->21007 21008 2ba5e5b _malloc 59 API calls 21006->21008 21009 2baf933 GetLastError 21007->21009 21010 2baf90f 21007->21010 21008->21010 21011 2ba5e3a __dosmaperr 59 API calls 21009->21011 21010->20948 21011->21010 21028 2badd0e 21012->21028 21016 2bb0f4f 21015->21016 21017 2bb0f64 21015->21017 21018 2ba5e27 __close 59 API calls 21016->21018 21020 2ba5e27 __close 59 API calls 21017->21020 21022 2bb0f89 21017->21022 21019 2bb0f54 21018->21019 21021 2ba5e5b _malloc 59 API calls 21019->21021 21023 2bb0f93 21020->21023 21024 2bb0f5c 21021->21024 21022->21005 21025 2ba5e5b _malloc 59 API calls 21023->21025 21024->21005 21026 2bb0f9b 21025->21026 21027 2ba4ef5 _vscan_fn 9 API calls 21026->21027 21027->21024 21029 2ba227b _LocaleUpdate::_LocaleUpdate 59 API calls 21028->21029 21030 2badd1f 21029->21030 21030->20994 21031->20998 21035 2bb102d RtlLeaveCriticalSection 21032->21035 21034 2baf8ce 21034->20914 21035->21034 21036->20114 21038 2b9e33a __EH_prolog 21037->21038 21039 2ba3b4c _Allocate 60 API calls 21038->21039 21040 2b9e343 21039->21040 21041 2b91bfa RtlEnterCriticalSection 21040->21041 21043 2b9e551 21040->21043 21041->20119 21044 2b9e55b __EH_prolog 21043->21044 21047 2b926db RtlEnterCriticalSection 21044->21047 21046 2b9e5b1 21046->21041 21048 2b92728 CreateWaitableTimerA 21047->21048 21049 2b9277e 21047->21049 21050 2b92738 GetLastError 21048->21050 21051 2b9275b SetWaitableTimer 21048->21051 21052 2b927d5 RtlLeaveCriticalSection 21049->21052 21053 2ba3b4c _Allocate 60 API calls 21049->21053 21054 2ba0b10 Mailbox 68 API calls 21050->21054 21051->21049 21052->21046 21055 2b9278a 21053->21055 21056 2b92745 21054->21056 21058 2ba3b4c _Allocate 60 API calls 21055->21058 21062 2b927c8 21055->21062 21091 2b91712 21056->21091 21059 2b927a9 21058->21059 21063 2b91cf8 CreateEventA 21059->21063 21097 2b97e03 21062->21097 21064 2b91d23 GetLastError 21063->21064 21065 2b91d52 CreateEventA 21063->21065 21068 2b91d33 21064->21068 21066 2b91d6b GetLastError 21065->21066 21083 2b91d96 21065->21083 21071 2b91d7b 21066->21071 21067 2ba33b9 __beginthreadex 201 API calls 21069 2b91db6 21067->21069 21070 2ba0b10 Mailbox 68 API calls 21068->21070 21072 2b91e0d 21069->21072 21073 2b91dc6 GetLastError 21069->21073 21074 2b91d3c 21070->21074 21075 2ba0b10 Mailbox 68 API calls 21071->21075 21077 2b91e1d 21072->21077 21078 2b91e11 WaitForSingleObject FindCloseChangeNotification 21072->21078 21081 2b91dd8 21073->21081 21079 2b91712 60 API calls 21074->21079 21076 2b91d84 21075->21076 21080 2b91712 60 API calls 21076->21080 21077->21062 21078->21077 21082 2b91d4e 21079->21082 21080->21083 21084 2b91ddc CloseHandle 21081->21084 21085 2b91ddf 21081->21085 21082->21065 21083->21067 21084->21085 21086 2b91de9 CloseHandle 21085->21086 21087 2b91dee 21085->21087 21086->21087 21088 2ba0b10 Mailbox 68 API calls 21087->21088 21089 2b91dfb 21088->21089 21090 2b91712 60 API calls 21089->21090 21090->21072 21092 2b9171c __EH_prolog 21091->21092 21093 2b9173e 21092->21093 21094 2b91815 Mailbox 59 API calls 21092->21094 21093->21051 21095 2b91732 21094->21095 21100 2b9a4a2 21095->21100 21098 2b97e1f 21097->21098 21099 2b97e10 CloseHandle 21097->21099 21098->21052 21099->21098 21101 2b9a4ac __EH_prolog 21100->21101 21108 2b9ca07 21101->21108 21105 2b9a4cd 21106 2ba455a __CxxThrowException@8 RaiseException 21105->21106 21107 2b9a4db 21106->21107 21109 2b9b22e std::bad_exception::bad_exception 60 API calls 21108->21109 21110 2b9a4bf 21109->21110 21111 2b9ca43 21110->21111 21112 2b9ca4d __EH_prolog 21111->21112 21115 2b9b1dd 21112->21115 21114 2b9ca7c Mailbox 21114->21105 21116 2b9b1e7 __EH_prolog 21115->21116 21117 2b9b22e std::bad_exception::bad_exception 60 API calls 21116->21117 21118 2b9b1f8 Mailbox 21117->21118 21118->21114 21130 2b930ae WSASetLastError 21119->21130 21121 2b93c90 21124 2b916ae 21121->21124 21123 2b930ae 71 API calls 21123->21121 21125 2b916b8 __EH_prolog 21124->21125 21126 2b91701 21125->21126 21127 2ba24d3 std::exception::exception 59 API calls 21125->21127 21126->19995 21128 2b916dc 21127->21128 21129 2b9a4a2 60 API calls 21128->21129 21129->21126 21131 2b930ec WSAStringToAddressA 21130->21131 21132 2b930ce 21130->21132 21133 2b9a509 69 API calls 21131->21133 21132->21131 21134 2b930d3 21132->21134 21136 2b93114 21133->21136 21135 2ba0b10 Mailbox 68 API calls 21134->21135 21145 2b930d8 21135->21145 21137 2b93154 21136->21137 21143 2b9311e _memcmp 21136->21143 21138 2b93135 21137->21138 21140 2ba0b10 Mailbox 68 API calls 21137->21140 21139 2b93193 21138->21139 21141 2ba0b10 Mailbox 68 API calls 21138->21141 21144 2ba0b10 Mailbox 68 API calls 21139->21144 21139->21145 21140->21138 21141->21139 21142 2ba0b10 Mailbox 68 API calls 21142->21138 21143->21138 21143->21142 21144->21145 21145->21121 21145->21123 21147 2b93bdd __EH_prolog 21146->21147 21148 2b93bfe htonl htonl 21147->21148 21158 2ba24b7 21147->21158 21148->20134 21153 2b93c20 __EH_prolog 21152->21153 21154 2b93c41 21153->21154 21155 2ba24b7 std::bad_exception::bad_exception 59 API calls 21153->21155 21154->20134 21156 2b93c35 21155->21156 21157 2b9a657 60 API calls 21156->21157 21157->21154 21159 2ba24d3 std::exception::exception 59 API calls 21158->21159 21160 2b93bf2 21159->21160 21161 2b9a657 21160->21161 21162 2b9a661 __EH_prolog 21161->21162 21169 2b9cb7a 21162->21169 21166 2b9a67c 21167 2ba455a __CxxThrowException@8 RaiseException 21166->21167 21168 2b9a68a 21167->21168 21176 2ba249c 21169->21176 21172 2b9cbb6 21173 2b9cbc0 __EH_prolog 21172->21173 21179 2b9b54c 21173->21179 21175 2b9cbef Mailbox 21175->21166 21177 2ba2513 std::exception::exception 59 API calls 21176->21177 21178 2b9a66e 21177->21178 21178->21172 21180 2b9b556 __EH_prolog 21179->21180 21181 2ba249c std::bad_exception::bad_exception 59 API calls 21180->21181 21182 2b9b567 Mailbox 21181->21182 21182->21175 21184 2b93770 21183->21184 21185 2b93755 InterlockedCompareExchange 21183->21185 21187 2ba0b10 Mailbox 68 API calls 21184->21187 21185->21184 21186 2b93765 21185->21186 21188 2b932ab 78 API calls 21186->21188 21189 2b93779 21187->21189 21188->21184 21190 2b929ee 76 API calls 21189->21190 21191 2b9378e 21190->21191 21191->20138 21221 2ba36ad 21192->21221 21194 2b953c8 21194->20151 21195 2ba3906 21194->21195 21196 2ba3912 CallCatchBlock 21195->21196 21197 2ba3948 21196->21197 21198 2ba3930 21196->21198 21200 2ba3940 CallCatchBlock 21196->21200 21363 2ba97f2 21197->21363 21199 2ba5e5b _malloc 59 API calls 21198->21199 21202 2ba3935 21199->21202 21200->20149 21204 2ba4ef5 _vscan_fn 9 API calls 21202->21204 21204->21200 21209 2ba3a90 CallCatchBlock 21208->21209 21210 2ba3abc 21209->21210 21211 2ba3aa4 21209->21211 21214 2ba97f2 __lock_file 60 API calls 21210->21214 21218 2ba3ab4 CallCatchBlock 21210->21218 21212 2ba5e5b _malloc 59 API calls 21211->21212 21213 2ba3aa9 21212->21213 21216 2ba4ef5 _vscan_fn 9 API calls 21213->21216 21215 2ba3ace 21214->21215 21390 2ba3a18 21215->21390 21216->21218 21218->20151 21222 2ba36b9 CallCatchBlock 21221->21222 21223 2ba36cb 21222->21223 21226 2ba36f8 21222->21226 21224 2ba5e5b _malloc 59 API calls 21223->21224 21225 2ba36d0 21224->21225 21227 2ba4ef5 _vscan_fn 9 API calls 21225->21227 21240 2ba98c8 21226->21240 21236 2ba36db CallCatchBlock @_EH4_CallFilterFunc@8 21227->21236 21229 2ba36fd 21230 2ba3713 21229->21230 21231 2ba3706 21229->21231 21233 2ba373c 21230->21233 21234 2ba371c 21230->21234 21232 2ba5e5b _malloc 59 API calls 21231->21232 21232->21236 21255 2ba99e7 21233->21255 21237 2ba5e5b _malloc 59 API calls 21234->21237 21236->21194 21237->21236 21241 2ba98d4 CallCatchBlock 21240->21241 21242 2ba88ee __lock 59 API calls 21241->21242 21243 2ba98e2 21242->21243 21244 2ba995d 21243->21244 21250 2ba8976 __mtinitlocknum 59 API calls 21243->21250 21253 2ba9956 21243->21253 21275 2ba9831 21243->21275 21280 2ba989b 21243->21280 21245 2ba8ab5 __malloc_crt 59 API calls 21244->21245 21247 2ba9964 21245->21247 21249 2ba920c __getstream InitializeCriticalSectionAndSpinCount 21247->21249 21247->21253 21248 2ba99d3 CallCatchBlock 21248->21229 21252 2ba998a RtlEnterCriticalSection 21249->21252 21250->21243 21252->21253 21285 2ba99de 21253->21285 21264 2ba9a04 21255->21264 21256 2ba9a18 21258 2ba5e5b _malloc 59 API calls 21256->21258 21257 2ba9bbf 21257->21256 21261 2ba9c1b 21257->21261 21259 2ba9a1d 21258->21259 21260 2ba4ef5 _vscan_fn 9 API calls 21259->21260 21262 2ba3747 21260->21262 21296 2bb0830 21261->21296 21272 2ba3769 21262->21272 21264->21256 21264->21257 21290 2bb084e 21264->21290 21269 2bb097d __openfile 59 API calls 21270 2ba9bd7 21269->21270 21270->21257 21271 2bb097d __openfile 59 API calls 21270->21271 21271->21257 21356 2ba9861 21272->21356 21274 2ba376f 21274->21236 21276 2ba983c 21275->21276 21277 2ba9852 RtlEnterCriticalSection 21275->21277 21278 2ba88ee __lock 59 API calls 21276->21278 21277->21243 21279 2ba9845 21278->21279 21279->21243 21281 2ba98a9 21280->21281 21282 2ba98bc RtlLeaveCriticalSection 21280->21282 21288 2ba8a58 RtlLeaveCriticalSection 21281->21288 21282->21243 21284 2ba98b9 21284->21243 21289 2ba8a58 RtlLeaveCriticalSection 21285->21289 21287 2ba99e5 21287->21248 21288->21284 21289->21287 21299 2bb0866 21290->21299 21292 2ba9b85 21292->21256 21293 2bb097d 21292->21293 21307 2bb0995 21293->21307 21295 2ba9bb8 21295->21257 21295->21269 21314 2bb0719 21296->21314 21298 2bb0849 21298->21262 21300 2bb087b 21299->21300 21303 2bb0874 21299->21303 21301 2ba227b _LocaleUpdate::_LocaleUpdate 59 API calls 21300->21301 21302 2bb0888 21301->21302 21302->21303 21304 2ba5e5b _malloc 59 API calls 21302->21304 21303->21292 21305 2bb08bb 21304->21305 21306 2ba4ef5 _vscan_fn 9 API calls 21305->21306 21306->21303 21308 2ba227b _LocaleUpdate::_LocaleUpdate 59 API calls 21307->21308 21309 2bb09a8 21308->21309 21310 2ba5e5b _malloc 59 API calls 21309->21310 21313 2bb09bd 21309->21313 21311 2bb09e9 21310->21311 21312 2ba4ef5 _vscan_fn 9 API calls 21311->21312 21312->21313 21313->21295 21317 2bb0725 CallCatchBlock 21314->21317 21315 2bb073b 21316 2ba5e5b _malloc 59 API calls 21315->21316 21318 2bb0740 21316->21318 21317->21315 21319 2bb0771 21317->21319 21320 2ba4ef5 _vscan_fn 9 API calls 21318->21320 21325 2bb07e2 21319->21325 21324 2bb074a CallCatchBlock 21320->21324 21324->21298 21334 2ba8237 21325->21334 21327 2bb078d 21330 2bb07b6 21327->21330 21328 2bb07f6 21328->21327 21329 2ba2f74 _free 59 API calls 21328->21329 21329->21327 21331 2bb07bc 21330->21331 21333 2bb07e0 21330->21333 21355 2bb102d RtlLeaveCriticalSection 21331->21355 21333->21324 21335 2ba825a 21334->21335 21336 2ba8244 21334->21336 21335->21336 21338 2ba8261 ___crtIsPackagedApp 21335->21338 21337 2ba5e5b _malloc 59 API calls 21336->21337 21339 2ba8249 21337->21339 21341 2ba826a AreFileApisANSI 21338->21341 21342 2ba8277 MultiByteToWideChar 21338->21342 21340 2ba4ef5 _vscan_fn 9 API calls 21339->21340 21350 2ba8253 21340->21350 21341->21342 21345 2ba8274 21341->21345 21343 2ba82a2 21342->21343 21344 2ba8291 GetLastError 21342->21344 21347 2ba8ab5 __malloc_crt 59 API calls 21343->21347 21346 2ba5e3a __dosmaperr 59 API calls 21344->21346 21345->21342 21346->21350 21348 2ba82aa 21347->21348 21349 2ba82b1 MultiByteToWideChar 21348->21349 21348->21350 21349->21350 21351 2ba82c7 GetLastError 21349->21351 21350->21328 21352 2ba5e3a __dosmaperr 59 API calls 21351->21352 21353 2ba82d3 21352->21353 21354 2ba2f74 _free 59 API calls 21353->21354 21354->21350 21355->21333 21357 2ba988f RtlLeaveCriticalSection 21356->21357 21358 2ba9870 21356->21358 21357->21274 21358->21357 21359 2ba9877 21358->21359 21362 2ba8a58 RtlLeaveCriticalSection 21359->21362 21361 2ba988c 21361->21274 21362->21361 21364 2ba9802 21363->21364 21365 2ba9824 RtlEnterCriticalSection 21363->21365 21364->21365 21366 2ba980a 21364->21366 21367 2ba394e 21365->21367 21368 2ba88ee __lock 59 API calls 21366->21368 21369 2ba37ad 21367->21369 21368->21367 21371 2ba37bc 21369->21371 21376 2ba37da 21369->21376 21370 2ba37ca 21372 2ba5e5b _malloc 59 API calls 21370->21372 21371->21370 21371->21376 21379 2ba37f4 _memmove 21371->21379 21373 2ba37cf 21372->21373 21374 2ba4ef5 _vscan_fn 9 API calls 21373->21374 21374->21376 21375 2ba5f01 __flsbuf 79 API calls 21375->21379 21381 2ba3980 21376->21381 21378 2ba9e31 __fflush_nolock 59 API calls 21378->21379 21379->21375 21379->21376 21379->21378 21380 2ba9e55 __write 79 API calls 21379->21380 21384 2baa7ef 21379->21384 21380->21379 21382 2ba9861 __fsopen 2 API calls 21381->21382 21383 2ba3986 21382->21383 21383->21200 21385 2baa802 21384->21385 21386 2baa826 21384->21386 21385->21386 21387 2ba9e31 __fflush_nolock 59 API calls 21385->21387 21386->21379 21388 2baa81f 21387->21388 21389 2ba9e55 __write 79 API calls 21388->21389 21389->21386 21391 2ba3a3b 21390->21391 21392 2ba3a27 21390->21392 21394 2baa7ef __flush 79 API calls 21391->21394 21404 2ba3a37 21391->21404 21393 2ba5e5b _malloc 59 API calls 21392->21393 21395 2ba3a2c 21393->21395 21396 2ba3a47 21394->21396 21397 2ba4ef5 _vscan_fn 9 API calls 21395->21397 21409 2bab29b 21396->21409 21397->21404 21400 2ba9e31 __fflush_nolock 59 API calls 21401 2ba3a55 21400->21401 21413 2bab126 21401->21413 21403 2ba3a5b 21403->21404 21405 2ba2f74 _free 59 API calls 21403->21405 21406 2ba3af3 21404->21406 21405->21404 21407 2ba9861 __fsopen 2 API calls 21406->21407 21408 2ba3af9 21407->21408 21408->21218 21410 2ba3a4f 21409->21410 21411 2bab2a8 21409->21411 21410->21400 21411->21410 21412 2ba2f74 _free 59 API calls 21411->21412 21412->21410 21414 2bab132 CallCatchBlock 21413->21414 21415 2bab13f 21414->21415 21416 2bab156 21414->21416 21418 2ba5e27 __close 59 API calls 21415->21418 21417 2bab1e1 21416->21417 21420 2bab166 21416->21420 21421 2ba5e27 __close 59 API calls 21417->21421 21419 2bab144 21418->21419 21422 2ba5e5b _malloc 59 API calls 21419->21422 21423 2bab18e 21420->21423 21424 2bab184 21420->21424 21425 2bab189 21421->21425 21436 2bab14b CallCatchBlock 21422->21436 21427 2bb0c87 ___lock_fhandle 60 API calls 21423->21427 21426 2ba5e27 __close 59 API calls 21424->21426 21428 2ba5e5b _malloc 59 API calls 21425->21428 21426->21425 21429 2bab194 21427->21429 21430 2bab1ed 21428->21430 21431 2bab1b2 21429->21431 21432 2bab1a7 21429->21432 21434 2ba4ef5 _vscan_fn 9 API calls 21430->21434 21433 2ba5e5b _malloc 59 API calls 21431->21433 21439 2bab201 21432->21439 21437 2bab1ad 21433->21437 21434->21436 21436->21403 21454 2bab1d9 21437->21454 21440 2bb0f44 __commit 59 API calls 21439->21440 21441 2bab20f 21440->21441 21442 2bab265 21441->21442 21443 2bab243 21441->21443 21445 2bb0f44 __commit 59 API calls 21441->21445 21457 2bb0ebe 21442->21457 21443->21442 21446 2bb0f44 __commit 59 API calls 21443->21446 21448 2bab23a 21445->21448 21449 2bab24f CloseHandle 21446->21449 21452 2bb0f44 __commit 59 API calls 21448->21452 21449->21442 21453 2bab25b GetLastError 21449->21453 21450 2bab28f 21450->21437 21451 2ba5e3a __dosmaperr 59 API calls 21451->21450 21452->21443 21453->21442 21466 2bb102d RtlLeaveCriticalSection 21454->21466 21456 2bab1df 21456->21436 21458 2bb0f2a 21457->21458 21459 2bb0eca 21457->21459 21460 2ba5e5b _malloc 59 API calls 21458->21460 21459->21458 21464 2bb0ef3 21459->21464 21461 2bb0f2f 21460->21461 21462 2ba5e27 __close 59 API calls 21461->21462 21463 2bab26d 21462->21463 21463->21450 21463->21451 21464->21463 21465 2bb0f15 SetStdHandle 21464->21465 21465->21463 21466->21456 21467 2b9f9a7 LoadLibraryA 21468 2b9fa8a 21467->21468 21469 2b9f9d0 GetProcAddress 21467->21469 21470 2b9fa83 FreeLibrary 21469->21470 21473 2b9f9e4 21469->21473 21470->21468 21471 2b9f9f6 GetAdaptersInfo 21471->21473 21472 2b9fa7e 21472->21470 21473->21471 21473->21472 21473->21473 21474 2ba3b4c _Allocate 60 API calls 21473->21474 21474->21473 21475 2bcec10 21476 2bcebf6 21475->21476 21477 2c00c0c 21476->21477 21478 2c2fb59 CreateFileA 21476->21478 21479 2c2fb5f 21478->21479 21479->21479 21480 2be5e0e 21481 2c2da6b 21480->21481 21483 2ba2fac 59 API calls 21481->21483 21482 2c2da70 21484 2ba2fac 59 API calls 21482->21484 21483->21482 21484->21482 21485 402eb0 GetVersion 21509 403ff4 HeapCreate 21485->21509 21487 402f0f 21488 402f14 21487->21488 21489 402f1c 21487->21489 21584 402fcb 21488->21584 21521 403cd4 21489->21521 21493 402f24 GetCommandLineA 21535 403ba2 21493->21535 21497 402f3e 21567 40389c 21497->21567 21499 402f43 21500 402f48 GetStartupInfoA 21499->21500 21580 403844 21500->21580 21502 402f5a GetModuleHandleA 21504 402f7e 21502->21504 21590 4035eb 21504->21590 21510 404014 21509->21510 21511 40404a 21509->21511 21597 403eac 21510->21597 21511->21487 21514 404030 21517 40404d 21514->21517 21519 404c1c 5 API calls 21514->21519 21515 404023 21609 4043cb HeapAlloc 21515->21609 21517->21487 21518 40402d 21518->21517 21520 40403e HeapDestroy 21518->21520 21519->21518 21520->21511 21665 402fef 21521->21665 21526 403cf3 GetStartupInfoA 21531 403e04 21526->21531 21534 403d3f 21526->21534 21527 403e2b GetStdHandle 21529 403e39 GetFileType 21527->21529 21527->21531 21528 403e6b SetHandleCount 21528->21493 21529->21531 21530 402fef 12 API calls 21530->21534 21531->21527 21531->21528 21532 403db0 21532->21531 21533 403dd2 GetFileType 21532->21533 21533->21532 21534->21530 21534->21531 21534->21532 21536 403bf0 21535->21536 21537 403bbd GetEnvironmentStringsW 21535->21537 21539 403bc5 21536->21539 21540 403be1 21536->21540 21538 403bd1 GetEnvironmentStrings 21537->21538 21537->21539 21538->21540 21541 402f34 21538->21541 21542 403c09 WideCharToMultiByte 21539->21542 21543 403bfd GetEnvironmentStringsW 21539->21543 21540->21541 21544 403c83 GetEnvironmentStrings 21540->21544 21545 403c8f 21540->21545 21558 403955 21541->21558 21547 403c3d 21542->21547 21548 403c6f FreeEnvironmentStringsW 21542->21548 21543->21541 21543->21542 21544->21541 21544->21545 21549 402fef 12 API calls 21545->21549 21550 402fef 12 API calls 21547->21550 21548->21541 21556 403caa 21549->21556 21551 403c43 21550->21551 21551->21548 21552 403c4c WideCharToMultiByte 21551->21552 21554 403c66 21552->21554 21555 403c5d 21552->21555 21553 403cc0 FreeEnvironmentStringsA 21553->21541 21554->21548 21557 4030a1 7 API calls 21555->21557 21556->21553 21557->21554 21559 403967 21558->21559 21560 40396c GetModuleFileNameA 21558->21560 21694 4061b4 21559->21694 21562 40398f 21560->21562 21563 402fef 12 API calls 21562->21563 21564 4039b0 21563->21564 21565 4039c0 21564->21565 21566 402fa6 7 API calls 21564->21566 21565->21497 21566->21565 21568 4038a9 21567->21568 21570 4038ae 21567->21570 21569 4061b4 19 API calls 21568->21569 21569->21570 21571 402fef 12 API calls 21570->21571 21572 4038db 21571->21572 21573 402fa6 7 API calls 21572->21573 21579 4038ef 21572->21579 21573->21579 21574 403932 21575 4030a1 7 API calls 21574->21575 21576 40393e 21575->21576 21576->21499 21577 402fef 12 API calls 21577->21579 21578 402fa6 7 API calls 21578->21579 21579->21574 21579->21577 21579->21578 21581 40384d 21580->21581 21583 403852 21580->21583 21582 4061b4 19 API calls 21581->21582 21582->21583 21583->21502 21585 402fd4 21584->21585 21586 402fd9 21584->21586 21587 404224 7 API calls 21585->21587 21588 40425d 7 API calls 21586->21588 21587->21586 21589 402fe2 ExitProcess 21588->21589 21718 40360d 21590->21718 21593 4036c0 21594 4036cc 21593->21594 21595 4037f5 UnhandledExceptionFilter 21594->21595 21596 402f98 21594->21596 21595->21596 21611 402d40 21597->21611 21600 403eef GetEnvironmentVariableA 21604 403f0e 21600->21604 21608 403fcc 21600->21608 21601 403ed5 21601->21600 21602 403ee7 21601->21602 21602->21514 21602->21515 21605 403f53 GetModuleFileNameA 21604->21605 21606 403f4b 21604->21606 21605->21606 21606->21608 21613 4061d0 21606->21613 21608->21602 21616 403e7f GetModuleHandleA 21608->21616 21610 4043e7 21609->21610 21610->21518 21612 402d4c GetVersionExA 21611->21612 21612->21600 21612->21601 21618 4061e7 21613->21618 21617 403e96 21616->21617 21617->21602 21620 4061ff 21618->21620 21622 40622f 21620->21622 21625 4053a6 21620->21625 21621 4053a6 6 API calls 21621->21622 21622->21621 21623 4061e3 21622->21623 21629 4073ab 21622->21629 21623->21608 21626 4053c4 21625->21626 21628 4053b8 21625->21628 21635 40670e 21626->21635 21628->21620 21630 4073d6 21629->21630 21633 4073b9 21629->21633 21631 4053a6 6 API calls 21630->21631 21632 4073f2 21630->21632 21631->21632 21632->21633 21647 406857 21632->21647 21633->21622 21636 40673f GetStringTypeW 21635->21636 21638 406757 21635->21638 21637 40675b GetStringTypeA 21636->21637 21636->21638 21637->21638 21639 406843 21637->21639 21640 406782 GetStringTypeA 21638->21640 21642 4067a6 21638->21642 21639->21628 21640->21639 21642->21639 21643 4067bc MultiByteToWideChar 21642->21643 21643->21639 21644 4067e0 21643->21644 21644->21639 21645 40681a MultiByteToWideChar 21644->21645 21645->21639 21646 406833 GetStringTypeW 21645->21646 21646->21639 21648 406887 LCMapStringW 21647->21648 21649 4068a3 21647->21649 21648->21649 21650 4068ab LCMapStringA 21648->21650 21651 406909 21649->21651 21652 4068ec LCMapStringA 21649->21652 21650->21649 21653 4069e5 21650->21653 21651->21653 21654 40691f MultiByteToWideChar 21651->21654 21652->21653 21653->21633 21654->21653 21655 406949 21654->21655 21655->21653 21656 40697f MultiByteToWideChar 21655->21656 21656->21653 21657 406998 LCMapStringW 21656->21657 21657->21653 21658 4069b3 21657->21658 21659 4069b9 21658->21659 21661 4069f9 21658->21661 21659->21653 21660 4069c7 LCMapStringW 21659->21660 21660->21653 21661->21653 21662 406a31 LCMapStringW 21661->21662 21662->21653 21663 406a49 WideCharToMultiByte 21662->21663 21663->21653 21666 403001 12 API calls 21665->21666 21667 402ffe 21666->21667 21667->21526 21668 402fa6 21667->21668 21669 402fb4 21668->21669 21670 402faf 21668->21670 21680 40425d 21669->21680 21674 404224 21670->21674 21675 40422e 21674->21675 21676 40425b 21675->21676 21677 40425d 7 API calls 21675->21677 21676->21669 21678 404245 21677->21678 21679 40425d 7 API calls 21678->21679 21679->21676 21683 404270 21680->21683 21681 402fbd 21681->21526 21682 404387 21686 40439a GetStdHandle WriteFile 21682->21686 21683->21681 21683->21682 21684 4042b0 21683->21684 21684->21681 21685 4042bc GetModuleFileNameA 21684->21685 21687 4042d4 21685->21687 21686->21681 21689 406578 21687->21689 21690 406585 LoadLibraryA 21689->21690 21693 4065c7 21689->21693 21691 406596 GetProcAddress 21690->21691 21690->21693 21692 4065ad GetProcAddress GetProcAddress 21691->21692 21691->21693 21692->21693 21693->21681 21695 4061bd 21694->21695 21697 4061c4 21694->21697 21698 405df0 21695->21698 21697->21560 21705 405f89 21698->21705 21700 405f7d 21700->21697 21703 405e33 GetCPInfo 21704 405e47 21703->21704 21704->21700 21710 40602f GetCPInfo 21704->21710 21706 405fa9 21705->21706 21707 405f99 GetOEMCP 21705->21707 21708 405e01 21706->21708 21709 405fae GetACP 21706->21709 21707->21706 21708->21700 21708->21703 21708->21704 21709->21708 21711 40611a 21710->21711 21714 406052 21710->21714 21711->21700 21712 40670e 6 API calls 21713 4060ce 21712->21713 21715 406857 9 API calls 21713->21715 21714->21712 21716 4060f2 21715->21716 21717 406857 9 API calls 21716->21717 21717->21711 21719 403619 GetCurrentProcess TerminateProcess 21718->21719 21720 40362a 21718->21720 21719->21720 21721 402f87 21720->21721 21722 403694 ExitProcess 21720->21722 21721->21593 21723 402172 21724 40d2e1 RegSetValueExA 21723->21724 21726 4022b3 21727 4028a2 RegCreateKeyExA 21726->21727 21729 2b9104d 21730 2ba33a4 __cinit 68 API calls 21729->21730 21731 2b91057 21730->21731 21734 2b91aa9 InterlockedIncrement 21731->21734 21735 2b9105c 21734->21735 21736 2b91ac5 WSAStartup InterlockedExchange 21734->21736 21736->21735 21737 2bced49 21738 2bced4b DnsQuery_A 21737->21738 21740 2c2b44a 21738->21740 21741 4024f7 RegOpenKeyExA 21742 40d626 21741->21742 21743 40da53 lstrcmpiW 21742->21743 21744 40d35e lstrcmpiW 21742->21744 21743->21742 21746 40263c CreateDirectoryA 21747 40d7e1 21746->21747 21747->21747 21748 2b96487 21749 2b964ab RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 21748->21749 21750 2b964ef GetTickCount 21749->21750 21827 2b942c7 21749->21827 21828 2b9605a 21750->21828 21829 2ba2fac _malloc 59 API calls 21828->21829 21830 2b9606d 21829->21830

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 2b972a7-2b972bf InternetOpenA 1 2b97385-2b9738b 0->1 2 2b972c5-2b97319 InternetSetOptionA * 3 call 2ba4af0 0->2 4 2b9738d-2b97393 1->4 5 2b973a7-2b973b5 1->5 6 2b9731e-2b9733c InternetOpenUrlA 2->6 7 2b97399-2b973a6 call 2b953ec 4->7 8 2b97395-2b97397 4->8 9 2b973bb-2b973df call 2ba4af0 call 2b9439c 5->9 10 2b966f0-2b966f2 5->10 12 2b9737e-2b9737f InternetCloseHandle 6->12 13 2b9733e 6->13 7->5 8->5 9->10 31 2b973e5-2b97413 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba233c 9->31 14 2b966fb-2b966fd 10->14 15 2b966f4-2b966f9 10->15 12->1 18 2b97342-2b97368 InternetReadFile 13->18 20 2b9670a-2b9673e RtlEnterCriticalSection RtlLeaveCriticalSection 14->20 21 2b966ff 14->21 19 2b96704 Sleep 15->19 24 2b9736a-2b97371 18->24 25 2b97373-2b9737a InternetCloseHandle 18->25 19->20 26 2b9678e 20->26 27 2b96740-2b9674c 20->27 21->19 24->18 25->12 28 2b96792 26->28 27->26 30 2b9674e-2b9675b 27->30 28->0 32 2b9675d-2b96761 30->32 33 2b96763-2b96764 30->33 38 2b97469-2b97484 call 2ba233c 31->38 39 2b97415-2b97427 call 2ba233c 31->39 35 2b96768-2b9678c call 2ba4af0 * 2 32->35 33->35 35->28 47 2b9748a-2b9748c 38->47 48 2b9773e-2b97750 call 2ba233c 38->48 39->38 49 2b97429-2b9743b call 2ba233c 39->49 47->48 50 2b97492-2b97544 call 2ba2fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba4af0 * 5 call 2b9439c * 2 47->50 57 2b97799-2b977a2 call 2ba233c 48->57 58 2b97752-2b97754 48->58 49->38 59 2b9743d-2b9744f call 2ba233c 49->59 114 2b97581 50->114 115 2b97546-2b97548 50->115 66 2b977a7-2b977ab 57->66 58->57 61 2b97756-2b97794 call 2ba4af0 RtlEnterCriticalSection RtlLeaveCriticalSection 58->61 59->38 70 2b97451-2b97463 call 2ba233c 59->70 61->10 68 2b977ad-2b977bb call 2b961f1 call 2b962ff 66->68 69 2b977cc-2b977de call 2ba233c 66->69 86 2b977c0-2b977c7 call 2b9640a 68->86 82 2b97afc-2b97b0e call 2ba233c 69->82 83 2b977e4-2b977e6 69->83 70->10 70->38 82->10 95 2b97b14-2b97b42 call 2ba2fac call 2ba4af0 call 2b9439c 82->95 83->82 88 2b977ec-2b97803 call 2b9439c 83->88 86->10 88->10 99 2b97809-2b978d7 call 2ba2418 call 2b91ba7 88->99 122 2b97b4b-2b97b52 call 2ba2f74 95->122 123 2b97b44-2b97b46 call 2b9534d 95->123 112 2b978d9 call 2b9143f 99->112 113 2b978de-2b978ff RtlEnterCriticalSection 99->113 112->113 119 2b9790b-2b97941 RtlLeaveCriticalSection call 2b93c67 call 2b93d7e 113->119 120 2b97901-2b97908 113->120 117 2b97585-2b975b3 call 2ba2fac call 2ba4af0 call 2b9439c 114->117 115->114 121 2b9754a-2b9755c call 2ba233c 115->121 144 2b975b5-2b975c4 call 2ba35e6 117->144 145 2b975f4-2b975fd call 2ba2f74 117->145 137 2b97946-2b97963 call 2b9833b 119->137 120->119 121->114 135 2b9755e-2b9757f call 2b9439c 121->135 122->10 123->122 135->117 143 2b97968-2b9796f 137->143 146 2b97ae3-2b97af7 call 2b99003 143->146 147 2b97975-2b979af call 2b9a725 143->147 144->145 160 2b975c6 144->160 158 2b97603-2b9761b call 2ba3b4c 145->158 159 2b97734-2b97737 145->159 146->10 152 2b979b4-2b979bd 147->152 156 2b97aad-2b97ade call 2b983ea call 2b933b2 152->156 157 2b979c3-2b979ca 152->157 156->146 161 2b979cd-2b979d2 157->161 171 2b9761d-2b97625 call 2b99737 158->171 172 2b97627 158->172 159->48 163 2b975cb-2b975dd call 2ba2850 160->163 161->161 166 2b979d4-2b97a11 call 2b9a725 161->166 177 2b975df 163->177 178 2b975e2-2b975f2 call 2ba35e6 163->178 174 2b97a16-2b97a1f 166->174 176 2b97629-2b9765d call 2b9a84f call 2b93863 171->176 172->176 174->156 180 2b97a25-2b97a2b 174->180 188 2b97662-2b9767e call 2b95119 176->188 177->178 178->145 178->163 184 2b97a2e-2b97a33 180->184 184->184 186 2b97a35-2b97a70 call 2b9a725 184->186 186->156 193 2b97a72-2b97aa6 call 2b9d117 186->193 192 2b97683-2b976b4 call 2b93863 call 2b9aaf5 188->192 199 2b976b9-2b976cb call 2b9ac0f 192->199 197 2b97aab-2b97aac 193->197 197->156 201 2b976d0-2b976e1 199->201 202 2b976e8-2b976f7 Sleep 201->202 203 2b976e3 call 2b9380b 201->203 205 2b976ff-2b97713 call 2ba18f0 202->205 203->202 207 2b9771f-2b9772d 205->207 208 2b97715-2b9771e call 2b94100 205->208 207->159 209 2b9772f call 2b9380b 207->209 208->207 209->159
                                                    APIs
                                                    • Sleep.KERNELBASE(0000EA60), ref: 02B96704
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B9670F
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B96720
                                                    • InternetOpenA.WININET(?), ref: 02B972B1
                                                    • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02B972D9
                                                    • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02B972F1
                                                    • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02B97309
                                                    • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02B97332
                                                    • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02B97354
                                                    • InternetCloseHandle.WININET(00000000), ref: 02B97374
                                                    • InternetCloseHandle.WININET(00000000), ref: 02B9737F
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B973EA
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B973FB
                                                    • _malloc.LIBCMT ref: 02B97494
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B974A6
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B974B2
                                                    • _malloc.LIBCMT ref: 02B9758A
                                                    • _strtok.LIBCMT ref: 02B975BB
                                                    • _swscanf.LIBCMT ref: 02B975D2
                                                    • _strtok.LIBCMT ref: 02B975E9
                                                    • _free.LIBCMT ref: 02B975F5
                                                    • Sleep.KERNEL32(000007D0), ref: 02B976ED
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B9776E
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B97780
                                                    • _sprintf.LIBCMT ref: 02B9781E
                                                    • RtlEnterCriticalSection.NTDLL(00000020), ref: 02B978E2
                                                    • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02B97916
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                    • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                    • API String ID: 1657546717-1839899575
                                                    • Opcode ID: cc8b683dc4b92f78dd20af0aecf794a6bcbc61d0846e499084c943265a27543a
                                                    • Instruction ID: 438dd6e1e34ee21a950d613ca65fdccc6af7d4c48d220fd2285b650ccb42e698
                                                    • Opcode Fuzzy Hash: cc8b683dc4b92f78dd20af0aecf794a6bcbc61d0846e499084c943265a27543a
                                                    • Instruction Fuzzy Hash: C932117260C3819FEB25AB24D814BAFBBE6EF85300F1048ADF58997291DFB19504DB52

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 478 2b96487-2b964e8 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 480 2b964ef-2b966ed GetTickCount call 2b9605a GetVersionExA call 2ba4af0 call 2ba2fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2ba4af0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba2fac * 4 QueryPerformanceCounter Sleep call 2ba2fac * 2 call 2ba4af0 * 2 478->480 481 2b964ea call 2b942c7 478->481 524 2b966f0-2b966f2 480->524 481->480 525 2b966fb-2b966fd 524->525 526 2b966f4-2b966f9 524->526 528 2b9670a-2b9673e RtlEnterCriticalSection RtlLeaveCriticalSection 525->528 529 2b966ff 525->529 527 2b96704 Sleep 526->527 527->528 530 2b9678e 528->530 531 2b96740-2b9674c 528->531 529->527 532 2b96792-2b972bf InternetOpenA 530->532 531->530 533 2b9674e-2b9675b 531->533 537 2b97385-2b9738b 532->537 538 2b972c5-2b9733c InternetSetOptionA * 3 call 2ba4af0 InternetOpenUrlA 532->538 534 2b9675d-2b96761 533->534 535 2b96763-2b96764 533->535 539 2b96768-2b9678c call 2ba4af0 * 2 534->539 535->539 541 2b9738d-2b97393 537->541 542 2b973a7-2b973b5 537->542 550 2b9737e-2b9737f InternetCloseHandle 538->550 551 2b9733e 538->551 539->532 545 2b97399-2b973a6 call 2b953ec 541->545 546 2b97395-2b97397 541->546 542->524 548 2b973bb-2b973df call 2ba4af0 call 2b9439c 542->548 545->542 546->542 548->524 562 2b973e5-2b97413 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba233c 548->562 550->537 555 2b97342-2b97368 InternetReadFile 551->555 559 2b9736a-2b97371 555->559 560 2b97373-2b9737a InternetCloseHandle 555->560 559->555 560->550 565 2b97469-2b97484 call 2ba233c 562->565 566 2b97415-2b97427 call 2ba233c 562->566 571 2b9748a-2b9748c 565->571 572 2b9773e-2b97750 call 2ba233c 565->572 566->565 573 2b97429-2b9743b call 2ba233c 566->573 571->572 574 2b97492-2b97544 call 2ba2fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba4af0 * 5 call 2b9439c * 2 571->574 581 2b97799-2b977ab call 2ba233c 572->581 582 2b97752-2b97754 572->582 573->565 583 2b9743d-2b9744f call 2ba233c 573->583 638 2b97581 574->638 639 2b97546-2b97548 574->639 592 2b977ad-2b977bb call 2b961f1 call 2b962ff 581->592 593 2b977cc-2b977de call 2ba233c 581->593 582->581 585 2b97756-2b97794 call 2ba4af0 RtlEnterCriticalSection RtlLeaveCriticalSection 582->585 583->565 594 2b97451-2b97463 call 2ba233c 583->594 585->524 610 2b977c0-2b977c7 call 2b9640a 592->610 606 2b97afc-2b97b0e call 2ba233c 593->606 607 2b977e4-2b977e6 593->607 594->524 594->565 606->524 619 2b97b14-2b97b42 call 2ba2fac call 2ba4af0 call 2b9439c 606->619 607->606 612 2b977ec-2b97803 call 2b9439c 607->612 610->524 612->524 623 2b97809-2b978d7 call 2ba2418 call 2b91ba7 612->623 646 2b97b4b-2b97b52 call 2ba2f74 619->646 647 2b97b44-2b97b46 call 2b9534d 619->647 636 2b978d9 call 2b9143f 623->636 637 2b978de-2b978ff RtlEnterCriticalSection 623->637 636->637 643 2b9790b-2b9796f RtlLeaveCriticalSection call 2b93c67 call 2b93d7e call 2b9833b 637->643 644 2b97901-2b97908 637->644 641 2b97585-2b975b3 call 2ba2fac call 2ba4af0 call 2b9439c 638->641 639->638 645 2b9754a-2b9755c call 2ba233c 639->645 668 2b975b5-2b975c4 call 2ba35e6 641->668 669 2b975f4-2b975fd call 2ba2f74 641->669 670 2b97ae3-2b97af7 call 2b99003 643->670 671 2b97975-2b979bd call 2b9a725 643->671 644->643 645->638 659 2b9755e-2b9757f call 2b9439c 645->659 646->524 647->646 659->641 668->669 684 2b975c6 668->684 682 2b97603-2b9761b call 2ba3b4c 669->682 683 2b97734-2b97737 669->683 670->524 680 2b97aad-2b97ade call 2b983ea call 2b933b2 671->680 681 2b979c3-2b979ca 671->681 680->670 685 2b979cd-2b979d2 681->685 695 2b9761d-2b97625 call 2b99737 682->695 696 2b97627 682->696 683->572 687 2b975cb-2b975dd call 2ba2850 684->687 685->685 690 2b979d4-2b97a1f call 2b9a725 685->690 701 2b975df 687->701 702 2b975e2-2b975f2 call 2ba35e6 687->702 690->680 704 2b97a25-2b97a2b 690->704 700 2b97629-2b976cb call 2b9a84f call 2b93863 call 2b95119 call 2b93863 call 2b9aaf5 call 2b9ac0f 695->700 696->700 725 2b976d0-2b976e1 700->725 701->702 702->669 702->687 708 2b97a2e-2b97a33 704->708 708->708 710 2b97a35-2b97a70 call 2b9a725 708->710 710->680 717 2b97a72-2b97aa6 call 2b9d117 710->717 721 2b97aab-2b97aac 717->721 721->680 726 2b976e8-2b97713 Sleep call 2ba18f0 725->726 727 2b976e3 call 2b9380b 725->727 731 2b9771f-2b9772d 726->731 732 2b97715-2b9771e call 2b94100 726->732 727->726 731->683 733 2b9772f call 2b9380b 731->733 732->731 733->683
                                                    APIs
                                                    • RtlInitializeCriticalSection.NTDLL(02BC71E0), ref: 02B964B6
                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02B964CD
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02B964D6
                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02B964E5
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02B964E8
                                                    • GetTickCount.KERNEL32 ref: 02B964F4
                                                      • Part of subcall function 02B9605A: _malloc.LIBCMT ref: 02B96068
                                                    • GetVersionExA.KERNEL32(02BC7038), ref: 02B96521
                                                    • _malloc.LIBCMT ref: 02B9654D
                                                      • Part of subcall function 02BA2FAC: __FF_MSGBANNER.LIBCMT ref: 02BA2FC3
                                                      • Part of subcall function 02BA2FAC: __NMSG_WRITE.LIBCMT ref: 02BA2FCA
                                                      • Part of subcall function 02BA2FAC: RtlAllocateHeap.NTDLL(00710000,00000000,00000001), ref: 02BA2FEF
                                                    • _malloc.LIBCMT ref: 02B9655D
                                                    • _malloc.LIBCMT ref: 02B96568
                                                    • _malloc.LIBCMT ref: 02B96573
                                                    • _malloc.LIBCMT ref: 02B9657E
                                                    • _malloc.LIBCMT ref: 02B96589
                                                    • _malloc.LIBCMT ref: 02B96594
                                                    • _malloc.LIBCMT ref: 02B965A3
                                                    • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02B965BA
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B965C3
                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02B965D2
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B965D5
                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02B965E0
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B965E3
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B9661D
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B9662A
                                                    • _malloc.LIBCMT ref: 02B9664E
                                                    • _malloc.LIBCMT ref: 02B9665C
                                                    • _malloc.LIBCMT ref: 02B96663
                                                    • _malloc.LIBCMT ref: 02B96689
                                                    • QueryPerformanceCounter.KERNEL32(00000200), ref: 02B9669C
                                                    • Sleep.KERNELBASE ref: 02B966AA
                                                    • _malloc.LIBCMT ref: 02B966B6
                                                    • _malloc.LIBCMT ref: 02B966C3
                                                    • Sleep.KERNELBASE(0000EA60), ref: 02B96704
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B9670F
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B96720
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _malloc$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                    • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                    • API String ID: 4273019447-2678694477
                                                    • Opcode ID: ac10fa747f2a09e230af27647faabcef5fbbb14bc0a8f7edcc34c4c8acdae1c9
                                                    • Instruction ID: 701224b629125e6b9bbb59c82510f98d770c29c2cab73945bf6162035131a6a4
                                                    • Opcode Fuzzy Hash: ac10fa747f2a09e230af27647faabcef5fbbb14bc0a8f7edcc34c4c8acdae1c9
                                                    • Instruction Fuzzy Hash: 46719272D48340AFE7116F749C49B5BBBE8AF85350F1008AEF98597280DBF99810DF96

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1100 401b4b-401b68 LoadLibraryA 1101 401c21-401c25 1100->1101 1102 401b6e-401b7f GetProcAddress 1100->1102 1103 401b85-401b8e 1102->1103 1104 401c18-401c1b FreeLibrary 1102->1104 1105 401b95-401ba5 GetAdaptersInfo 1103->1105 1104->1101 1106 401ba7-401bb0 1105->1106 1107 401bdb-401be3 1105->1107 1110 401bc1-401bd7 call 402cc0 call 4018cc 1106->1110 1111 401bb2-401bb6 1106->1111 1108 401be5-401beb call 402ca6 1107->1108 1109 401bec-401bf0 1107->1109 1108->1109 1115 401bf2-401bf6 1109->1115 1116 401c15-401c17 1109->1116 1110->1107 1111->1107 1112 401bb8-401bbf 1111->1112 1112->1110 1112->1111 1115->1116 1119 401bf8-401bfb 1115->1119 1116->1104 1121 401c06-401c13 call 402c98 1119->1121 1122 401bfd-401c03 1119->1122 1121->1105 1121->1116 1122->1121
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B5D
                                                    • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                    • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                    • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                    • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                    • API String ID: 514930453-3667123677
                                                    • Opcode ID: b984b7dde6bf878e61bd9d6389ae28c16a21e2d2acce5cac07de2378b9438879
                                                    • Instruction ID: 38440359ad4724572ca0372a4bc8090c683b298b5ffde01d95b1867a6a9b844d
                                                    • Opcode Fuzzy Hash: b984b7dde6bf878e61bd9d6389ae28c16a21e2d2acce5cac07de2378b9438879
                                                    • Instruction Fuzzy Hash: F921B870904109AFEF119F65C9447EF7BB8EF41344F1440BAD504B22E1E7789985CB69

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1174 2b9f9a7-2b9f9ca LoadLibraryA 1175 2b9fa8a-2b9fa91 1174->1175 1176 2b9f9d0-2b9f9de GetProcAddress 1174->1176 1177 2b9fa83-2b9fa84 FreeLibrary 1176->1177 1178 2b9f9e4-2b9f9f4 1176->1178 1177->1175 1179 2b9f9f6-2b9fa02 GetAdaptersInfo 1178->1179 1180 2b9fa3a-2b9fa42 1179->1180 1181 2b9fa04 1179->1181 1182 2b9fa4b-2b9fa50 1180->1182 1183 2b9fa44-2b9fa4a call 2ba37a8 1180->1183 1184 2b9fa06-2b9fa0d 1181->1184 1186 2b9fa7e-2b9fa82 1182->1186 1187 2b9fa52-2b9fa55 1182->1187 1183->1182 1188 2b9fa0f-2b9fa13 1184->1188 1189 2b9fa17-2b9fa1f 1184->1189 1186->1177 1187->1186 1193 2b9fa57-2b9fa5c 1187->1193 1188->1184 1190 2b9fa15 1188->1190 1191 2b9fa22-2b9fa27 1189->1191 1190->1180 1191->1191 1194 2b9fa29-2b9fa36 call 2b9f6f6 1191->1194 1195 2b9fa69-2b9fa74 call 2ba3b4c 1193->1195 1196 2b9fa5e-2b9fa66 1193->1196 1194->1180 1195->1186 1201 2b9fa76-2b9fa79 1195->1201 1196->1195 1201->1179
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02B9F9BD
                                                    • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02B9F9D6
                                                    • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02B9F9FB
                                                    • FreeLibrary.KERNEL32(00000000), ref: 02B9FA84
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                    • String ID: GetAdaptersInfo$iphlpapi.dll
                                                    • API String ID: 514930453-3114217049
                                                    • Opcode ID: 65ed3ee8638bd367546503414d5770892f4aaeea86d3572901cb9e81a7cd3823
                                                    • Instruction ID: 244e274d0712bd4a67b207d6586cf9a6bb93ac036ad2b8ae322afb7f4a80d293
                                                    • Opcode Fuzzy Hash: 65ed3ee8638bd367546503414d5770892f4aaeea86d3572901cb9e81a7cd3823
                                                    • Instruction Fuzzy Hash: 14219371E04209ABDF11CBA89880AFEBBF8EF09324F1440FAD515E7660D7708945CBA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1287 2b9f8a3-2b9f8ce CreateFileA 1288 2b9f99f-2b9f9a6 1287->1288 1289 2b9f8d4-2b9f8e9 1287->1289 1290 2b9f8ec-2b9f90e DeviceIoControl 1289->1290 1291 2b9f910-2b9f918 1290->1291 1292 2b9f947-2b9f94f 1290->1292 1295 2b9f91a-2b9f91f 1291->1295 1296 2b9f921-2b9f926 1291->1296 1293 2b9f958-2b9f95a 1292->1293 1294 2b9f951-2b9f957 call 2ba37a8 1292->1294 1298 2b9f95c-2b9f95f 1293->1298 1299 2b9f995-2b9f99e FindCloseChangeNotification 1293->1299 1294->1293 1295->1292 1296->1292 1300 2b9f928-2b9f930 1296->1300 1302 2b9f97b-2b9f988 call 2ba3b4c 1298->1302 1303 2b9f961-2b9f96a GetLastError 1298->1303 1299->1288 1304 2b9f933-2b9f938 1300->1304 1302->1299 1311 2b9f98a-2b9f990 1302->1311 1303->1299 1305 2b9f96c-2b9f96f 1303->1305 1304->1304 1307 2b9f93a-2b9f946 call 2b9f6f6 1304->1307 1305->1302 1308 2b9f971-2b9f978 1305->1308 1307->1292 1308->1302 1311->1290
                                                    APIs
                                                    • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02B9F8C2
                                                    • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02B9F900
                                                    • GetLastError.KERNEL32 ref: 02B9F961
                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 02B9F998
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ChangeCloseControlCreateDeviceErrorFileFindLastNotification
                                                    • String ID: \\.\PhysicalDrive0
                                                    • API String ID: 3786717961-1180397377
                                                    • Opcode ID: d5fab690a51eddda5e904cff8710718d052ec68ef151bdd7627ea1d56a9c1642
                                                    • Instruction ID: 21080289b924d30442f0f8954b67c0cc4c7e531e504cbdfac85c877a9876caa0
                                                    • Opcode Fuzzy Hash: d5fab690a51eddda5e904cff8710718d052ec68ef151bdd7627ea1d56a9c1642
                                                    • Instruction Fuzzy Hash: 48319271D00219BFDF14DF94D884ABEBBB9EF45764F2041BAE615E7640D7709A00CB90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1313 401a4f-401a77 CreateFileA 1314 401b45-401b4a 1313->1314 1315 401a7d-401a91 1313->1315 1316 401a98-401ac0 DeviceIoControl 1315->1316 1317 401ac2-401aca 1316->1317 1318 401af3-401afb 1316->1318 1321 401ad4-401ad9 1317->1321 1322 401acc-401ad2 1317->1322 1319 401b04-401b07 1318->1319 1320 401afd-401b03 call 402ca6 1318->1320 1325 401b09-401b0c 1319->1325 1326 401b3a-401b44 FindCloseChangeNotification 1319->1326 1320->1319 1321->1318 1323 401adb-401af1 call 402cc0 call 4018cc 1321->1323 1322->1318 1323->1318 1329 401b27-401b34 call 402c98 1325->1329 1330 401b0e-401b17 GetLastError 1325->1330 1326->1314 1329->1316 1329->1326 1330->1326 1333 401b19-401b1c 1330->1333 1333->1329 1336 401b1e-401b24 1333->1336 1336->1329
                                                    APIs
                                                    • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                    • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                    • GetLastError.KERNEL32 ref: 00401B0E
                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 00401B3D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: ChangeCloseControlCreateDeviceErrorFileFindLastNotification
                                                    • String ID: \\.\PhysicalDrive0
                                                    • API String ID: 3786717961-1180397377
                                                    • Opcode ID: 3afb43cc3dedd2849d90584800b0b4b1cc754ecdd9339dbac4238ad8ee4012bf
                                                    • Instruction ID: fc4aaa1cf60edb7db06fdbd05dea25136cd7d186831ecbc7bbbcf924abbffa34
                                                    • Opcode Fuzzy Hash: 3afb43cc3dedd2849d90584800b0b4b1cc754ecdd9339dbac4238ad8ee4012bf
                                                    • Instruction Fuzzy Hash: 74318B71D00218EADB21AFA5CD849EFBBB9FF41750F20407AE554B32A0E7785E45CB98

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 213 2b96425-2b96432 214 2b96491-2b964aa 213->214 215 2b96434-2b9643a 213->215 216 2b964ab-2b964e8 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 214->216 215->216 217 2b9643c-2b9645b 215->217 220 2b964ef-2b966ed GetTickCount call 2b9605a GetVersionExA call 2ba4af0 call 2ba2fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2ba4af0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba2fac * 4 QueryPerformanceCounter Sleep call 2ba2fac * 2 call 2ba4af0 * 2 216->220 221 2b964ea call 2b942c7 216->221 218 2b9645d-2b96486 217->218 219 2b964c4-2b964ea GetProcAddress GetModuleHandleA GetProcAddress call 2b942c7 217->219 219->220 265 2b966f0-2b966f2 220->265 221->220 266 2b966fb-2b966fd 265->266 267 2b966f4-2b966f9 265->267 269 2b9670a-2b9673e RtlEnterCriticalSection RtlLeaveCriticalSection 266->269 270 2b966ff 266->270 268 2b96704 Sleep 267->268 268->269 271 2b9678e 269->271 272 2b96740-2b9674c 269->272 270->268 273 2b96792-2b972bf InternetOpenA 271->273 272->271 274 2b9674e-2b9675b 272->274 278 2b97385-2b9738b 273->278 279 2b972c5-2b9733c InternetSetOptionA * 3 call 2ba4af0 InternetOpenUrlA 273->279 275 2b9675d-2b96761 274->275 276 2b96763-2b96764 274->276 280 2b96768-2b9678c call 2ba4af0 * 2 275->280 276->280 282 2b9738d-2b97393 278->282 283 2b973a7-2b973b5 278->283 291 2b9737e-2b9737f InternetCloseHandle 279->291 292 2b9733e 279->292 280->273 286 2b97399-2b973a6 call 2b953ec 282->286 287 2b97395-2b97397 282->287 283->265 289 2b973bb-2b973df call 2ba4af0 call 2b9439c 283->289 286->283 287->283 289->265 303 2b973e5-2b97413 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba233c 289->303 291->278 296 2b97342-2b97368 InternetReadFile 292->296 300 2b9736a-2b97371 296->300 301 2b97373-2b9737a InternetCloseHandle 296->301 300->296 301->291 306 2b97469-2b97484 call 2ba233c 303->306 307 2b97415-2b97427 call 2ba233c 303->307 312 2b9748a-2b9748c 306->312 313 2b9773e-2b97750 call 2ba233c 306->313 307->306 314 2b97429-2b9743b call 2ba233c 307->314 312->313 315 2b97492-2b97544 call 2ba2fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba4af0 * 5 call 2b9439c * 2 312->315 322 2b97799-2b977ab call 2ba233c 313->322 323 2b97752-2b97754 313->323 314->306 324 2b9743d-2b9744f call 2ba233c 314->324 379 2b97581 315->379 380 2b97546-2b97548 315->380 333 2b977ad-2b977c7 call 2b961f1 call 2b962ff call 2b9640a 322->333 334 2b977cc-2b977de call 2ba233c 322->334 323->322 326 2b97756-2b97794 call 2ba4af0 RtlEnterCriticalSection RtlLeaveCriticalSection 323->326 324->306 335 2b97451-2b97463 call 2ba233c 324->335 326->265 333->265 347 2b97afc-2b97b0e call 2ba233c 334->347 348 2b977e4-2b977e6 334->348 335->265 335->306 347->265 360 2b97b14-2b97b42 call 2ba2fac call 2ba4af0 call 2b9439c 347->360 348->347 353 2b977ec-2b97803 call 2b9439c 348->353 353->265 364 2b97809-2b978d7 call 2ba2418 call 2b91ba7 353->364 387 2b97b4b-2b97b52 call 2ba2f74 360->387 388 2b97b44-2b97b46 call 2b9534d 360->388 377 2b978d9 call 2b9143f 364->377 378 2b978de-2b978ff RtlEnterCriticalSection 364->378 377->378 384 2b9790b-2b9796f RtlLeaveCriticalSection call 2b93c67 call 2b93d7e call 2b9833b 378->384 385 2b97901-2b97908 378->385 382 2b97585-2b975b3 call 2ba2fac call 2ba4af0 call 2b9439c 379->382 380->379 386 2b9754a-2b9755c call 2ba233c 380->386 409 2b975b5-2b975c4 call 2ba35e6 382->409 410 2b975f4-2b975fd call 2ba2f74 382->410 411 2b97ae3-2b97af7 call 2b99003 384->411 412 2b97975-2b979bd call 2b9a725 384->412 385->384 386->379 400 2b9755e-2b9757f call 2b9439c 386->400 387->265 388->387 400->382 409->410 425 2b975c6 409->425 423 2b97603-2b9761b call 2ba3b4c 410->423 424 2b97734-2b97737 410->424 411->265 421 2b97aad-2b97ade call 2b983ea call 2b933b2 412->421 422 2b979c3-2b979ca 412->422 421->411 426 2b979cd-2b979d2 422->426 436 2b9761d-2b97625 call 2b99737 423->436 437 2b97627 423->437 424->313 428 2b975cb-2b975dd call 2ba2850 425->428 426->426 431 2b979d4-2b97a1f call 2b9a725 426->431 442 2b975df 428->442 443 2b975e2-2b975f2 call 2ba35e6 428->443 431->421 445 2b97a25-2b97a2b 431->445 441 2b97629-2b976e1 call 2b9a84f call 2b93863 call 2b95119 call 2b93863 call 2b9aaf5 call 2b9ac0f 436->441 437->441 467 2b976e8-2b97713 Sleep call 2ba18f0 441->467 468 2b976e3 call 2b9380b 441->468 442->443 443->410 443->428 449 2b97a2e-2b97a33 445->449 449->449 451 2b97a35-2b97a70 call 2b9a725 449->451 451->421 458 2b97a72-2b97aac call 2b9d117 451->458 458->421 472 2b9771f-2b9772d 467->472 473 2b97715-2b9771e call 2b94100 467->473 468->467 472->424 474 2b9772f call 2b9380b 472->474 473->472 474->424
                                                    APIs
                                                    • RtlInitializeCriticalSection.NTDLL(02BC71E0), ref: 02B964B6
                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02B964CD
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02B964D6
                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02B964E5
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02B964E8
                                                    • GetTickCount.KERNEL32 ref: 02B964F4
                                                    • GetVersionExA.KERNEL32(02BC7038), ref: 02B96521
                                                    • _malloc.LIBCMT ref: 02B9654D
                                                    • _malloc.LIBCMT ref: 02B9655D
                                                    • _malloc.LIBCMT ref: 02B96568
                                                    • _malloc.LIBCMT ref: 02B96573
                                                    • _malloc.LIBCMT ref: 02B9657E
                                                    • _malloc.LIBCMT ref: 02B96589
                                                    • _malloc.LIBCMT ref: 02B96594
                                                    • _malloc.LIBCMT ref: 02B965A3
                                                    • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02B965BA
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B965C3
                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02B965D2
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B965D5
                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02B965E0
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B965E3
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B9661D
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B9662A
                                                    • _malloc.LIBCMT ref: 02B9664E
                                                    • _malloc.LIBCMT ref: 02B9665C
                                                    • _malloc.LIBCMT ref: 02B96663
                                                    • _malloc.LIBCMT ref: 02B96689
                                                    • QueryPerformanceCounter.KERNEL32(00000200), ref: 02B9669C
                                                    • Sleep.KERNELBASE ref: 02B966AA
                                                    • _malloc.LIBCMT ref: 02B966B6
                                                    • _malloc.LIBCMT ref: 02B966C3
                                                    • Sleep.KERNELBASE(0000EA60), ref: 02B96704
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B9670F
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B96720
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _malloc$Heap$CriticalSection$AllocateProcess$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                    • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                    • API String ID: 301202609-2678694477
                                                    • Opcode ID: 2c079acacd128e53c50564133e9e3d7229374dfdda4e487224a2e4fb75dc803e
                                                    • Instruction ID: bf07069ae1213dc76e55159a3cad8520d33c2db030c7b6e13f163a61664c625f
                                                    • Opcode Fuzzy Hash: 2c079acacd128e53c50564133e9e3d7229374dfdda4e487224a2e4fb75dc803e
                                                    • Instruction Fuzzy Hash: F591E672D483409FE711AF74DC49B5BBBE8AF89350F1008AEF98597291DBB58801CF96

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 737 2b963d8-2b963eb 738 2b963ed 737->738 739 2b9643c-2b9645b 737->739 738->739 740 2b9645d-2b96486 739->740 741 2b964c4-2b966ed GetProcAddress GetModuleHandleA GetProcAddress call 2b942c7 GetTickCount call 2b9605a GetVersionExA call 2ba4af0 call 2ba2fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2ba4af0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba2fac * 4 QueryPerformanceCounter Sleep call 2ba2fac * 2 call 2ba4af0 * 2 739->741 786 2b966f0-2b966f2 741->786 787 2b966fb-2b966fd 786->787 788 2b966f4-2b966f9 786->788 790 2b9670a-2b9673e RtlEnterCriticalSection RtlLeaveCriticalSection 787->790 791 2b966ff 787->791 789 2b96704 Sleep 788->789 789->790 792 2b9678e 790->792 793 2b96740-2b9674c 790->793 791->789 794 2b96792-2b972bf InternetOpenA 792->794 793->792 795 2b9674e-2b9675b 793->795 799 2b97385-2b9738b 794->799 800 2b972c5-2b9733c InternetSetOptionA * 3 call 2ba4af0 InternetOpenUrlA 794->800 796 2b9675d-2b96761 795->796 797 2b96763-2b96764 795->797 801 2b96768-2b9678c call 2ba4af0 * 2 796->801 797->801 803 2b9738d-2b97393 799->803 804 2b973a7-2b973b5 799->804 812 2b9737e-2b9737f InternetCloseHandle 800->812 813 2b9733e 800->813 801->794 807 2b97399-2b973a6 call 2b953ec 803->807 808 2b97395-2b97397 803->808 804->786 810 2b973bb-2b973df call 2ba4af0 call 2b9439c 804->810 807->804 808->804 810->786 824 2b973e5-2b97413 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba233c 810->824 812->799 817 2b97342-2b97368 InternetReadFile 813->817 821 2b9736a-2b97371 817->821 822 2b97373-2b9737a InternetCloseHandle 817->822 821->817 822->812 827 2b97469-2b97484 call 2ba233c 824->827 828 2b97415-2b97427 call 2ba233c 824->828 833 2b9748a-2b9748c 827->833 834 2b9773e-2b97750 call 2ba233c 827->834 828->827 835 2b97429-2b9743b call 2ba233c 828->835 833->834 836 2b97492-2b97544 call 2ba2fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba4af0 * 5 call 2b9439c * 2 833->836 843 2b97799-2b977ab call 2ba233c 834->843 844 2b97752-2b97754 834->844 835->827 845 2b9743d-2b9744f call 2ba233c 835->845 900 2b97581 836->900 901 2b97546-2b97548 836->901 854 2b977ad-2b977c7 call 2b961f1 call 2b962ff call 2b9640a 843->854 855 2b977cc-2b977de call 2ba233c 843->855 844->843 847 2b97756-2b97794 call 2ba4af0 RtlEnterCriticalSection RtlLeaveCriticalSection 844->847 845->827 856 2b97451-2b97463 call 2ba233c 845->856 847->786 854->786 868 2b97afc-2b97b0e call 2ba233c 855->868 869 2b977e4-2b977e6 855->869 856->786 856->827 868->786 881 2b97b14-2b97b42 call 2ba2fac call 2ba4af0 call 2b9439c 868->881 869->868 874 2b977ec-2b97803 call 2b9439c 869->874 874->786 885 2b97809-2b978d7 call 2ba2418 call 2b91ba7 874->885 908 2b97b4b-2b97b52 call 2ba2f74 881->908 909 2b97b44-2b97b46 call 2b9534d 881->909 898 2b978d9 call 2b9143f 885->898 899 2b978de-2b978ff RtlEnterCriticalSection 885->899 898->899 905 2b9790b-2b9796f RtlLeaveCriticalSection call 2b93c67 call 2b93d7e call 2b9833b 899->905 906 2b97901-2b97908 899->906 903 2b97585-2b975b3 call 2ba2fac call 2ba4af0 call 2b9439c 900->903 901->900 907 2b9754a-2b9755c call 2ba233c 901->907 930 2b975b5-2b975c4 call 2ba35e6 903->930 931 2b975f4-2b975fd call 2ba2f74 903->931 932 2b97ae3-2b97af7 call 2b99003 905->932 933 2b97975-2b979bd call 2b9a725 905->933 906->905 907->900 921 2b9755e-2b9757f call 2b9439c 907->921 908->786 909->908 921->903 930->931 946 2b975c6 930->946 944 2b97603-2b9761b call 2ba3b4c 931->944 945 2b97734-2b97737 931->945 932->786 942 2b97aad-2b97ade call 2b983ea call 2b933b2 933->942 943 2b979c3-2b979ca 933->943 942->932 947 2b979cd-2b979d2 943->947 957 2b9761d-2b97625 call 2b99737 944->957 958 2b97627 944->958 945->834 949 2b975cb-2b975dd call 2ba2850 946->949 947->947 952 2b979d4-2b97a1f call 2b9a725 947->952 963 2b975df 949->963 964 2b975e2-2b975f2 call 2ba35e6 949->964 952->942 966 2b97a25-2b97a2b 952->966 962 2b97629-2b976e1 call 2b9a84f call 2b93863 call 2b95119 call 2b93863 call 2b9aaf5 call 2b9ac0f 957->962 958->962 988 2b976e8-2b97713 Sleep call 2ba18f0 962->988 989 2b976e3 call 2b9380b 962->989 963->964 964->931 964->949 970 2b97a2e-2b97a33 966->970 970->970 972 2b97a35-2b97a70 call 2b9a725 970->972 972->942 979 2b97a72-2b97aac call 2b9d117 972->979 979->942 993 2b9771f-2b9772d 988->993 994 2b97715-2b9771e call 2b94100 988->994 989->988 993->945 995 2b9772f call 2b9380b 993->995 994->993 995->945
                                                    Strings
                                                    • strcat, xrefs: 02B964D8
                                                    • cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d, xrefs: 02B9666B
                                                    • ntdll.dll, xrefs: 02B964DD
                                                    • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 02B96735
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$strcat
                                                    • API String ID: 0-3302467957
                                                    • Opcode ID: fa94fa312bf7c397ebcd81ed46ef49e9faec9d3a478f2403d1169f6351168aa6
                                                    • Instruction ID: 405b9ab4fa60cccdde1b6767fa8af256059f3bd74fceeca94021caf6b16eeea8
                                                    • Opcode Fuzzy Hash: fa94fa312bf7c397ebcd81ed46ef49e9faec9d3a478f2403d1169f6351168aa6
                                                    • Instruction Fuzzy Hash: 1581E371D483409FE711AF74EC49B5BBBE8AF89350F1008AEF98597291DBB58801CF96

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02B91D11
                                                    • GetLastError.KERNEL32 ref: 02B91D23
                                                      • Part of subcall function 02B91712: __EH_prolog.LIBCMT ref: 02B91717
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02B91D59
                                                    • GetLastError.KERNEL32 ref: 02B91D6B
                                                    • __beginthreadex.LIBCMT ref: 02B91DB1
                                                    • GetLastError.KERNEL32 ref: 02B91DC6
                                                    • CloseHandle.KERNEL32(00000000), ref: 02B91DDD
                                                    • CloseHandle.KERNEL32(00000000), ref: 02B91DEC
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02B91E14
                                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 02B91E1B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseErrorLast$CreateEventHandle$ChangeFindH_prologNotificationObjectSingleWait__beginthreadex
                                                    • String ID: thread$thread.entry_event$thread.exit_event
                                                    • API String ID: 4246062733-3017686385
                                                    • Opcode ID: 433e57d7cfe1821a443a03df1be20a7677e6724689ad22680b8801bfb06b7a0e
                                                    • Instruction ID: d68a765592a370d816655da986a6e246fd4c8115e0408253169f23ca75a33e23
                                                    • Opcode Fuzzy Hash: 433e57d7cfe1821a443a03df1be20a7677e6724689ad22680b8801bfb06b7a0e
                                                    • Instruction Fuzzy Hash: 003193719043019FDB01EF28C848B2BBBE5EF84754F1049AEF95997290DBB09849DF92

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1028 2b94d86-2b94dcb call 2bb53f0 call 2ba0b10 RtlEnterCriticalSection RtlLeaveCriticalSection 1033 2b94dd1 1028->1033 1034 2b950d4-2b950dd 1028->1034 1037 2b94dd6-2b94df6 call 2b93863 call 2b94bed 1033->1037 1035 2b950df call 2b9380b 1034->1035 1036 2b950e4-2b950f4 1034->1036 1035->1036 1042 2b94dfb-2b94e00 1037->1042 1043 2b950a1-2b950ad RtlEnterCriticalSection RtlLeaveCriticalSection 1042->1043 1044 2b94e06-2b94e0b 1042->1044 1045 2b950b3-2b950ce RtlEnterCriticalSection RtlLeaveCriticalSection 1043->1045 1046 2b9506e-2b95070 1044->1046 1047 2b94e11-2b94e3a call 2b9ced9 1044->1047 1045->1034 1045->1037 1046->1043 1049 2b95072-2b9509f call 2b9a725 1046->1049 1047->1043 1053 2b94e40-2b94e5c call 2b97d24 1047->1053 1049->1043 1049->1045 1056 2b94e5e-2b94e87 call 2b9ced9 1053->1056 1057 2b94ec4-2b94ec8 1053->1057 1060 2b94e8d-2b94e99 RtlEnterCriticalSection RtlLeaveCriticalSection 1056->1060 1064 2b94f98-2b94fc1 call 2b9ced9 1056->1064 1059 2b94eca-2b94ef9 call 2b9ced9 1057->1059 1057->1060 1059->1060 1069 2b94efb-2b94f2c call 2b9ced9 1059->1069 1062 2b94e9f-2b94ea6 RtlEnterCriticalSection RtlLeaveCriticalSection 1060->1062 1065 2b94eac-2b94ebf call 2b9898c 1062->1065 1073 2b95064-2b95069 1064->1073 1074 2b94fc7-2b94ff0 call 2b9ced9 1064->1074 1065->1045 1069->1060 1076 2b94f32-2b94f93 call 2b9d00b call 2b9898c call 2b98701 call 2b9898c 1069->1076 1073->1062 1074->1073 1081 2b94ff2-2b95050 call 2b97cfe call 2b9a9b2 call 2b9aa8a call 2b9898c call 2ba18f0 1074->1081 1076->1064 1081->1065 1097 2b95056-2b9505f call 2b94100 1081->1097 1097->1065
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B94D8B
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B94DB7
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B94DC3
                                                      • Part of subcall function 02B94BED: __EH_prolog.LIBCMT ref: 02B94BF2
                                                      • Part of subcall function 02B94BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02B94CF2
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B94E93
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B94E99
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B94EA0
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B94EA6
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B950A7
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B950AD
                                                    • RtlEnterCriticalSection.NTDLL(02BC71E0), ref: 02B950B8
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71E0), ref: 02B950C1
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                    • String ID:
                                                    • API String ID: 2062355503-0
                                                    • Opcode ID: dc76185f76ae7bfb4c337ec68ddffa9894f7506b1435bad2eccc3b2dd54572a1
                                                    • Instruction ID: 2f27752c097c7995ab1702a00dfa1900692138c5359986a8a3a1cd98e043a946
                                                    • Opcode Fuzzy Hash: dc76185f76ae7bfb4c337ec68ddffa9894f7506b1435bad2eccc3b2dd54572a1
                                                    • Instruction Fuzzy Hash: BDB14B71D0025DDFDF25DFA0C854BEEBBB9AF05314F2440AAE40567280DBB45A49CFA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1126 401f64-401f84 FindResourceA 1127 401f86-401f9d GetLastError SizeofResource 1126->1127 1128 401f9f-401fa1 1126->1128 1127->1128 1129 401fa6-401fec LoadResource LockResource GlobalAlloc call 402900 * 2 1127->1129 1130 402096-40209a 1128->1130 1135 401fee-401ff9 1129->1135 1135->1135 1136 401ffb-402003 GetTickCount 1135->1136 1137 402032-402038 1136->1137 1138 402005-402007 1136->1138 1139 402053-402083 GlobalAlloc call 401c26 1137->1139 1140 40203a-40204a 1137->1140 1138->1139 1141 402009-40200f 1138->1141 1148 402088-402093 1139->1148 1143 40204c 1140->1143 1144 40204e-402051 1140->1144 1141->1139 1142 402011-402023 1141->1142 1146 402025 1142->1146 1147 402027-40202a 1142->1147 1143->1144 1144->1139 1144->1140 1146->1147 1147->1142 1149 40202c-40202e 1147->1149 1148->1130 1149->1141 1150 402030 1149->1150 1150->1139
                                                    APIs
                                                    • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                    • GetLastError.KERNEL32 ref: 00401F86
                                                    • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                    • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                    • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                    • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 00401FBF
                                                    • GetTickCount.KERNEL32 ref: 00401FFB
                                                    • GlobalAlloc.KERNELBASE(00000040,?), ref: 00402061
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                    • String ID:
                                                    • API String ID: 564119183-0
                                                    • Opcode ID: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                    • Instruction ID: 5f40b5bb2c798fd06435bc38b1d437300a77b6e6fc54339f6675bf13ecd45336
                                                    • Opcode Fuzzy Hash: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                    • Instruction Fuzzy Hash: 45314E71A00255AFDB105FB59F8896F7F68EF45344F10807AFE86F7281DA748845C7A8

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1151 2b926db-2b92726 RtlEnterCriticalSection 1152 2b92728-2b92736 CreateWaitableTimerA 1151->1152 1153 2b9277e-2b92781 1151->1153 1154 2b92738-2b92756 GetLastError call 2ba0b10 call 2b91712 1152->1154 1155 2b9275b-2b92778 SetWaitableTimer 1152->1155 1156 2b92783-2b92798 call 2ba3b4c 1153->1156 1157 2b927d5-2b927f0 RtlLeaveCriticalSection 1153->1157 1154->1155 1155->1153 1162 2b927ca 1156->1162 1163 2b9279a-2b927ac call 2ba3b4c 1156->1163 1166 2b927cc-2b927d0 call 2b97e03 1162->1166 1169 2b927b9 1163->1169 1170 2b927ae-2b927b7 1163->1170 1166->1157 1171 2b927bb-2b927c3 call 2b91cf8 1169->1171 1170->1171 1173 2b927c8 1171->1173 1173->1166
                                                    APIs
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B92706
                                                    • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02B9272B
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02BB5B53), ref: 02B92738
                                                      • Part of subcall function 02B91712: __EH_prolog.LIBCMT ref: 02B91717
                                                    • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02B92778
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B927D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                    • String ID: timer
                                                    • API String ID: 4293676635-1792073242
                                                    • Opcode ID: 36e5b42647210a5b49ac5a5894e704129796ea4761ba6e97c42e9c75515d00eb
                                                    • Instruction ID: 7333fda3b4658c63aaaf2a1f2f6d402d9db9bfcd1a60bbe97d0bee9f23e7bb4b
                                                    • Opcode Fuzzy Hash: 36e5b42647210a5b49ac5a5894e704129796ea4761ba6e97c42e9c75515d00eb
                                                    • Instruction Fuzzy Hash: DD31C0B2908705AFD711DF25C944B66FBE8FB48B64F004AAEF85593680DB74E800CFA5

                                                    Control-flow Graph

                                                    APIs
                                                    • GetVersion.KERNEL32 ref: 00402ED6
                                                      • Part of subcall function 00403FF4: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F0F,00000000), ref: 00404005
                                                      • Part of subcall function 00403FF4: HeapDestroy.KERNEL32 ref: 00404044
                                                    • GetCommandLineA.KERNEL32 ref: 00402F24
                                                    • GetStartupInfoA.KERNEL32(?), ref: 00402F4F
                                                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402F72
                                                      • Part of subcall function 00402FCB: ExitProcess.KERNEL32 ref: 00402FE8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                    • String ID: x5q$Y
                                                    • API String ID: 2057626494-2261486077
                                                    • Opcode ID: bde1f74d60b81ae7252d13bfcbc661632079e5aa7379041ec1857b7291440294
                                                    • Instruction ID: ae24bdd31f92ba5c0019e7eb98566f973638ce5b9b082510a96f2684413349a7
                                                    • Opcode Fuzzy Hash: bde1f74d60b81ae7252d13bfcbc661632079e5aa7379041ec1857b7291440294
                                                    • Instruction Fuzzy Hash: 3721A1B1840615ABDB14AFA6DE4AA6E7FB8EF44705F10413FF501B72D1DB384500CB58

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1230 2b92b95-2b92baf 1231 2b92bb1-2b92bb9 call 2ba0b10 1230->1231 1232 2b92bc7-2b92bcb 1230->1232 1241 2b92bbf-2b92bc2 1231->1241 1234 2b92bcd-2b92bd0 1232->1234 1235 2b92bdf 1232->1235 1234->1235 1238 2b92bd2-2b92bdd call 2ba0b10 1234->1238 1236 2b92be2-2b92c11 WSASetLastError WSARecv call 2b9a509 1235->1236 1243 2b92c16-2b92c1d 1236->1243 1238->1241 1244 2b92d30 1241->1244 1246 2b92c2c-2b92c32 1243->1246 1247 2b92c1f-2b92c2a call 2ba0b10 1243->1247 1245 2b92d32-2b92d38 1244->1245 1249 2b92c34-2b92c39 call 2ba0b10 1246->1249 1250 2b92c46-2b92c48 1246->1250 1257 2b92c3f-2b92c42 1247->1257 1249->1257 1253 2b92c4a-2b92c4d 1250->1253 1254 2b92c4f-2b92c60 call 2ba0b10 1250->1254 1255 2b92c66-2b92c69 1253->1255 1254->1245 1254->1255 1260 2b92c6b-2b92c6d 1255->1260 1261 2b92c73-2b92c76 1255->1261 1257->1250 1260->1261 1262 2b92d22-2b92d2d call 2b91996 1260->1262 1261->1244 1263 2b92c7c-2b92c9a call 2ba0b10 call 2b9166f 1261->1263 1262->1244 1270 2b92cbc-2b92cfa WSASetLastError select call 2b9a509 1263->1270 1271 2b92c9c-2b92cba call 2ba0b10 call 2b9166f 1263->1271 1276 2b92d08 1270->1276 1277 2b92cfc-2b92d06 call 2ba0b10 1270->1277 1271->1244 1271->1270 1280 2b92d0a-2b92d12 call 2ba0b10 1276->1280 1281 2b92d15-2b92d17 1276->1281 1285 2b92d19-2b92d1d 1277->1285 1280->1281 1281->1244 1281->1285 1285->1236
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B92BE4
                                                    • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02B92C07
                                                      • Part of subcall function 02B9A509: WSAGetLastError.WS2_32(00000000,?,?,02B92A51), ref: 02B9A517
                                                    • WSASetLastError.WS2_32 ref: 02B92CD3
                                                    • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02B92CE7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Recvselect
                                                    • String ID: 3'
                                                    • API String ID: 886190287-280543908
                                                    • Opcode ID: 4ef6e797fb6780c9e60ceda54255f62003ac511960780e2a73cbd6ee257dbac5
                                                    • Instruction ID: 14d62a50921a149512eb58ab3c3d12cfed1268c55d7a9b30e93af7a0cf170f6f
                                                    • Opcode Fuzzy Hash: 4ef6e797fb6780c9e60ceda54255f62003ac511960780e2a73cbd6ee257dbac5
                                                    • Instruction Fuzzy Hash: 0E4160B1D19305AFDB10AF78C51476BBBE9EF85358F104DAEE89987280EBB0D540CB91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1338 2b929ee-2b92a06 1339 2b92a0c-2b92a10 1338->1339 1340 2b92ab3-2b92abb call 2ba0b10 1338->1340 1341 2b92a39-2b92a4c WSASetLastError closesocket call 2b9a509 1339->1341 1342 2b92a12-2b92a15 1339->1342 1349 2b92abe-2b92ac6 1340->1349 1348 2b92a51-2b92a55 1341->1348 1342->1341 1344 2b92a17-2b92a36 call 2ba0b10 call 2b92f50 1342->1344 1344->1341 1348->1340 1350 2b92a57-2b92a5f call 2ba0b10 1348->1350 1356 2b92a69-2b92a71 call 2ba0b10 1350->1356 1357 2b92a61-2b92a67 1350->1357 1362 2b92aaf-2b92ab1 1356->1362 1363 2b92a73-2b92a79 1356->1363 1357->1356 1358 2b92a7b-2b92aad ioctlsocket WSASetLastError closesocket call 2b9a509 1357->1358 1358->1362 1362->1340 1362->1349 1363->1358 1363->1362
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B92A3B
                                                    • closesocket.WS2_32 ref: 02B92A42
                                                    • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02B92A89
                                                    • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02B92A97
                                                    • closesocket.WS2_32 ref: 02B92A9E
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastclosesocket$ioctlsocket
                                                    • String ID:
                                                    • API String ID: 1561005644-0
                                                    • Opcode ID: 3f87e3adeac10c8228ae2076dc89360fc263f31bedcafb71fb31cbd5b516e002
                                                    • Instruction ID: 06073db3fab7f06959d59ada9348c592d2bd0c7ec908ef6409b6974ba5e93210
                                                    • Opcode Fuzzy Hash: 3f87e3adeac10c8228ae2076dc89360fc263f31bedcafb71fb31cbd5b516e002
                                                    • Instruction Fuzzy Hash: 5521F877E00205BBEF21ABB8994476AB7E9EF84315F1549FAE855D3241FBB0C9408B60
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B91BAC
                                                    • RtlEnterCriticalSection.NTDLL ref: 02B91BBC
                                                    • RtlLeaveCriticalSection.NTDLL ref: 02B91BEA
                                                    • RtlEnterCriticalSection.NTDLL ref: 02B91C13
                                                    • RtlLeaveCriticalSection.NTDLL ref: 02B91C56
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$H_prolog
                                                    • String ID:
                                                    • API String ID: 1633115879-0
                                                    • Opcode ID: dfe065bc415911815bede69701bb7da3d52bf065da65aa47b947ac07dad6794e
                                                    • Instruction ID: 2bb00d7de12c33ac7af07997913efce2739c8f59466aa69545d76a9541b40704
                                                    • Opcode Fuzzy Hash: dfe065bc415911815bede69701bb7da3d52bf065da65aa47b947ac07dad6794e
                                                    • Instruction Fuzzy Hash: 7521AD759002059FCF15CF68C4447AABBB5FF88310F10859AE8199B301DBB0E901DBE0
                                                    APIs
                                                    • RegCloseKey.KERNELBASE(?), ref: 004028AC
                                                    • RegQueryValueExA.KERNELBASE(?,Common AppData), ref: 0040D618
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: CloseQueryValue
                                                    • String ID: Common AppData$Core Package LingX 8.26.45
                                                    • API String ID: 3356406503-2443942564
                                                    • Opcode ID: 3df20fb7b08d5283bd5f5937e97b3fce184a3cbf959f4e54b265443854f8f00e
                                                    • Instruction ID: 700d5a9c005bd9ff16b1466f4f65b392e02bc6ec3917c2f43e26e2c90d1f890a
                                                    • Opcode Fuzzy Hash: 3df20fb7b08d5283bd5f5937e97b3fce184a3cbf959f4e54b265443854f8f00e
                                                    • Instruction Fuzzy Hash: 5EE01235D05106FBCB052FA04E1DA7E7670AE48740325493BE912B21D1CBFC854ABA5F
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B92EEE
                                                    • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02B92EFD
                                                    • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02B92F0C
                                                    • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02B92F36
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Socketsetsockopt
                                                    • String ID:
                                                    • API String ID: 2093263913-0
                                                    • Opcode ID: 071f6529057844d822daed5c072bb544aa36c4d14b633df5043cc6b95bce918b
                                                    • Instruction ID: 2ffe878cbccab2b82726a95f76b542f656e7ad7e42b0a9d6f1b8919f10d25a13
                                                    • Opcode Fuzzy Hash: 071f6529057844d822daed5c072bb544aa36c4d14b633df5043cc6b95bce918b
                                                    • Instruction Fuzzy Hash: EC014D72E51204BBDB215F65DC48F5ABBA9EBC5761F008965F918D7181D7B089009B70
                                                    APIs
                                                      • Part of subcall function 02B92D39: WSASetLastError.WS2_32(00000000), ref: 02B92D47
                                                      • Part of subcall function 02B92D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02B92D5C
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B92E6D
                                                    • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02B92E83
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Sendselect
                                                    • String ID: 3'
                                                    • API String ID: 2958345159-280543908
                                                    • Opcode ID: 2822d8c77038d3d9246fd0d4eeb3865d6a3f574cdece730f42a840d17041c7e3
                                                    • Instruction ID: 65555f84d422da96de8f92e80be1efa01642bca5c608be7b567bc50d1c93acae
                                                    • Opcode Fuzzy Hash: 2822d8c77038d3d9246fd0d4eeb3865d6a3f574cdece730f42a840d17041c7e3
                                                    • Instruction Fuzzy Hash: 9431A371E11209AFDF10EF68D8547EE7BAAEF45358F0049EAEC0497240EBB59554CFA0
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B92AEA
                                                    • connect.WS2_32(?,?,?), ref: 02B92AF5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastconnect
                                                    • String ID: 3'
                                                    • API String ID: 374722065-280543908
                                                    • Opcode ID: cc5b07b49eaee0de0f2af666ca13de1c067bcde53ffa3fc5e20cb3156297c7c2
                                                    • Instruction ID: f94859779289ad0ec3bdcec0aaa7e1c06d57629a7457147792c155433fd6e1db
                                                    • Opcode Fuzzy Hash: cc5b07b49eaee0de0f2af666ca13de1c067bcde53ffa3fc5e20cb3156297c7c2
                                                    • Instruction Fuzzy Hash: 7421A771E14208ABDF14AFB4D5147AEBBFAEF45324F0089EADD1893280EBB446019F91
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: 3b527e9348f07417b415c3fbd6d1ca7f29d4ae0ef9a129d5cc1a7c107c892d21
                                                    • Instruction ID: 5bc7fe4a79f917cc43bcf86045cbeee1bd9b932325a2264f26c2d71bcda68624
                                                    • Opcode Fuzzy Hash: 3b527e9348f07417b415c3fbd6d1ca7f29d4ae0ef9a129d5cc1a7c107c892d21
                                                    • Instruction Fuzzy Hash: A35119B190920ADFCF15DF68C5507AABBE1FF08320F1485AAE8299B381D7749911CFA1
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(?), ref: 02B936A7
                                                      • Part of subcall function 02B92420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02B92432
                                                      • Part of subcall function 02B92420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02B92445
                                                      • Part of subcall function 02B92420: RtlEnterCriticalSection.NTDLL(?), ref: 02B92454
                                                      • Part of subcall function 02B92420: InterlockedExchange.KERNEL32(?,00000001), ref: 02B92469
                                                      • Part of subcall function 02B92420: RtlLeaveCriticalSection.NTDLL(?), ref: 02B92470
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 1601054111-0
                                                    • Opcode ID: f5db7fff1f59ac6fdb5fa5220579f2e8b77bd532182899a30542385dc4e774fe
                                                    • Instruction ID: 8bcd130965a077c49fb01c24808e9fddfd5bcac9e3de63b8c7349f5765219739
                                                    • Opcode Fuzzy Hash: f5db7fff1f59ac6fdb5fa5220579f2e8b77bd532182899a30542385dc4e774fe
                                                    • Instruction Fuzzy Hash: DA1127B6504208ABDF218F14CC85FAA3BAAEF40354F0044A6FE12C72D0CB79D860CB94
                                                    APIs
                                                    • __beginthreadex.LIBCMT ref: 02BA2106
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02B9A989,00000000), ref: 02BA2137
                                                    • ResumeThread.KERNELBASE(?,?,?,?,?,00000002,02B9A989,00000000), ref: 02BA2145
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandleResumeThread__beginthreadex
                                                    • String ID:
                                                    • API String ID: 1685284544-0
                                                    • Opcode ID: fe3ad192025aefd514337c40871bf117d60ad21e0ff9747fadb6fc21e85b3443
                                                    • Instruction ID: d9c4c095fe42fd162df81c3092360251e008321da603bee378dd63b5675d1b15
                                                    • Opcode Fuzzy Hash: fe3ad192025aefd514337c40871bf117d60ad21e0ff9747fadb6fc21e85b3443
                                                    • Instruction Fuzzy Hash: F4F0C271240200ABE7209E58DC90F95B3E8EF88324F2409AAFA54C7280C7B1E8929B90
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(02BC72B4), ref: 02B91ABA
                                                    • WSAStartup.WS2_32(00000002,00000000), ref: 02B91ACB
                                                    • InterlockedExchange.KERNEL32(02BC72B8,00000000), ref: 02B91AD7
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$ExchangeIncrementStartup
                                                    • String ID:
                                                    • API String ID: 1856147945-0
                                                    • Opcode ID: 69911645781dbdfea997ebf9e6389c00f0da6b3ecf69b6e64ea16a685e86fd53
                                                    • Instruction ID: ae93e43928f6971978bb1c05f513f15dabedeb7a60137d9e2e2c99d71edc30c3
                                                    • Opcode Fuzzy Hash: 69911645781dbdfea997ebf9e6389c00f0da6b3ecf69b6e64ea16a685e86fd53
                                                    • Instruction Fuzzy Hash: 23D05E329902145BE21166A8AC0EB78F72CE746651F50069AFCBAC20C4EE905920B9B6
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002BCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BCA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2bca000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID: "=*
                                                    • API String ID: 823142352-1759086793
                                                    • Opcode ID: c29926b207b8526e12735ec8af17eb78195e2f54529aaa027aaea9e15e09eab9
                                                    • Instruction ID: f67485a595e23a90828adb8c4c06f75b6ad93436a1ec773961043a4f1a1dd147
                                                    • Opcode Fuzzy Hash: c29926b207b8526e12735ec8af17eb78195e2f54529aaa027aaea9e15e09eab9
                                                    • Instruction Fuzzy Hash: D3519FF291C2249BD7157F19DC857BAFBE8EB18720F0A092DEAC693340E67558448BC7
                                                    APIs
                                                    • RegCreateKeyExA.KERNELBASE(80000002,Software\Ringtone), ref: 0040D86F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID: Software\Ringtone
                                                    • API String ID: 2289755597-4108946767
                                                    • Opcode ID: e4b156771ac2856f6c6c55eb691f7dfd316dc04736aec46a500a269259d45773
                                                    • Instruction ID: 66571da2c184a8e169dd4eab7617e653d561bd215170ef06ceeac5bb6a740f46
                                                    • Opcode Fuzzy Hash: e4b156771ac2856f6c6c55eb691f7dfd316dc04736aec46a500a269259d45773
                                                    • Instruction Fuzzy Hash: 93B09B7170C101F9E15035E15F4DB21104C4F14744B30857F5B17710C5867C854A641F
                                                    APIs
                                                    • RegCloseKey.KERNELBASE(?), ref: 004028AC
                                                    Strings
                                                    • Core Package LingX 8.26.45, xrefs: 0040DB34
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID: Core Package LingX 8.26.45
                                                    • API String ID: 3535843008-1427271408
                                                    • Opcode ID: ac76ebdeda4b429bac3e38bf2a17554ada4f4a39090a9e170940c40dc37e0470
                                                    • Instruction ID: 7c9c64cc1711a762914e6c0c23d42ad20e908327665990b8735fc52c3c6f58aa
                                                    • Opcode Fuzzy Hash: ac76ebdeda4b429bac3e38bf2a17554ada4f4a39090a9e170940c40dc37e0470
                                                    • Instruction Fuzzy Hash: DCC04C36D4500AF7C6452B914F1997975316D083053314137E512720E18AFC5806669F
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B94BF2
                                                      • Part of subcall function 02B91BA7: __EH_prolog.LIBCMT ref: 02B91BAC
                                                      • Part of subcall function 02B91BA7: RtlEnterCriticalSection.NTDLL ref: 02B91BBC
                                                      • Part of subcall function 02B91BA7: RtlLeaveCriticalSection.NTDLL ref: 02B91BEA
                                                      • Part of subcall function 02B91BA7: RtlEnterCriticalSection.NTDLL ref: 02B91C13
                                                      • Part of subcall function 02B91BA7: RtlLeaveCriticalSection.NTDLL ref: 02B91C56
                                                      • Part of subcall function 02B9E0F8: __EH_prolog.LIBCMT ref: 02B9E0FD
                                                      • Part of subcall function 02B9E0F8: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B9E17C
                                                    • InterlockedExchange.KERNEL32(?,00000000), ref: 02B94CF2
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                    • String ID:
                                                    • API String ID: 1927618982-0
                                                    • Opcode ID: c29f61d32d7b375c1640b3d63b015210d2f7f965c20b56bd4ed9d6b7eded4b27
                                                    • Instruction ID: e849528509d66a99ee5477ccc85d57fbc38382ac9dfbe1ef2035f37ffedbf822
                                                    • Opcode Fuzzy Hash: c29f61d32d7b375c1640b3d63b015210d2f7f965c20b56bd4ed9d6b7eded4b27
                                                    • Instruction Fuzzy Hash: 26512875D04248DFDF15DFA8C884AEEBBB5EF09314F1481AAE905AB352DB709A44CF50
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B92D47
                                                    • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02B92D5C
                                                      • Part of subcall function 02B9A509: WSAGetLastError.WS2_32(00000000,?,?,02B92A51), ref: 02B9A517
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Send
                                                    • String ID:
                                                    • API String ID: 1282938840-0
                                                    • Opcode ID: 97c4e3f90ab2624b3cddaa43587952924a45495ed25158c91333c457452f1d41
                                                    • Instruction ID: 0ae128dae1e0dc268066c4599bdfcb46b6a2053a49743238037ea0bcdc6e2392
                                                    • Opcode Fuzzy Hash: 97c4e3f90ab2624b3cddaa43587952924a45495ed25158c91333c457452f1d41
                                                    • Instruction Fuzzy Hash: 2A0175B5905209BFDB206F98895496BBAEDEF453A4B1009BFE85993240EB709D008BA1
                                                    APIs
                                                    • GetLastError.KERNEL32 ref: 00402286
                                                    • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 0040D48F
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastLibraryLoad
                                                    • String ID:
                                                    • API String ID: 3568775529-0
                                                    • Opcode ID: 4c1d93845981bc85e82135689604909a8a6306796c9c0b5c58b07fc6123ab272
                                                    • Instruction ID: 0b5b441379f5c271ce53769546f2fde158ac2fe969151677cfa4c3bb1122c20d
                                                    • Opcode Fuzzy Hash: 4c1d93845981bc85e82135689604909a8a6306796c9c0b5c58b07fc6123ab272
                                                    • Instruction Fuzzy Hash: E1011234900205DFDB00DFA4C9C476A7BA0BF04744F6041B7ED16AB2D5D778D94A9B6A
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B98407
                                                    • shutdown.WS2_32(?,00000002), ref: 02B98410
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastshutdown
                                                    • String ID:
                                                    • API String ID: 1920494066-0
                                                    • Opcode ID: 501de28a8898a35ef9d8d7a3559a6c9964303fc10e2a96e31eadf96db401b630
                                                    • Instruction ID: 9e82d92baf28444e97c5ce99b2bcf7054bf0afbb4aebc191ae4c0e50ed2689c6
                                                    • Opcode Fuzzy Hash: 501de28a8898a35ef9d8d7a3559a6c9964303fc10e2a96e31eadf96db401b630
                                                    • Instruction Fuzzy Hash: B3F0B472A44314CFCB10AF14D510B5AB7E5FF0A360F0548ADE99997380DB70AC00CBA1
                                                    APIs
                                                    • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F0F,00000000), ref: 00404005
                                                      • Part of subcall function 00403EAC: GetVersionExA.KERNEL32 ref: 00403ECB
                                                    • HeapDestroy.KERNEL32 ref: 00404044
                                                      • Part of subcall function 004043CB: HeapAlloc.KERNEL32(00000000,00000140,0040402D,000003F8), ref: 004043D8
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocCreateDestroyVersion
                                                    • String ID:
                                                    • API String ID: 2507506473-0
                                                    • Opcode ID: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                    • Instruction ID: b1684c5e0161eeb02f30399066ba6d75b4260e35b9d13e26dc8fbe5d47634710
                                                    • Opcode Fuzzy Hash: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                    • Instruction Fuzzy Hash: F5F092F0656301DAEB301B75AE46B3A39949BC0796F20443BF740F91E1EF7C8481960D
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: lstrcmpi
                                                    • String ID:
                                                    • API String ID: 1586166983-0
                                                    • Opcode ID: 18122f02f9ba4ec302898a93ea149c91f443b641b003bb94d8bf929a0ff9d14d
                                                    • Instruction ID: 792b8944447c65b19763bc3581ab56855d535a6b909d3b7135adcf79fa576b05
                                                    • Opcode Fuzzy Hash: 18122f02f9ba4ec302898a93ea149c91f443b641b003bb94d8bf929a0ff9d14d
                                                    • Instruction Fuzzy Hash: 54E04871E0D515EAE7002FB19E451697654BE04354720843FE447F22D0D77C450D5A6E
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9511E
                                                      • Part of subcall function 02B93D7E: htons.WS2_32(?), ref: 02B93DA2
                                                      • Part of subcall function 02B93D7E: htonl.WS2_32(00000000), ref: 02B93DB9
                                                      • Part of subcall function 02B93D7E: htonl.WS2_32(00000000), ref: 02B93DC0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: htonl$H_prologhtons
                                                    • String ID:
                                                    • API String ID: 4039807196-0
                                                    • Opcode ID: f23dac2bdb9a308b40c3da82981c2991a793fe8ab692af12f015ec87cdd768fd
                                                    • Instruction ID: 35caf7679c57a5b50221dca6c00e93fb5cd12d4101dffd5bfaa3dac3c63a4392
                                                    • Opcode Fuzzy Hash: f23dac2bdb9a308b40c3da82981c2991a793fe8ab692af12f015ec87cdd768fd
                                                    • Instruction Fuzzy Hash: 1B8148B1D0424E8ECF16DFA8D490AEEBBB5EF48314F1081AAD851B7240EB765A45CF64
                                                    APIs
                                                    • CreateFileA.KERNELBASE(?), ref: 02C2FB59
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002BCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BCA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2bca000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 5f96ed471226d75c5669683a3b25c0ba62afcc8619ef449c36163e9d154b7d1a
                                                    • Instruction ID: 402da1ffea7efc6ab4ebf22b4dd2d9112190c746f39137a59e92e93f63b334c5
                                                    • Opcode Fuzzy Hash: 5f96ed471226d75c5669683a3b25c0ba62afcc8619ef449c36163e9d154b7d1a
                                                    • Instruction Fuzzy Hash: 885149B3509618AFD7126E2DEC857BEBBD8EF14324F0A452DE68583751EA314805C6C3
                                                    APIs
                                                    • CreateFileA.KERNELBASE(?), ref: 02C2FB59
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002BCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BCA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2bca000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 9ef951550febd4f976a6fe076786ad24eca52d73254b1834861f9c853b41c9d8
                                                    • Instruction ID: ac59047939e68dcdd88f3a5b43d82e0ec42b53f3146ff393d4c9f044959ec22e
                                                    • Opcode Fuzzy Hash: 9ef951550febd4f976a6fe076786ad24eca52d73254b1834861f9c853b41c9d8
                                                    • Instruction Fuzzy Hash: 34517CB250C708AFE7157F19EC85BBEFBE8EF18724F06092DE6C542750E63258108A87
                                                    APIs
                                                    • CreateFileA.KERNELBASE(?), ref: 02C2FB59
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002BCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BCA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2bca000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 8e37f914ac9e422abfb9bea6db0529326e1a7d5e379e66d4bf3d39f7f367c5cb
                                                    • Instruction ID: 9435c1c1be1a976efb86a3b7240ea0e5fc1a458c47553d04777dcb7626e6f692
                                                    • Opcode Fuzzy Hash: 8e37f914ac9e422abfb9bea6db0529326e1a7d5e379e66d4bf3d39f7f367c5cb
                                                    • Instruction Fuzzy Hash: F94171B250C718AFE7153F19EC85BBEFBE8EB04724F05093DE6C582750E63658508697
                                                    APIs
                                                    • FindCloseChangeNotification.KERNELBASE ref: 02C109CD
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002BCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BCA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2bca000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: ChangeCloseFindNotification
                                                    • String ID:
                                                    • API String ID: 2591292051-0
                                                    • Opcode ID: 2ff420568710525febce118960f3d2fd7a3a725e9c1f5ea7b71fdf3a25347e2e
                                                    • Instruction ID: b0a01e65c2dabd1cecf2bb310a9438cb554a5e89ed6d03f9f2ac6cfb8c629bdb
                                                    • Opcode Fuzzy Hash: 2ff420568710525febce118960f3d2fd7a3a725e9c1f5ea7b71fdf3a25347e2e
                                                    • Instruction Fuzzy Hash: D83109F261C6009FE319AF19DC9277AFBE8EF58310F55482DE6C9C3340E63558508A97
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9E9C6
                                                      • Part of subcall function 02B91A01: TlsGetValue.KERNEL32 ref: 02B91A0A
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prologValue
                                                    • String ID:
                                                    • API String ID: 3700342317-0
                                                    • Opcode ID: 1e4074f36591cb9431275ee54c7d23d6ad2e0943d465e9374a10ae3073cdedeb
                                                    • Instruction ID: 4715fdda2d786c7065ab39a829d1fbbb7ed2f7d4ecf3bf57f05d01fd7bd140fb
                                                    • Opcode Fuzzy Hash: 1e4074f36591cb9431275ee54c7d23d6ad2e0943d465e9374a10ae3073cdedeb
                                                    • Instruction Fuzzy Hash: A9211BB2904209AFDF04DFA8D940AEEBBF9FF49310F14416AE915A7241D771A900CBA5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002BCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BCA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2bca000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Query_
                                                    • String ID:
                                                    • API String ID: 428220571-0
                                                    • Opcode ID: 2c1048d91fc71a719d28f120672935c6a12da10e272ed58f55cb0992c4007ab1
                                                    • Instruction ID: 5faa5d210e500ae3b584d35bf93a9ddeb001ce7bcf76d1bf48dce1235308acd4
                                                    • Opcode Fuzzy Hash: 2c1048d91fc71a719d28f120672935c6a12da10e272ed58f55cb0992c4007ab1
                                                    • Instruction Fuzzy Hash: C71138B391C110EFD701AF29DC56379B7E5EF50254F2A893CD9C697308EA7168148AC7
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002BCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BCA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2bca000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Query_
                                                    • String ID:
                                                    • API String ID: 428220571-0
                                                    • Opcode ID: f6c88c599ec52c747129a44bbb5af955cceb12e80df0329cfe3f258c7cbbc3a2
                                                    • Instruction ID: ba7f2e3ea27e342a6c6095a9fd466e41eb3cf5a26b54a8dcda8aa509a9500480
                                                    • Opcode Fuzzy Hash: f6c88c599ec52c747129a44bbb5af955cceb12e80df0329cfe3f258c7cbbc3a2
                                                    • Instruction Fuzzy Hash: B911C1F38182109FD705AF29DC49279BBE5EF54210F1A453CDAC587348EA355854CA87
                                                    APIs
                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02B933CC
                                                      • Part of subcall function 02B932AB: __EH_prolog.LIBCMT ref: 02B932B0
                                                      • Part of subcall function 02B932AB: RtlEnterCriticalSection.NTDLL(?), ref: 02B932C3
                                                      • Part of subcall function 02B932AB: RtlLeaveCriticalSection.NTDLL(?), ref: 02B932EF
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                    • String ID:
                                                    • API String ID: 1518410164-0
                                                    • Opcode ID: b6ee4f7dbb4fd9aec3420fcc92912212d54a18043fb99f3fda5d2721ed2cb9eb
                                                    • Instruction ID: f8dc645766683a64659094d2b0eeafd705c8e72eeb113aaa0dec4b6dacb6d22c
                                                    • Opcode Fuzzy Hash: b6ee4f7dbb4fd9aec3420fcc92912212d54a18043fb99f3fda5d2721ed2cb9eb
                                                    • Instruction Fuzzy Hash: A7015671614606AFDB04DF59DC85F55FBA9FF45320B1483AAE928C72C0EB70E811CBA4
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9E556
                                                      • Part of subcall function 02B926DB: RtlEnterCriticalSection.NTDLL(?), ref: 02B92706
                                                      • Part of subcall function 02B926DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02B9272B
                                                      • Part of subcall function 02B926DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02BB5B53), ref: 02B92738
                                                      • Part of subcall function 02B926DB: SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02B92778
                                                      • Part of subcall function 02B926DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02B927D9
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                    • String ID:
                                                    • API String ID: 4293676635-0
                                                    • Opcode ID: 21e6b1eb3c1d645c10f4cc6b589be0249bdb29c42d86868a59f2fc386063de5a
                                                    • Instruction ID: f1eca3afe9de181872151b9cc5705dee8afae3e9c055a8bd5e12b7b215faf770
                                                    • Opcode Fuzzy Hash: 21e6b1eb3c1d645c10f4cc6b589be0249bdb29c42d86868a59f2fc386063de5a
                                                    • Instruction Fuzzy Hash: 3201CEB1900B059FC719CF1AC640996FBE4EF88700B15C5AE944A8B721E7B4AA40CF90
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID:
                                                    • API String ID: 3535843008-0
                                                    • Opcode ID: 8fbe9a56c6b541ebf54ecf0c96ae19b87a728b3c5aeb92de0eea78cee808be53
                                                    • Instruction ID: 175efd24f3e881721e8e34747c771ca6c4a0819e4ac99abbf478970e66600a62
                                                    • Opcode Fuzzy Hash: 8fbe9a56c6b541ebf54ecf0c96ae19b87a728b3c5aeb92de0eea78cee808be53
                                                    • Instruction Fuzzy Hash: 7EF0E5308091414FC3014B78FFA1AA4BFE2E751750B084179C5C6A2273D3B88C05DB48
                                                    APIs
                                                    • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 0040D48F
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 7b77b9569ee92cbbd99cedb542f688c1f3839435de56713ed0b4ebcd02247098
                                                    • Instruction ID: 9dd4b07f0ddaf766615e6b53ea7890f520b9d6c24c0dbb1141a27dc5a10ba2ad
                                                    • Opcode Fuzzy Hash: 7b77b9569ee92cbbd99cedb542f688c1f3839435de56713ed0b4ebcd02247098
                                                    • Instruction Fuzzy Hash: C2F03034900200DFDB00DFA9C9C47663BA0BF05740F204566EC26EB2D5D774D9569A69
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9E335
                                                      • Part of subcall function 02BA3B4C: _malloc.LIBCMT ref: 02BA3B64
                                                      • Part of subcall function 02B9E551: __EH_prolog.LIBCMT ref: 02B9E556
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$_malloc
                                                    • String ID:
                                                    • API String ID: 4254904621-0
                                                    • Opcode ID: 07bdd1384c7f2291afeef10cc447baff9423fd43007d6b3a2e5b4ed5905fc85d
                                                    • Instruction ID: 12d2a062af115dcf2a27ce2c840bd5c36c73f459ff358dda04e014e93396e148
                                                    • Opcode Fuzzy Hash: 07bdd1384c7f2291afeef10cc447baff9423fd43007d6b3a2e5b4ed5905fc85d
                                                    • Instruction Fuzzy Hash: D1E08C71A15209ABCF0AEF68D81077EB7A6EF04700F0081EEB80AD2340EFB0C9008A04
                                                    APIs
                                                      • Part of subcall function 02BA5C5A: __getptd_noexit.LIBCMT ref: 02BA5C5B
                                                      • Part of subcall function 02BA5C5A: __amsg_exit.LIBCMT ref: 02BA5C68
                                                      • Part of subcall function 02BA3493: __getptd_noexit.LIBCMT ref: 02BA3497
                                                      • Part of subcall function 02BA3493: __freeptd.LIBCMT ref: 02BA34B1
                                                      • Part of subcall function 02BA3493: RtlExitUserThread.NTDLL(?,00000000,?,02BA3473,00000000), ref: 02BA34BA
                                                    • __XcptFilter.LIBCMT ref: 02BA347F
                                                      • Part of subcall function 02BA8D94: __getptd_noexit.LIBCMT ref: 02BA8D98
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                    • String ID:
                                                    • API String ID: 1405322794-0
                                                    • Opcode ID: 056eac14842cd28c869ea40bca0e9ec4ed4206c9d051274d8574a9e757dbfdb1
                                                    • Instruction ID: 4386d6b1ccb43a698a682bd95ba74bad2bfa15be4173a648083794629389b6a4
                                                    • Opcode Fuzzy Hash: 056eac14842cd28c869ea40bca0e9ec4ed4206c9d051274d8574a9e757dbfdb1
                                                    • Instruction Fuzzy Hash: 7CE0ECB1D486009FEB18EBE4D869F2D77A6AF04701F6000C8F102AB661DA75A9409F60
                                                    APIs
                                                    • RegSetValueExA.KERNELBASE(?), ref: 0040D471
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID:
                                                    • API String ID: 3702945584-0
                                                    • Opcode ID: 95b376b978b074ba575c3d2c3d3f68cb73d58ca58c1cef047208ed1b4d6cc18c
                                                    • Instruction ID: 8699b197afdde03bc4f802f1542fddda698dd93915f1d14a6626fd4e2b149b80
                                                    • Opcode Fuzzy Hash: 95b376b978b074ba575c3d2c3d3f68cb73d58ca58c1cef047208ed1b4d6cc18c
                                                    • Instruction Fuzzy Hash: 8FD01275C48505FFCB0207D09D48D6A3B34EB1934471444FBE092740A1C73A592AB72A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: CopyFile
                                                    • String ID:
                                                    • API String ID: 1304948518-0
                                                    • Opcode ID: 7bbfb56dee2840cffd14224f08061eabc23059ec4057ab413a1c8c75a1585ed8
                                                    • Instruction ID: 596476677d391e853ddde6ae3d3f14c2c3ac4a5dc640d041011de42c3b4ba4a5
                                                    • Opcode Fuzzy Hash: 7bbfb56dee2840cffd14224f08061eabc23059ec4057ab413a1c8c75a1585ed8
                                                    • Instruction Fuzzy Hash: 4CC04C60548201A6D15015500A5DE32155C5301748B24507B670A700C9867C804FA01F
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID:
                                                    • API String ID: 71445658-0
                                                    • Opcode ID: 8f844f630c2591279265d59ff61b3e45b64c4fec95783beb8bbe2296e2851383
                                                    • Instruction ID: bfef3433d8435fd648c1b79c377edbf1d79290e02f7695a9cfe042df06d32702
                                                    • Opcode Fuzzy Hash: 8f844f630c2591279265d59ff61b3e45b64c4fec95783beb8bbe2296e2851383
                                                    • Instruction Fuzzy Hash: 3DC09230E18016EAD7488AF18A0427B27A46604344F704EBBA007F11D0E73CC50E7A2E
                                                    APIs
                                                    • CreateDirectoryA.KERNELBASE ref: 0040263D
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectory
                                                    • String ID:
                                                    • API String ID: 4241100979-0
                                                    • Opcode ID: 646382504301764805330a42d316e431d1156f9e54cf55858cabf39128efda84
                                                    • Instruction ID: adde03a6f4d73728f8243f193648d9e86375a0fcc33e3a3219f6ff9b90b7c6c3
                                                    • Opcode Fuzzy Hash: 646382504301764805330a42d316e431d1156f9e54cf55858cabf39128efda84
                                                    • Instruction Fuzzy Hash: A7A01220446110E3C10113800E45D5A6018190934037140336202710D0457C000B126F
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: LocalTime
                                                    • String ID:
                                                    • API String ID: 481472006-0
                                                    • Opcode ID: c59827c34f929b5cf84ff5dfd9f0f42dbc1196ebd93f0e9a466885b9188effb8
                                                    • Instruction ID: 1340b8146290ba8faa673fe8a19acec7bbda6d55c18b01a17e5d804ddafa992b
                                                    • Opcode Fuzzy Hash: c59827c34f929b5cf84ff5dfd9f0f42dbc1196ebd93f0e9a466885b9188effb8
                                                    • Instruction Fuzzy Hash: 94B09230C09103DEC7006FA0AF8802876E4A612309B204A3FE00BB00A0CB39004F9B0E
                                                    APIs
                                                      • Part of subcall function 02BA1610: OpenEventA.KERNEL32(00100002,00000000,00000000,312A8364), ref: 02BA16B0
                                                      • Part of subcall function 02BA1610: CloseHandle.KERNEL32(00000000), ref: 02BA16C5
                                                      • Part of subcall function 02BA1610: ResetEvent.KERNEL32(00000000,312A8364), ref: 02BA16CF
                                                      • Part of subcall function 02BA1610: CloseHandle.KERNEL32(00000000,312A8364), ref: 02BA1704
                                                    • TlsSetValue.KERNEL32(00000029,?), ref: 02BA21AA
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseEventHandle$OpenResetValue
                                                    • String ID:
                                                    • API String ID: 1556185888-0
                                                    • Opcode ID: c6378a8ddfdf81d514acd635b8db966507799ff22326606ed3b209d173eb85fd
                                                    • Instruction ID: d9646174d3ad512ed529e23c5af161a0a817496618adb9c8ab8edabba5eac47c
                                                    • Opcode Fuzzy Hash: c6378a8ddfdf81d514acd635b8db966507799ff22326606ed3b209d173eb85fd
                                                    • Instruction Fuzzy Hash: 5301A276A54204AFD700CF5DDC45F9ABBE8FB096B1F104BAAF825D3780D77169108BA0
                                                    APIs
                                                    • Sleep.KERNELBASE(000003E8), ref: 0040D6C9
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 158ec18ed6ebe6907edc541ed120054b452425a2c07cefa9af086e389dd163e8
                                                    • Instruction ID: ea9b612e75e96a9e649124ab7fdbd7e13b2ba0941efcbb4ebadd0b56a3963e9b
                                                    • Opcode Fuzzy Hash: 158ec18ed6ebe6907edc541ed120054b452425a2c07cefa9af086e389dd163e8
                                                    • Instruction Fuzzy Hash: 21C09B61D45600FBE70117D19D05F7975147744704F1101367512740D14A79471E665B
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000), ref: 0040254F
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: e0586660372f964986ac9a5c717fc624c20094b3996113715950d17f78ee7398
                                                    • Instruction ID: 06f368756e91e7b9977aee52ec5ec8d88dc313175ae77e339f8641823a61a740
                                                    • Opcode Fuzzy Hash: e0586660372f964986ac9a5c717fc624c20094b3996113715950d17f78ee7398
                                                    • Instruction Fuzzy Hash: 6CC08C36C48102EFC6001BD04A046697AA0E708301F204036A602311C0C278001EE7DA
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 77bef5aa7127f4a1c2bd7f85fe46533c9322e69d4bf0dc01fed3afa3381319a4
                                                    • Instruction ID: 14e6a3ccb8d0835fd855cbe174f2547320c218101d8b14149c08288f20d315af
                                                    • Opcode Fuzzy Hash: 77bef5aa7127f4a1c2bd7f85fe46533c9322e69d4bf0dc01fed3afa3381319a4
                                                    • Instruction Fuzzy Hash: E1B01234804500DAD20007A0AE04B2036307340300F10003AA306300E0873904DE6A0F
                                                    APIs
                                                      • Part of subcall function 02B99AD9: __EH_prolog.LIBCMT ref: 02B99ADE
                                                      • Part of subcall function 02B99AD9: _Allocate.LIBCPMT ref: 02B99B35
                                                      • Part of subcall function 02B99AD9: _memmove.LIBCMT ref: 02B99B8C
                                                    • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02BA09A2
                                                    • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02BA09AA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateErrorFormatH_prologLastMessage_memmove
                                                    • String ID: Unknown error$invalid string position
                                                    • API String ID: 1017912131-1837348584
                                                    • Opcode ID: dc9ce1535e5367189619c8eb49806809647063e35b3c6d97fb212f1c339befe2
                                                    • Instruction ID: 9dae7def5328c12b5ece6c6f4bbed0a2ca07ffb54ee1cee36febe91f12975e06
                                                    • Opcode Fuzzy Hash: dc9ce1535e5367189619c8eb49806809647063e35b3c6d97fb212f1c339befe2
                                                    • Instruction Fuzzy Hash: 5451AB7160C3419FEB14EF28C8A0B2EBBE4EB98344F500DADF49297691D771E588CB52
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02BA4E96,?,?,?,00000001), ref: 02BA952D
                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02BA9536
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 952344cc785edcc80735a76b1a546abfa8d99ec0f80621c5dfd256e918dcd972
                                                    • Instruction ID: bba47502cf8c6732e6c5b4dfa992ac5e235c18dbfcac8d42cd7e18ca95d1c74b
                                                    • Opcode Fuzzy Hash: 952344cc785edcc80735a76b1a546abfa8d99ec0f80621c5dfd256e918dcd972
                                                    • Instruction Fuzzy Hash: 3FB09B3248410CEBC7021B91EC097457F18E744691F404812F50D454508FA154206651
                                                    APIs
                                                    • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040D7EB
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: CtrlDispatcherServiceStart
                                                    • String ID:
                                                    • API String ID: 3789849863-0
                                                    • Opcode ID: 048f1fc87dfc17502f53c8cb99c62eff2b8860d997af8700ce0bd7cb01c19f70
                                                    • Instruction ID: a56dc151bd964ac1fba48249163fef7f6c595ca83a25019f2d156b68727aac61
                                                    • Opcode Fuzzy Hash: 048f1fc87dfc17502f53c8cb99c62eff2b8860d997af8700ce0bd7cb01c19f70
                                                    • Instruction Fuzzy Hash: B5D01760C08554EEDB00DBD09A589BAB6A4AB09300F2580BB9106B20D1C2BC460ABA0E
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: CreateService
                                                    • String ID:
                                                    • API String ID: 1592570254-0
                                                    • Opcode ID: fa896d8a4fcccf17df80ac7c3161345a7c22e5b4e6099a36f7291b98af68b886
                                                    • Instruction ID: 942f9002a568790266d2ba7a35d712c6a2a83a4fdcacf44ef07e9fbbb0b8a409
                                                    • Opcode Fuzzy Hash: fa896d8a4fcccf17df80ac7c3161345a7c22e5b4e6099a36f7291b98af68b886
                                                    • Instruction Fuzzy Hash: 02A00274608402DEC6502FD05FAC42A356955443A5372487ED547F04E0CA7855CEF57F
                                                    APIs
                                                    • RtlDecodePointer.NTDLL(?), ref: 02BA833B
                                                    • _free.LIBCMT ref: 02BA8354
                                                      • Part of subcall function 02BA2F74: HeapFree.KERNEL32(00000000,00000000,?,02BA5CD2,00000000,00000104,74DF0A60), ref: 02BA2F88
                                                      • Part of subcall function 02BA2F74: GetLastError.KERNEL32(00000000,?,02BA5CD2,00000000,00000104,74DF0A60), ref: 02BA2F9A
                                                    • _free.LIBCMT ref: 02BA8367
                                                    • _free.LIBCMT ref: 02BA8385
                                                    • _free.LIBCMT ref: 02BA8397
                                                    • _free.LIBCMT ref: 02BA83A8
                                                    • _free.LIBCMT ref: 02BA83B3
                                                    • _free.LIBCMT ref: 02BA83D7
                                                    • RtlEncodePointer.NTDLL(00720D58), ref: 02BA83DE
                                                    • _free.LIBCMT ref: 02BA83F3
                                                    • _free.LIBCMT ref: 02BA8409
                                                    • _free.LIBCMT ref: 02BA8431
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                    • String ID: Xr
                                                    • API String ID: 3064303923-2521548871
                                                    • Opcode ID: f7f13ee073e379fc9aacdc5dff984e7cc12d74fac9c4d2ea140486da585e7cbf
                                                    • Instruction ID: 88b57f4227adeb4c2f40db578f0e40f2ed3c52aa7870735a32602318445a5381
                                                    • Opcode Fuzzy Hash: f7f13ee073e379fc9aacdc5dff984e7cc12d74fac9c4d2ea140486da585e7cbf
                                                    • Instruction Fuzzy Hash: BE21B572D49211DBCB256F14F8A090D77B9FB883B032D49ABEC44A7250DB31AC64CF91
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B924E6
                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02B924FC
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B9250E
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B9256D
                                                    • SetLastError.KERNEL32(00000000,?,74DEDFB0), ref: 02B9257F
                                                    • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,74DEDFB0), ref: 02B92599
                                                    • GetLastError.KERNEL32(?,74DEDFB0), ref: 02B925A2
                                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02B925F0
                                                    • InterlockedDecrement.KERNEL32(00000002), ref: 02B9262F
                                                    • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02B9268E
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B92699
                                                    • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02B926AD
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,74DEDFB0), ref: 02B926BD
                                                    • GetLastError.KERNEL32(?,74DEDFB0), ref: 02B926C7
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                    • String ID:
                                                    • API String ID: 1213838671-0
                                                    • Opcode ID: 56b4b7aab47bda4ce74adaefc20f27ce3633516963ede8c010e2ad2fa768243f
                                                    • Instruction ID: 921ab9ca2fc6e10485ae0bda2593d38459cf1933009efd00c4d08a549439f22d
                                                    • Opcode Fuzzy Hash: 56b4b7aab47bda4ce74adaefc20f27ce3633516963ede8c010e2ad2fa768243f
                                                    • Instruction Fuzzy Hash: 7E613D71D00209AFCF11DFA4C984AAEFBB9FF48354F5049AAE906E3240EB749904DF60
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B94608
                                                      • Part of subcall function 02BA3B4C: _malloc.LIBCMT ref: 02BA3B64
                                                    • htons.WS2_32(?), ref: 02B94669
                                                    • htonl.WS2_32(?), ref: 02B9468C
                                                    • htonl.WS2_32(00000000), ref: 02B94693
                                                    • htons.WS2_32(00000000), ref: 02B94747
                                                    • _sprintf.LIBCMT ref: 02B9475D
                                                      • Part of subcall function 02B9898C: _memmove.LIBCMT ref: 02B989AC
                                                    • htons.WS2_32(?), ref: 02B946B0
                                                      • Part of subcall function 02B99737: __EH_prolog.LIBCMT ref: 02B9973C
                                                      • Part of subcall function 02B99737: RtlEnterCriticalSection.NTDLL(00000020), ref: 02B997B7
                                                      • Part of subcall function 02B99737: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02B997D5
                                                      • Part of subcall function 02B91BA7: __EH_prolog.LIBCMT ref: 02B91BAC
                                                      • Part of subcall function 02B91BA7: RtlEnterCriticalSection.NTDLL ref: 02B91BBC
                                                      • Part of subcall function 02B91BA7: RtlLeaveCriticalSection.NTDLL ref: 02B91BEA
                                                      • Part of subcall function 02B91BA7: RtlEnterCriticalSection.NTDLL ref: 02B91C13
                                                      • Part of subcall function 02B91BA7: RtlLeaveCriticalSection.NTDLL ref: 02B91C56
                                                      • Part of subcall function 02B9DEF3: __EH_prolog.LIBCMT ref: 02B9DEF8
                                                    • htonl.WS2_32(?), ref: 02B9497C
                                                    • htonl.WS2_32(00000000), ref: 02B94983
                                                    • htonl.WS2_32(00000000), ref: 02B949C8
                                                    • htonl.WS2_32(00000000), ref: 02B949CF
                                                    • htons.WS2_32(?), ref: 02B949EF
                                                    • htons.WS2_32(?), ref: 02B949F9
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                    • String ID:
                                                    • API String ID: 1645262487-0
                                                    • Opcode ID: 42956a192955616e00f5553c94197056e03d8ec9b5808b9c42bb82fad665e5b1
                                                    • Instruction ID: f6a1b21fea760c4242c6b00e74b9ef924bb38464c02389e4efad39868a1440e1
                                                    • Opcode Fuzzy Hash: 42956a192955616e00f5553c94197056e03d8ec9b5808b9c42bb82fad665e5b1
                                                    • Instruction Fuzzy Hash: 15025B71C01259EFDF15DFA4C844BEEBBB9AF09304F1045AAE505B7280DB746A89CFA1
                                                    APIs
                                                    • RegisterServiceCtrlHandlerA.ADVAPI32(Core Package LingX 8.26.45,Function_0000235E), ref: 004023C1
                                                    • SetServiceStatus.ADVAPI32(0040C408), ref: 00402420
                                                    • GetLastError.KERNEL32 ref: 00402422
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                    • GetLastError.KERNEL32 ref: 00402450
                                                    • SetServiceStatus.ADVAPI32(0040C408), ref: 00402480
                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                    • CloseHandle.KERNEL32 ref: 004024A1
                                                    • SetServiceStatus.ADVAPI32(0040C408), ref: 004024CA
                                                    Strings
                                                    • Core Package LingX 8.26.45, xrefs: 004023BC
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                    • String ID: Core Package LingX 8.26.45
                                                    • API String ID: 3346042915-1427271408
                                                    • Opcode ID: 8481bbef3285b0f9ebce9f82f4e1eb68b4ac82d1f0eae4c5cd12d91383da07eb
                                                    • Instruction ID: b8fe7bda3a7dcfcb82ad829e681adc6a99cb3bee06a9baca5ac2dc3afb04543b
                                                    • Opcode Fuzzy Hash: 8481bbef3285b0f9ebce9f82f4e1eb68b4ac82d1f0eae4c5cd12d91383da07eb
                                                    • Instruction Fuzzy Hash: E121C570441214EBC2105F16EFE9A267FA8FBD5794711823EE544B22B2CBB90549CFAD
                                                    APIs
                                                    • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BBD
                                                    • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BD1
                                                    • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BFD
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C35
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C57
                                                    • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C70
                                                    • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403C83
                                                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00403CC1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                    • String ID: 4/@
                                                    • API String ID: 1823725401-3101945251
                                                    • Opcode ID: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                    • Instruction ID: a2970ceca2a6c3f976dc545d3d2173026391ae6ff2d108e1c7f08cdddd2a955e
                                                    • Opcode Fuzzy Hash: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                    • Instruction Fuzzy Hash: AD31F27350C1245EE7202F785DC883B7E9CEA4534A711093FF942F3380EA798E81466D
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B93428
                                                    • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02B9346B
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02B93472
                                                    • GetLastError.KERNEL32 ref: 02B93486
                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02B934D7
                                                    • RtlEnterCriticalSection.NTDLL(00000018), ref: 02B934ED
                                                    • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02B93518
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                    • String ID: CancelIoEx$KERNEL32
                                                    • API String ID: 2902213904-434325024
                                                    • Opcode ID: 3fe21e504cbcbb2f01d1fb77b7d6346c3a19f9f1b7811a6e126e95786871387e
                                                    • Instruction ID: d00b126a71156c12f283b693312b1e901eac269d8ed200b10d172dc5080c7ac6
                                                    • Opcode Fuzzy Hash: 3fe21e504cbcbb2f01d1fb77b7d6346c3a19f9f1b7811a6e126e95786871387e
                                                    • Instruction Fuzzy Hash: 79317E72900205DFDB12AF64C9547AABBF9FF49354F0588EAE8059B340DBB4D900CBA1
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00404381,?,Microsoft Visual C++ Runtime Library,00012010,?,0040858C,?,004085DC,?,?,?,Runtime Error!Program: ), ref: 0040658A
                                                    • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004065A2
                                                    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004065B3
                                                    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004065C0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                    • API String ID: 2238633743-4044615076
                                                    • Opcode ID: 987b992b6f5bbeab899bec9017d6b859524fa9c80776c30a59c8d29f16b735e1
                                                    • Instruction ID: 34c45dea863b0ad37b671b2ee6745cf1fa65c172ae9c71c573f5c1b511995102
                                                    • Opcode Fuzzy Hash: 987b992b6f5bbeab899bec9017d6b859524fa9c80776c30a59c8d29f16b735e1
                                                    • Instruction Fuzzy Hash: FA017571A40201FFCB209FB5BFC492B3AE99B58690306193FB541F2291DE79C815DB68
                                                    APIs
                                                    • LCMapStringW.KERNEL32(00000000,00000100,00408658,00000001,00000000,00000000,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 00406899
                                                    • LCMapStringA.KERNEL32(00000000,00000100,00408654,00000001,00000000,00000000,?,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 004068B5
                                                    • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,00406317,?,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 004068FE
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 00406936
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00406317,00200020,00000000,?,00000000), ref: 0040698E
                                                    • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00406317,00200020,00000000,?,00000000), ref: 004069A4
                                                    • LCMapStringW.KERNEL32(00000000,?,00406317,00000000,00406317,?,?,00406317,00200020,00000000,?,00000000), ref: 004069D7
                                                    • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00406317,00200020,00000000,?,00000000), ref: 00406A3F
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: String$ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 352835431-0
                                                    • Opcode ID: e9f64dd7570e4df949ea1626fd4153753d4334a99172a5ae067b945d03b43c58
                                                    • Instruction ID: 8dbeb6cb8c932cbdef2775d2a29e2de0fc7c35b208bd80b0a47b5516e3ba15ce
                                                    • Opcode Fuzzy Hash: e9f64dd7570e4df949ea1626fd4153753d4334a99172a5ae067b945d03b43c58
                                                    • Instruction Fuzzy Hash: 3E518A71500209EBCF219F94CD45AAF7BB5FB49714F12413AF912B12A0C73A8C21DB69
                                                    APIs
                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 004042CA
                                                    • GetStdHandle.KERNEL32(000000F4,0040858C,00000000,?,00000000,00000000), ref: 004043A0
                                                    • WriteFile.KERNEL32(00000000), ref: 004043A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: File$HandleModuleNameWrite
                                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                    • API String ID: 3784150691-4022980321
                                                    • Opcode ID: 4bb15c7821e3b7df3b39c29bb8507035fb8a1658cdd6742b24a8a426161d7798
                                                    • Instruction ID: ad501088bf1d437e3d5a217a77e101a13ac7783d72fc0021c8d9dd27a33d1b06
                                                    • Opcode Fuzzy Hash: 4bb15c7821e3b7df3b39c29bb8507035fb8a1658cdd6742b24a8a426161d7798
                                                    • Instruction Fuzzy Hash: 52318772600218AFDF2096608E45FDA736DAF85304F1004BFF944B61D1EA789D458A5D
                                                    APIs
                                                    • OpenEventA.KERNEL32(00100002,00000000,00000000,312A8364), ref: 02BA16B0
                                                    • CloseHandle.KERNEL32(00000000), ref: 02BA16C5
                                                    • ResetEvent.KERNEL32(00000000,312A8364), ref: 02BA16CF
                                                    • CloseHandle.KERNEL32(00000000,312A8364), ref: 02BA1704
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,312A8364), ref: 02BA177A
                                                    • CloseHandle.KERNEL32(00000000), ref: 02BA178F
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseEventHandle$CreateOpenReset
                                                    • String ID:
                                                    • API String ID: 1285874450-0
                                                    • Opcode ID: 156f059dead63e87467ce7d9364c5034fea579f9ae9d278bc8b86d4bb0169d79
                                                    • Instruction ID: e4d1a2e2bb8d271115fc93cd3d92d402180adf1e20a0a711142de74f8184081a
                                                    • Opcode Fuzzy Hash: 156f059dead63e87467ce7d9364c5034fea579f9ae9d278bc8b86d4bb0169d79
                                                    • Instruction Fuzzy Hash: FD416E75D18348ABDF61CFACC858BADBBB8EF05764F144659E818EB280D7709905CBA0
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B920AC
                                                    • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02B920CD
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B920D8
                                                    • InterlockedDecrement.KERNEL32(?), ref: 02B9213E
                                                    • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02B9217A
                                                    • InterlockedDecrement.KERNEL32(?), ref: 02B92187
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B921A6
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                    • String ID:
                                                    • API String ID: 1171374749-0
                                                    • Opcode ID: 44e816d829a5b52e2f15a785e56eb9f7df4a8a4da9547111ac4cc02bd9f5c5cf
                                                    • Instruction ID: d59a2a9778aeaaab7779dd2c3064ba4c0e0c97ac62aa7ee2d3b20f22e45f1096
                                                    • Opcode Fuzzy Hash: 44e816d829a5b52e2f15a785e56eb9f7df4a8a4da9547111ac4cc02bd9f5c5cf
                                                    • Instruction Fuzzy Hash: 54414972904701AFC711DF25D884A6BBBF9EFC8654F000A6EF89A83250DB30E545DFA1
                                                    APIs
                                                      • Part of subcall function 02BA1ED0: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02BA172E,?,?), ref: 02BA1EFF
                                                      • Part of subcall function 02BA1ED0: CloseHandle.KERNEL32(00000000,?,?,02BA172E,?,?), ref: 02BA1F14
                                                      • Part of subcall function 02BA1ED0: SetEvent.KERNEL32(00000000,02BA172E,?,?), ref: 02BA1F27
                                                    • OpenEventA.KERNEL32(00100002,00000000,00000000,312A8364), ref: 02BA16B0
                                                    • CloseHandle.KERNEL32(00000000), ref: 02BA16C5
                                                    • ResetEvent.KERNEL32(00000000,312A8364), ref: 02BA16CF
                                                    • CloseHandle.KERNEL32(00000000,312A8364), ref: 02BA1704
                                                    • __CxxThrowException@8.LIBCMT ref: 02BA1735
                                                      • Part of subcall function 02BA455A: RaiseException.KERNEL32(?,?,02B9FB5F,?,?,?,?,?,?,?,02B9FB5F,?,02BC0FA8,?), ref: 02BA45AF
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,312A8364), ref: 02BA177A
                                                    • CloseHandle.KERNEL32(00000000), ref: 02BA178F
                                                      • Part of subcall function 02BA1C10: GetCurrentProcessId.KERNEL32(?), ref: 02BA1C69
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,312A8364), ref: 02BA179F
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                    • String ID:
                                                    • API String ID: 2227236058-0
                                                    • Opcode ID: b33c03d913f4dc72ef1c94ede69b0f64eea544788809dceb82d42dcea85f76ae
                                                    • Instruction ID: 47f7e353490ac2acde3a8f38f8957b078205c5784e55ddf8ac20a4d20563b094
                                                    • Opcode Fuzzy Hash: b33c03d913f4dc72ef1c94ede69b0f64eea544788809dceb82d42dcea85f76ae
                                                    • Instruction Fuzzy Hash: 50316075D18308ABDF61CBACCC64BADB7B9EF05364F1401A9E81DEB280D7709945CB61
                                                    APIs
                                                    • __init_pointers.LIBCMT ref: 02BA5D94
                                                      • Part of subcall function 02BA8503: RtlEncodePointer.NTDLL(00000000), ref: 02BA8506
                                                      • Part of subcall function 02BA8503: __initp_misc_winsig.LIBCMT ref: 02BA8521
                                                      • Part of subcall function 02BA8503: GetModuleHandleW.KERNEL32(kernel32.dll,?,02BC15A8,00000008,00000003,02BC0F8C,?,00000001), ref: 02BA9281
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02BA9295
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02BA92A8
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02BA92BB
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02BA92CE
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02BA92E1
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02BA92F4
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02BA9307
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02BA931A
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02BA932D
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02BA9340
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02BA9353
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02BA9366
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02BA9379
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02BA938C
                                                      • Part of subcall function 02BA8503: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02BA939F
                                                    • __mtinitlocks.LIBCMT ref: 02BA5D99
                                                    • __mtterm.LIBCMT ref: 02BA5DA2
                                                      • Part of subcall function 02BA5E0A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02BA8939
                                                      • Part of subcall function 02BA5E0A: _free.LIBCMT ref: 02BA8940
                                                      • Part of subcall function 02BA5E0A: RtlDeleteCriticalSection.NTDLL(02BC3978), ref: 02BA8962
                                                    • __calloc_crt.LIBCMT ref: 02BA5DC7
                                                    • __initptd.LIBCMT ref: 02BA5DE9
                                                    • GetCurrentThreadId.KERNEL32 ref: 02BA5DF0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                    • String ID:
                                                    • API String ID: 3567560977-0
                                                    • Opcode ID: bf7ccef92b42b5fd7a9316556c7cd3e4d09add78cc66d85e0fb74637d92ad71c
                                                    • Instruction ID: 5724c424889019d8f28b0d6f3bef514cc9c7c14312fe10de8c919315c16ff871
                                                    • Opcode Fuzzy Hash: bf7ccef92b42b5fd7a9316556c7cd3e4d09add78cc66d85e0fb74637d92ad71c
                                                    • Instruction Fuzzy Hash: 0CF02432D9C7113EE6387635BC69A8B3B82DF01770BA006D9E461DA0D4FF2186914BA0
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,02BA3473,00000000), ref: 02BA34DB
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02BA34E2
                                                    • RtlEncodePointer.NTDLL(00000000), ref: 02BA34EE
                                                    • RtlDecodePointer.NTDLL(00000001), ref: 02BA350B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                    • String ID: RoInitialize$combase.dll
                                                    • API String ID: 3489934621-340411864
                                                    • Opcode ID: a73f17719c6fbbe4c1fd0c38a875dccd7471bd310f807fa644fab55f5e540049
                                                    • Instruction ID: 9189d74be9619429e2f6d7dafdd3d87520433d1a2a751509c27038a3791b8b81
                                                    • Opcode Fuzzy Hash: a73f17719c6fbbe4c1fd0c38a875dccd7471bd310f807fa644fab55f5e540049
                                                    • Instruction Fuzzy Hash: 20E0ED71DD0340AAEA125F74EC49F563759B785792F6048A4B402E2190CBF591649B24
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02BA34B0), ref: 02BA35B0
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02BA35B7
                                                    • RtlEncodePointer.NTDLL(00000000), ref: 02BA35C2
                                                    • RtlDecodePointer.NTDLL(02BA34B0), ref: 02BA35DD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                    • String ID: RoUninitialize$combase.dll
                                                    • API String ID: 3489934621-2819208100
                                                    • Opcode ID: 7cc47e8c8c0dd22dfa20000a307614475eadd2fe094ad4ab11164fccaec0fee0
                                                    • Instruction ID: 176375b738c492d25df791f092176a87af109c8c514a7cc153626dff542022e3
                                                    • Opcode Fuzzy Hash: 7cc47e8c8c0dd22dfa20000a307614475eadd2fe094ad4ab11164fccaec0fee0
                                                    • Instruction Fuzzy Hash: ABE01AB1DC0300ABEA129F64AD4CB153769BB94791F204890F502A2190CBF0D160DA20
                                                    APIs
                                                    • TlsGetValue.KERNEL32(00000029,312A8364,?,?,?,?,00000000,02BB6AB8,000000FF,02BA21CA), ref: 02BA1F6A
                                                    • TlsSetValue.KERNEL32(00000029,02BA21CA,?,?,00000000), ref: 02BA1FD7
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02BA2001
                                                    • HeapFree.KERNEL32(00000000), ref: 02BA2004
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: HeapValue$FreeProcess
                                                    • String ID:
                                                    • API String ID: 1812714009-0
                                                    • Opcode ID: 857453d585be70eb6d2f579d6fe4aecbe47bf6e4803d32dd619f9b43fdd38a07
                                                    • Instruction ID: 8f692de7a83361480df5f3de65a9bbb362979bba8a6beeaa0d3f7749f3fc4b76
                                                    • Opcode Fuzzy Hash: 857453d585be70eb6d2f579d6fe4aecbe47bf6e4803d32dd619f9b43fdd38a07
                                                    • Instruction Fuzzy Hash: C451DF369083449FDB31CF29C855B1ABBE5FF88764F0986A9E85997390D731EC00CB91
                                                    APIs
                                                    • _ValidateScopeTableHandlers.LIBCMT ref: 02BB5790
                                                    • __FindPESection.LIBCMT ref: 02BB57AA
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FindHandlersScopeSectionTableValidate
                                                    • String ID:
                                                    • API String ID: 876702719-0
                                                    • Opcode ID: df6a9fc14df0e7e6018ed3bd0278463d70315c204b08e6ee0121e2c820c607ce
                                                    • Instruction ID: cbb0e5cdffe9b8a2ad2e3410e1316486c4435100c0ea954588251f8b437f8d16
                                                    • Opcode Fuzzy Hash: df6a9fc14df0e7e6018ed3bd0278463d70315c204b08e6ee0121e2c820c607ce
                                                    • Instruction Fuzzy Hash: D2A1CE71E006158BDF22CF29D9807F9B7B9EF48324FA446A9DC45AB250E7B1E841CF91
                                                    APIs
                                                    • GetStringTypeW.KERNEL32(00000001,00408658,00000001,00000000,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 0040674D
                                                    • GetStringTypeA.KERNEL32(00000000,00000001,00408654,00000001,?,?,00000000,00000000,00000001), ref: 00406767
                                                    • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 0040679B
                                                    • MultiByteToWideChar.KERNEL32(00406317,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 004067D3
                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406829
                                                    • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040683B
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: StringType$ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 3852931651-0
                                                    • Opcode ID: 6d8eb81ee64157f72203894b93785b9b85560a11f4962ec6ebb452b13d20bf59
                                                    • Instruction ID: 7abba187aa9a424c0dbe6a0d425d95b5373609879485ba3de4d3a8f21a169ece
                                                    • Opcode Fuzzy Hash: 6d8eb81ee64157f72203894b93785b9b85560a11f4962ec6ebb452b13d20bf59
                                                    • Instruction Fuzzy Hash: 11418D72901209EFCF209F94CD85EAF3B79FB04754F11453AF912F2290D73989608B99
                                                    APIs
                                                    • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02B91CB1
                                                    • CloseHandle.KERNEL32(?), ref: 02B91CBA
                                                    • InterlockedExchangeAdd.KERNEL32(02BC727C,00000000), ref: 02B91CC6
                                                    • TerminateThread.KERNEL32(?,00000000), ref: 02B91CD4
                                                    • QueueUserAPC.KERNEL32(02B91E7C,?,00000000), ref: 02B91CE1
                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02B91CEC
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                    • String ID:
                                                    • API String ID: 1946104331-0
                                                    • Opcode ID: 80811386a6ed3855960ecc22872959d23940a7649d75d948d475970cb3c56176
                                                    • Instruction ID: 289b6214d18beeee428a0be72cd37dca41a86b8fcce0aefe699ae7665abf54b2
                                                    • Opcode Fuzzy Hash: 80811386a6ed3855960ecc22872959d23940a7649d75d948d475970cb3c56176
                                                    • Instruction Fuzzy Hash: DAF0A432550205BFDB114B99DD0DC5BFBBCEB85721B40469EF56AC3190DFB05910EB20
                                                    APIs
                                                    • GetVersionExA.KERNEL32 ref: 00403ECB
                                                    • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00403F00
                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403F60
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentFileModuleNameVariableVersion
                                                    • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                    • API String ID: 1385375860-4131005785
                                                    • Opcode ID: 24e6f3bd4125583b3bbf56e9767beae157ffe726f3734666c8e193c81b681956
                                                    • Instruction ID: b9728f854654bad712525c43123df79641ae2587965f18a3091eb02ea7af310c
                                                    • Opcode Fuzzy Hash: 24e6f3bd4125583b3bbf56e9767beae157ffe726f3734666c8e193c81b681956
                                                    • Instruction Fuzzy Hash: 42312771D002896DEB319A309C45BDA7F7C9B12309F2400FBE545F52C2D6398F8A8718
                                                    APIs
                                                    • std::exception::exception.LIBCMT ref: 02BA197F
                                                      • Part of subcall function 02BA24D3: std::exception::_Copy_str.LIBCMT ref: 02BA24EC
                                                      • Part of subcall function 02BA0D50: __CxxThrowException@8.LIBCMT ref: 02BA0DAE
                                                    • std::exception::exception.LIBCMT ref: 02BA19DE
                                                    Strings
                                                    • boost unique_lock owns already the mutex, xrefs: 02BA19CD
                                                    • $, xrefs: 02BA19E3
                                                    • boost unique_lock has no mutex, xrefs: 02BA196E
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                    • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                    • API String ID: 2140441600-46888669
                                                    • Opcode ID: fe9f40e83e07fddc00ad18fa35e5b29a8167e146443386c329f48e3366578088
                                                    • Instruction ID: 9ba1c79776729e3922fd9632ecb3f68ee19e60cc91da1a8ba10fb31a6d7acd01
                                                    • Opcode Fuzzy Hash: fe9f40e83e07fddc00ad18fa35e5b29a8167e146443386c329f48e3366578088
                                                    • Instruction Fuzzy Hash: F52114B150C3809FD711DF24C15479BBBE9AF88708F404E9EE8A587280D7B598088F92
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B92350
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B92360
                                                    • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02B92370
                                                    • GetLastError.KERNEL32 ref: 02B9237A
                                                      • Part of subcall function 02B91712: __EH_prolog.LIBCMT ref: 02B91717
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                    • String ID: pqcs
                                                    • API String ID: 1619523792-2559862021
                                                    • Opcode ID: b7d43b53765bf169efdf6c2a4c4a7d98f72723435bb25f95797bdd72daab22fa
                                                    • Instruction ID: 6640aabd8c52dd200c1a60e41fe1c44713f6fb9ae9d0e474a2aeb2ee13542003
                                                    • Opcode Fuzzy Hash: b7d43b53765bf169efdf6c2a4c4a7d98f72723435bb25f95797bdd72daab22fa
                                                    • Instruction Fuzzy Hash: D0F05471D40305AFDB21AF789C49BABBBACEF40745F4089AAE805D3140FBB0D9149B91
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B94035
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 02B94042
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B94049
                                                    • std::exception::exception.LIBCMT ref: 02B94063
                                                      • Part of subcall function 02B9A6CA: __EH_prolog.LIBCMT ref: 02B9A6CF
                                                      • Part of subcall function 02B9A6CA: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02B9A6DE
                                                      • Part of subcall function 02B9A6CA: __CxxThrowException@8.LIBCMT ref: 02B9A6FD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                    • String ID: bad allocation
                                                    • API String ID: 3112922283-2104205924
                                                    • Opcode ID: 308de954d10d5a099f509f2a2a81198b555669379828cf0af56f37ec9f66beed
                                                    • Instruction ID: c074c9c98d6fcdb651e76085f4176ec6321c0a674cfd01ef060523d707f12ef2
                                                    • Opcode Fuzzy Hash: 308de954d10d5a099f509f2a2a81198b555669379828cf0af56f37ec9f66beed
                                                    • Instruction Fuzzy Hash: 59F08C72E44209EBCB12EFE0C818BFFBB79EF04741F8045D9E915A2240DBB492148F51
                                                    APIs
                                                    • GetStartupInfoA.KERNEL32(?), ref: 00403D2D
                                                    • GetFileType.KERNEL32(00000800), ref: 00403DD3
                                                    • GetStdHandle.KERNEL32(-000000F6), ref: 00403E2C
                                                    • GetFileType.KERNEL32(00000000), ref: 00403E3A
                                                    • SetHandleCount.KERNEL32 ref: 00403E71
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: FileHandleType$CountInfoStartup
                                                    • String ID:
                                                    • API String ID: 1710529072-0
                                                    • Opcode ID: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                    • Instruction ID: 0b7b95883a4e689196e32d1b42849a04f4efe08137134e81777c7f486c9ce5ca
                                                    • Opcode Fuzzy Hash: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                    • Instruction Fuzzy Hash: 025125716046458BD7218F38CE847667FA8AF11722F15437AE4A2FB3E0C7389A45CB8D
                                                    APIs
                                                      • Part of subcall function 02BA1A50: CloseHandle.KERNEL32(00000000,312A8364), ref: 02BA1AA1
                                                      • Part of subcall function 02BA1A50: WaitForSingleObject.KERNEL32(?,000000FF,312A8364,?,?,?,?,312A8364,02BA1A23,312A8364), ref: 02BA1AB8
                                                    • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02BA1D1E
                                                    • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02BA1D3E
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02BA1D77
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02BA1DCB
                                                    • SetEvent.KERNEL32(?), ref: 02BA1DD2
                                                      • Part of subcall function 02B9418C: CloseHandle.KERNEL32(00000000,?,02BA1D05), ref: 02B941B0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                    • String ID:
                                                    • API String ID: 4166353394-0
                                                    • Opcode ID: da5c13d62245b7a1bfa11979674e1e51fb8ef692235395a4d222360be6a5b951
                                                    • Instruction ID: 522174303ba67f4ee37cc61df88a356395d3d66a6184787119eae6bc5e32d58b
                                                    • Opcode Fuzzy Hash: da5c13d62245b7a1bfa11979674e1e51fb8ef692235395a4d222360be6a5b951
                                                    • Instruction Fuzzy Hash: F9410E316193119FDB669F2DCC90B2BB7A8EF45324F1406E8EC6CEB295D734D8018BA1
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B920AC
                                                    • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02B920CD
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B920D8
                                                    • InterlockedDecrement.KERNEL32(?), ref: 02B9213E
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B921A6
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$Exchange$DecrementTimerWaitable
                                                    • String ID:
                                                    • API String ID: 1611172436-0
                                                    • Opcode ID: 248361a01dd306d4e964ab051e40157439d346125c2bd03e0504b10309eb047e
                                                    • Instruction ID: 0979ffb6e8a447b645209f7abf2074bf921fbda18877114250ac71cdf8ba20c7
                                                    • Opcode Fuzzy Hash: 248361a01dd306d4e964ab051e40157439d346125c2bd03e0504b10309eb047e
                                                    • Instruction Fuzzy Hash: AF318D72508701AFC711DF25C885A6BB7F9EFC8654F100A6EF85683250DB30E546DF51
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9E0FD
                                                      • Part of subcall function 02B91A01: TlsGetValue.KERNEL32 ref: 02B91A0A
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B9E17C
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B9E198
                                                    • InterlockedIncrement.KERNEL32(02BC5190), ref: 02B9E1BD
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B9E1D2
                                                      • Part of subcall function 02B927F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02B9284E
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                    • String ID:
                                                    • API String ID: 1578506061-0
                                                    • Opcode ID: 3aba87d931556baca65bfbc3c5f8f8b9844ecfebdabb77fcf10cba9b41be4a1d
                                                    • Instruction ID: 9bb413e14dbf2db724d88fa50336ebe0c056f47f0040b482da4cff8c5b9c59b6
                                                    • Opcode Fuzzy Hash: 3aba87d931556baca65bfbc3c5f8f8b9844ecfebdabb77fcf10cba9b41be4a1d
                                                    • Instruction Fuzzy Hash: 0F3148B29013159FCB10DFA8C5446AABBF9FF48310F1089AED449D7640E774AA04CFA0
                                                    APIs
                                                    • _malloc.LIBCMT ref: 02BB03B0
                                                      • Part of subcall function 02BA2FAC: __FF_MSGBANNER.LIBCMT ref: 02BA2FC3
                                                      • Part of subcall function 02BA2FAC: __NMSG_WRITE.LIBCMT ref: 02BA2FCA
                                                      • Part of subcall function 02BA2FAC: RtlAllocateHeap.NTDLL(00710000,00000000,00000001), ref: 02BA2FEF
                                                    • _free.LIBCMT ref: 02BB03C3
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateHeap_free_malloc
                                                    • String ID:
                                                    • API String ID: 1020059152-0
                                                    • Opcode ID: ca69fdb353519f5bcd9a476350e061a10695b68244100efacab9e5e789f0ed1d
                                                    • Instruction ID: 35e1c8f066720f60574a4d8107429e76d531f4e7eb9a72e31b5a96ede4963d29
                                                    • Opcode Fuzzy Hash: ca69fdb353519f5bcd9a476350e061a10695b68244100efacab9e5e789f0ed1d
                                                    • Instruction Fuzzy Hash: 8511A732808615ABDF323F74A8547BB3BA9AF043B4F148DE5F95997140DFB08950CB90
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B921DA
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B921ED
                                                    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02B92224
                                                    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02B92237
                                                    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02B92261
                                                      • Part of subcall function 02B92341: InterlockedExchange.KERNEL32(?,00000001), ref: 02B92350
                                                      • Part of subcall function 02B92341: InterlockedExchange.KERNEL32(?,00000001), ref: 02B92360
                                                      • Part of subcall function 02B92341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02B92370
                                                      • Part of subcall function 02B92341: GetLastError.KERNEL32 ref: 02B9237A
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 1856819132-0
                                                    • Opcode ID: 7ca7c131547ded5942ee17e7d07511e69f7ffa88484c46dacc13ff699b9a3276
                                                    • Instruction ID: eb9df3ec121e1a239dd963240064abfeabeeb738cf91c4f6a0eb5abb3d76ad30
                                                    • Opcode Fuzzy Hash: 7ca7c131547ded5942ee17e7d07511e69f7ffa88484c46dacc13ff699b9a3276
                                                    • Instruction Fuzzy Hash: 83118172D44118EBCF129FA8D8046AEFFBAFF45350F1045AAE855A3260DB714610DF91
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9229D
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B922B0
                                                    • TlsGetValue.KERNEL32 ref: 02B922E7
                                                    • TlsSetValue.KERNEL32(?), ref: 02B92300
                                                    • TlsSetValue.KERNEL32(?,?,?), ref: 02B9231C
                                                      • Part of subcall function 02B92341: InterlockedExchange.KERNEL32(?,00000001), ref: 02B92350
                                                      • Part of subcall function 02B92341: InterlockedExchange.KERNEL32(?,00000001), ref: 02B92360
                                                      • Part of subcall function 02B92341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02B92370
                                                      • Part of subcall function 02B92341: GetLastError.KERNEL32 ref: 02B9237A
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 1856819132-0
                                                    • Opcode ID: fbefedeb567787abfedb4a5d9ce0befbe68005e342f622871f7dfb5df3fba756
                                                    • Instruction ID: e0b6115e28aa44a30f870d583a18bf0d0d068b9ca647757e5e36fb76b8844d1e
                                                    • Opcode Fuzzy Hash: fbefedeb567787abfedb4a5d9ce0befbe68005e342f622871f7dfb5df3fba756
                                                    • Instruction Fuzzy Hash: B7116072D04118AFCF12AFA4DC44AAEFFBAFF58350F1044AAE805A3250DB714A10DF90
                                                    APIs
                                                      • Part of subcall function 02B9B165: __EH_prolog.LIBCMT ref: 02B9B16A
                                                    • __CxxThrowException@8.LIBCMT ref: 02B9BD2F
                                                      • Part of subcall function 02BA455A: RaiseException.KERNEL32(?,?,02B9FB5F,?,?,?,?,?,?,?,02B9FB5F,?,02BC0FA8,?), ref: 02BA45AF
                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02BC1DC4,?,00000001), ref: 02B9BD45
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B9BD58
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02BC1DC4,?,00000001), ref: 02B9BD68
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B9BD76
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                    • String ID:
                                                    • API String ID: 2725315915-0
                                                    • Opcode ID: d8fb129de0271f01102a30e2cea5ac6a100dbc79b84db728c21c94a66c5ddc62
                                                    • Instruction ID: 48e22d0c3ebd4499b45e73bf0484ddd2a9f54a9b4f9649c118d015d39d0d19a3
                                                    • Opcode Fuzzy Hash: d8fb129de0271f01102a30e2cea5ac6a100dbc79b84db728c21c94a66c5ddc62
                                                    • Instruction Fuzzy Hash: 7A01A973A40304AFDB10DFA8EC89F8A77ADEF04759F004969F625D7190DBA0E8049B10
                                                    APIs
                                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02B92432
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02B92445
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B92454
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B92469
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B92470
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 747265849-0
                                                    • Opcode ID: 45932f2f1022e3ead01328cfdeb00e6af2b576c4ce34dcc954ae856eea786e09
                                                    • Instruction ID: 459118f2e48cd4406278beccac0a377e4553b75c3c76dac2aaa76fae8d4bec0c
                                                    • Opcode Fuzzy Hash: 45932f2f1022e3ead01328cfdeb00e6af2b576c4ce34dcc954ae856eea786e09
                                                    • Instruction Fuzzy Hash: EDF09073A40204BBDB019AA0ED89FDAB76CFB85741F804462F701D7080DBA0A930DBA0
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(?), ref: 02B91ED2
                                                    • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02B91EEA
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B91EF9
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B91F0E
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B91F15
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 830998967-0
                                                    • Opcode ID: b4f749ae973c145bd49608ccf7f2d5890ba223fdc01730b7ee8279dd3e7791af
                                                    • Instruction ID: 13aa39e85123fbb57d9e4494b22c42b0449fe2f42eae56b5c7a14d4d4b7695f0
                                                    • Opcode Fuzzy Hash: b4f749ae973c145bd49608ccf7f2d5890ba223fdc01730b7ee8279dd3e7791af
                                                    • Instruction Fuzzy Hash: 02F09073540605BBDB01AFA4EC88FC6B72DFF44385F400422F20187440CBB0A524DBE0
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: invalid string position$string too long
                                                    • API String ID: 4104443479-4289949731
                                                    • Opcode ID: 9529bb68c6c61d3eeabdff2ddab1d4fd0808ff1b0b2230c347a3bf438224c19e
                                                    • Instruction ID: 9eb02c38574bdcac5b69ffead788ca6d944da469d308e94ad03e90ddc410d5fd
                                                    • Opcode Fuzzy Hash: 9529bb68c6c61d3eeabdff2ddab1d4fd0808ff1b0b2230c347a3bf438224c19e
                                                    • Instruction Fuzzy Hash: E941B231700304ABDF349F69DC84A6AB7AAEF42764B0449BDE856CB681C771E804CBA1
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B930C3
                                                    • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02B93102
                                                    • _memcmp.LIBCMT ref: 02B93141
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressErrorLastString_memcmp
                                                    • String ID: 255.255.255.255
                                                    • API String ID: 1618111833-2422070025
                                                    • Opcode ID: 1127106d0b599ce3e1e92b26d2bc445e09c69962f88b64b785cc3ec4f4ea2656
                                                    • Instruction ID: f2a8a5d39978b8e7941af243fc59febefe0a9b5540568aeabd9edb5697e15090
                                                    • Opcode Fuzzy Hash: 1127106d0b599ce3e1e92b26d2bc445e09c69962f88b64b785cc3ec4f4ea2656
                                                    • Instruction Fuzzy Hash: 5631C171A002199FDF20AF64C89076EB7E6EF45324F1049FAE955972A0EB719981CF90
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B91F5B
                                                    • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02B91FC5
                                                    • GetLastError.KERNEL32(?,00000000), ref: 02B91FD2
                                                      • Part of subcall function 02B91712: __EH_prolog.LIBCMT ref: 02B91717
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$CompletionCreateErrorLastPort
                                                    • String ID: iocp
                                                    • API String ID: 998023749-976528080
                                                    • Opcode ID: 96458015a6093791b4ada7099c41eaf7fc0e5def74ecf1fa915d977587945db2
                                                    • Instruction ID: 64b3e7f311b8c6d807eb8fde5578e90acd3590b00a3d291590d2b157191e22f0
                                                    • Opcode Fuzzy Hash: 96458015a6093791b4ada7099c41eaf7fc0e5def74ecf1fa915d977587945db2
                                                    • Instruction Fuzzy Hash: ED21C5B1901B459FC721DF6AC54459BFBF8FF94710B108A5FE4A683A90D7B0A604CF91
                                                    APIs
                                                    • _malloc.LIBCMT ref: 02BA3B64
                                                      • Part of subcall function 02BA2FAC: __FF_MSGBANNER.LIBCMT ref: 02BA2FC3
                                                      • Part of subcall function 02BA2FAC: __NMSG_WRITE.LIBCMT ref: 02BA2FCA
                                                      • Part of subcall function 02BA2FAC: RtlAllocateHeap.NTDLL(00710000,00000000,00000001), ref: 02BA2FEF
                                                    • std::exception::exception.LIBCMT ref: 02BA3B82
                                                    • __CxxThrowException@8.LIBCMT ref: 02BA3B97
                                                      • Part of subcall function 02BA455A: RaiseException.KERNEL32(?,?,02B9FB5F,?,?,?,?,?,?,?,02B9FB5F,?,02BC0FA8,?), ref: 02BA45AF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                    • String ID: bad allocation
                                                    • API String ID: 3074076210-2104205924
                                                    • Opcode ID: 2d0374d158d3c1049c1b35f373edb11ad3f0a13c82bf84bc895ce015d59bd7a6
                                                    • Instruction ID: 2b77d71ae02df194473727b2988d32b5a8f80dcb45851177a22c5de4e5a11be4
                                                    • Opcode Fuzzy Hash: 2d0374d158d3c1049c1b35f373edb11ad3f0a13c82bf84bc895ce015d59bd7a6
                                                    • Instruction Fuzzy Hash: 40E0E53090820EAADF00FE64CC21DFF77BAEF00300F8045D5AC14A6590DFB09A44CA90
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B937B6
                                                    • __localtime64.LIBCMT ref: 02B937C1
                                                      • Part of subcall function 02BA2600: __gmtime64_s.LIBCMT ref: 02BA2613
                                                    • std::exception::exception.LIBCMT ref: 02B937D9
                                                      • Part of subcall function 02BA24D3: std::exception::_Copy_str.LIBCMT ref: 02BA24EC
                                                      • Part of subcall function 02B9A528: __EH_prolog.LIBCMT ref: 02B9A52D
                                                      • Part of subcall function 02B9A528: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02B9A53C
                                                      • Part of subcall function 02B9A528: __CxxThrowException@8.LIBCMT ref: 02B9A55B
                                                    Strings
                                                    • could not convert calendar time to UTC time, xrefs: 02B937CE
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                    • String ID: could not convert calendar time to UTC time
                                                    • API String ID: 1963798777-2088861013
                                                    • Opcode ID: 5b0a9dae069346eaded9d40d097b3eb8e6b9f4e6a68172df725e1b98161d87a3
                                                    • Instruction ID: 198d3f88b73e6048d49d2e407f17bd38236dee7783b266ad76fd2da8add279d6
                                                    • Opcode Fuzzy Hash: 5b0a9dae069346eaded9d40d097b3eb8e6b9f4e6a68172df725e1b98161d87a3
                                                    • Instruction Fuzzy Hash: 02E06DB2D0520A9ACF12EFA4D8107FFB779EF04300F8085E9DC11A2640DBB986058F85
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(KERNEL32,00402E6A), ref: 0040315F
                                                    • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040316F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: IsProcessorFeaturePresent$KERNEL32
                                                    • API String ID: 1646373207-3105848591
                                                    • Opcode ID: ee4fb49231880130fc7adb82ded6e302562b2849836945389797dfa68bab57f4
                                                    • Instruction ID: 396ae008ee37b43aaac66eedf252cb0d6854bca9fd0baad0eaa83bc1c4717f20
                                                    • Opcode Fuzzy Hash: ee4fb49231880130fc7adb82ded6e302562b2849836945389797dfa68bab57f4
                                                    • Instruction Fuzzy Hash: 14C01270380B00A6EA201FB20F0AB2628AC1B48B03F1800BEA289F81C0CE7CC600843D
                                                    APIs
                                                    • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,0040403A), ref: 00404C3D
                                                    • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,0040403A), ref: 00404C61
                                                    • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,0040403A), ref: 00404C7B
                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,0040403A), ref: 00404D3C
                                                    • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,0040403A), ref: 00404D53
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual$FreeHeap
                                                    • String ID:
                                                    • API String ID: 714016831-0
                                                    • Opcode ID: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                    • Instruction ID: 583ec5426b209604bff2a02b3d2478297b9ba55a468d27544d52312baf66a8bd
                                                    • Opcode Fuzzy Hash: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                    • Instruction Fuzzy Hash: BC31E2B15417019BE3348F24EE44B22B7A0EBC8754F11863AE665B73E1EB78A844CB5C
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,00008000,00004000,74DEDFF0,?,00000000), ref: 00404696
                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004046F1
                                                    • HeapFree.KERNEL32(00000000,?), ref: 00404703
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Free$Virtual$Heap
                                                    • String ID: 4/@
                                                    • API String ID: 2016334554-3101945251
                                                    • Opcode ID: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                    • Instruction ID: 876bcf6037267374920b0e9be09a40bf20dde446c7cba65ee9efa19dd1b870bf
                                                    • Opcode Fuzzy Hash: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                    • Instruction Fuzzy Hash: 4AB18EB4A01205DFDB14CF44CAD0A69BBA1FB88314F25C1AEDA596F3A2D735ED41CB84
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AdjustPointer_memmove
                                                    • String ID:
                                                    • API String ID: 1721217611-0
                                                    • Opcode ID: 2b81ee3d4470d95ccf3635b9f02fe4dec99cc55358eb34753ae6f8d6c0714712
                                                    • Instruction ID: 8273d00956e0fda844591f3490fea98b690e776e7787650cfeacbbce9c8a84e7
                                                    • Opcode Fuzzy Hash: 2b81ee3d4470d95ccf3635b9f02fe4dec99cc55358eb34753ae6f8d6c0714712
                                                    • Instruction Fuzzy Hash: 5441B27660C3029FEB259E69D872BBA3BE5EF41354F24009FF8458A1D2DB71E580DB14
                                                    APIs
                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02B94149), ref: 02BA13BF
                                                      • Part of subcall function 02B93FDC: __EH_prolog.LIBCMT ref: 02B93FE1
                                                      • Part of subcall function 02B93FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02B93FF3
                                                    • CloseHandle.KERNEL32(00000000), ref: 02BA13B4
                                                    • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02B94149), ref: 02BA1400
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02B94149), ref: 02BA14D1
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandle$Event$CreateH_prolog
                                                    • String ID:
                                                    • API String ID: 2825413587-0
                                                    • Opcode ID: 9b4405169b1e82893508708f13612a8aa4563d3f439464602d9d62306cd338e4
                                                    • Instruction ID: 74e7a16b274962134fef8d5154e8e137018591c0779c207347a5d8eb7ffdd615
                                                    • Opcode Fuzzy Hash: 9b4405169b1e82893508708f13612a8aa4563d3f439464602d9d62306cd338e4
                                                    • Instruction Fuzzy Hash: 7351B0B16083059BDF11CF2CC894B9A77E4EF88368F1946A8E86D97290EB35D805CF91
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                    • String ID:
                                                    • API String ID: 2782032738-0
                                                    • Opcode ID: a9937a16b76c58c94b28bf15a68adb4139bcec099db716b101ad8f61a228703e
                                                    • Instruction ID: ad7fb56c442b61c625838251997ad331087d3b6dbb9a2f45f3ebef21e5307a43
                                                    • Opcode Fuzzy Hash: a9937a16b76c58c94b28bf15a68adb4139bcec099db716b101ad8f61a228703e
                                                    • Instruction Fuzzy Hash: 5B41A471B08706AFDB288FA9C8B096EB7E6EF44364B1481FDE415C7240E771E9458B50
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02BAFF4B
                                                    • __isleadbyte_l.LIBCMT ref: 02BAFF79
                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02BAFFA7
                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02BAFFDD
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: 4b7eefa3c262125802cbb401cdd253073147f59b99907343646ad1a5ac719a75
                                                    • Instruction ID: d8138d323c0a40fe18d9bfc2f61b98a22ed65a5070cc08ce96b5e363eaec7079
                                                    • Opcode Fuzzy Hash: 4b7eefa3c262125802cbb401cdd253073147f59b99907343646ad1a5ac719a75
                                                    • Instruction Fuzzy Hash: BE31433160A246AFDF218E34C854BFABBA6FF42354F1540A8F864C7590E733D851DB90
                                                    APIs
                                                    • htons.WS2_32(?), ref: 02B93DA2
                                                      • Part of subcall function 02B93BD3: __EH_prolog.LIBCMT ref: 02B93BD8
                                                      • Part of subcall function 02B93BD3: std::bad_exception::bad_exception.LIBCMT ref: 02B93BED
                                                    • htonl.WS2_32(00000000), ref: 02B93DB9
                                                    • htonl.WS2_32(00000000), ref: 02B93DC0
                                                    • htons.WS2_32(?), ref: 02B93DD4
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                    • String ID:
                                                    • API String ID: 3882411702-0
                                                    • Opcode ID: a49fc74bac03038da8b4c9e673e7e85d2bcc384cd15ce5702e05a2dda988dc22
                                                    • Instruction ID: b9bfbd798daef9cd10a3d736d33e495a69a739875f04f51874f0d3bd69ee7b35
                                                    • Opcode Fuzzy Hash: a49fc74bac03038da8b4c9e673e7e85d2bcc384cd15ce5702e05a2dda988dc22
                                                    • Instruction Fuzzy Hash: 1C118276900209EFCF019F64D885A5AB7B9EF49310F0084A6FC04DF205DB719A54DBA1
                                                    APIs
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02B923D0
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B923DE
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B92401
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B92408
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 4018804020-0
                                                    • Opcode ID: 5b88208c32dcb81b9cc9e6bfcc9ff22e11aee6f377efd48476667df57437c356
                                                    • Instruction ID: 287022b809d16a1ea7031b812243c4b4a4565a7971316de3caa0608640cc5e18
                                                    • Opcode Fuzzy Hash: 5b88208c32dcb81b9cc9e6bfcc9ff22e11aee6f377efd48476667df57437c356
                                                    • Instruction Fuzzy Hash: 1711CE72A40304AFEB119F60D884B6ABBB9FF41748F1044BDEA019B200DBB1F911DBA0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                    • String ID:
                                                    • API String ID: 3016257755-0
                                                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                    • Instruction ID: 7137e439c9114c76ccb318c8b034fb4bb0f0c1d76139ce26b3ffda169f81da23
                                                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                    • Instruction Fuzzy Hash: C5014B7200814AFBCF166E94DC618EE3F22BF08354B498596FE1859031D336D9B1AB81
                                                    APIs
                                                    • ___BuildCatchObject.LIBCMT ref: 02BABD44
                                                      • Part of subcall function 02BAC35B: ___AdjustPointer.LIBCMT ref: 02BAC3A4
                                                    • _UnwindNestedFrames.LIBCMT ref: 02BABD5B
                                                    • ___FrameUnwindToState.LIBCMT ref: 02BABD6D
                                                    • CallCatchBlock.LIBCMT ref: 02BABD91
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                    • String ID:
                                                    • API String ID: 2633735394-0
                                                    • Opcode ID: bf7e6a2e7c15418c5902c0973dae014681d9a77571f4c99d076f4f289f483f1c
                                                    • Instruction ID: b601d66cea08c0b82c9d3b23cb01ebf0ce9086e96cd8f8f46bdfaf552ac6ffd3
                                                    • Opcode Fuzzy Hash: bf7e6a2e7c15418c5902c0973dae014681d9a77571f4c99d076f4f289f483f1c
                                                    • Instruction Fuzzy Hash: A7011332004148BBCF126F55CC10EDA3FBAEF58758F058159FE6866120C772E861DFA0
                                                    APIs
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02B924A9
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B924B8
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B924CD
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B924D4
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 4018804020-0
                                                    • Opcode ID: abc373d519e39657ba803c54a0abaa589a5f67a5905af4ad02f5aefaf84f2c58
                                                    • Instruction ID: d44a31f52a12cc4b348150b908806cf21920ee91908b1e70908e6d99e5e209b3
                                                    • Opcode Fuzzy Hash: abc373d519e39657ba803c54a0abaa589a5f67a5905af4ad02f5aefaf84f2c58
                                                    • Instruction Fuzzy Hash: 42F04F72640205AFDB01AF69EC84F9ABBACFF45750F40846AFA04CB141DBB1E560CFA0
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B92009
                                                    • RtlDeleteCriticalSection.NTDLL(?), ref: 02B92028
                                                    • CloseHandle.KERNEL32(00000000), ref: 02B92037
                                                    • CloseHandle.KERNEL32(00000000), ref: 02B9204E
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                    • String ID:
                                                    • API String ID: 2456309408-0
                                                    • Opcode ID: 1294f60e8f1658df23289a62585bd8bd352a32280dbc00fe9b754a7e4d7a5215
                                                    • Instruction ID: eb0eba50339f7ea8a0ebdef05bcc2512279fc43a51e6eceb3f015505014a305b
                                                    • Opcode Fuzzy Hash: 1294f60e8f1658df23289a62585bd8bd352a32280dbc00fe9b754a7e4d7a5215
                                                    • Instruction Fuzzy Hash: 7C01D172800704ABCB36AF54E808BAAFBF4FF04304F4049AEE84683590DBB46548CF50
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Event$H_prologSleep
                                                    • String ID:
                                                    • API String ID: 1765829285-0
                                                    • Opcode ID: 9b69ee17e4ae93bf98bd286778d4d801de971dda3d2d2d64f9d4f2cda2bf77ac
                                                    • Instruction ID: d6edfbe2b69904f24ff75ee8f871890897ea708a7fa711246cd2f53a36992604
                                                    • Opcode Fuzzy Hash: 9b69ee17e4ae93bf98bd286778d4d801de971dda3d2d2d64f9d4f2cda2bf77ac
                                                    • Instruction Fuzzy Hash: 7DF05436640110DFCB019F94D8D8B98BBB4FF4D311F5081A9F51ADB390CBB59954DB51
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog_memmove
                                                    • String ID: &'
                                                    • API String ID: 3529519853-655172784
                                                    • Opcode ID: 26298bf39ad3955a5e3f3bcaffe5b2a81a937e368b923d5158f81336d11411f7
                                                    • Instruction ID: 7b04ebe00997d637d1584656ccf2ea7dac8453302fe8077e996b19679905edfa
                                                    • Opcode Fuzzy Hash: 26298bf39ad3955a5e3f3bcaffe5b2a81a937e368b923d5158f81336d11411f7
                                                    • Instruction Fuzzy Hash: F1615C71D00219DFDF20EFA4C981BADFBBAEF49310F1481AAD515AB290D770AA45CF61
                                                    APIs
                                                    • GetCPInfo.KERNEL32(?,00000000), ref: 00406043
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Info
                                                    • String ID: $
                                                    • API String ID: 1807457897-3032137957
                                                    • Opcode ID: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                    • Instruction ID: a42b242f0737112a64efb8245030e7df3adc9bcb2e8c8469847d94988edb9e3f
                                                    • Opcode Fuzzy Hash: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                    • Instruction Fuzzy Hash: 7B413731004158AEEB119754DD89BFB3FE9DB06700F1501F6D58BFB1D3C23949648BAA
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02B983D3,?,?,00000000), ref: 02B996D0
                                                    • getsockname.WS2_32(?,?,?), ref: 02B996E6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastgetsockname
                                                    • String ID: &'
                                                    • API String ID: 566540725-655172784
                                                    • Opcode ID: 5c26dbadc66d8e6f3e7e185df54059d6d8036dbda2aeb666a13ade4569ca594b
                                                    • Instruction ID: e81b3e22ea47a6b346ba89fd3b50be53dff4797cce134921d052bb92e68dfd0e
                                                    • Opcode Fuzzy Hash: 5c26dbadc66d8e6f3e7e185df54059d6d8036dbda2aeb666a13ade4569ca594b
                                                    • Instruction Fuzzy Hash: 62215172A052489BDB10DF68D844ACEB7F5FF48324F1185AAE918EB280EB74A9458B50
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9CCB4
                                                      • Part of subcall function 02B9D290: std::exception::exception.LIBCMT ref: 02B9D2BF
                                                      • Part of subcall function 02B9DA46: __EH_prolog.LIBCMT ref: 02B9DA4B
                                                      • Part of subcall function 02BA3B4C: _malloc.LIBCMT ref: 02BA3B64
                                                      • Part of subcall function 02B9D2EF: __EH_prolog.LIBCMT ref: 02B9D2F4
                                                    Strings
                                                    • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02B9CCEA
                                                    • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02B9CCF1
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$_mallocstd::exception::exception
                                                    • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                    • API String ID: 1953324306-1943798000
                                                    • Opcode ID: 844afb7cc372ba9d5cfe710885576dfc25853408cacf39fd746aa44886340a60
                                                    • Instruction ID: d99f17320b96823579c6ea202bbe234a0d02ac5949229dfc1618aa3b075bba21
                                                    • Opcode Fuzzy Hash: 844afb7cc372ba9d5cfe710885576dfc25853408cacf39fd746aa44886340a60
                                                    • Instruction Fuzzy Hash: 9B219C71E002599BDF14EBA8DA54BEEBBB9EF55704F0400EEE805AB240DBB05A04CF50
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9CDA9
                                                      • Part of subcall function 02B9D367: std::exception::exception.LIBCMT ref: 02B9D394
                                                      • Part of subcall function 02B9DB7D: __EH_prolog.LIBCMT ref: 02B9DB82
                                                      • Part of subcall function 02BA3B4C: _malloc.LIBCMT ref: 02BA3B64
                                                      • Part of subcall function 02B9D3C4: __EH_prolog.LIBCMT ref: 02B9D3C9
                                                    Strings
                                                    • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02B9CDDF
                                                    • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02B9CDE6
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$_mallocstd::exception::exception
                                                    • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                    • API String ID: 1953324306-412195191
                                                    • Opcode ID: fd95deccbad8229b7a2af714601fe7238055de878d388132a40fca0169b3c0a7
                                                    • Instruction ID: b7b2a1a6dc1d1a78fa7951c7c63ba64e481d64907f7afe97899a5a16e26492b4
                                                    • Opcode Fuzzy Hash: fd95deccbad8229b7a2af714601fe7238055de878d388132a40fca0169b3c0a7
                                                    • Instruction Fuzzy Hash: 54217E71E042589BDF14EFA4D454AEDFBB9EF49704F1444EDE846AB280DBB06A04CF90
                                                    APIs
                                                    • _malloc.LIBCMT ref: 02B9535D
                                                      • Part of subcall function 02BA2FAC: __FF_MSGBANNER.LIBCMT ref: 02BA2FC3
                                                      • Part of subcall function 02BA2FAC: __NMSG_WRITE.LIBCMT ref: 02BA2FCA
                                                      • Part of subcall function 02BA2FAC: RtlAllocateHeap.NTDLL(00710000,00000000,00000001), ref: 02BA2FEF
                                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02B9536F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateFolderHeapPathSpecial_malloc
                                                    • String ID: \save.dat
                                                    • API String ID: 4128168839-3580179773
                                                    • Opcode ID: f5356ccd534c58096d72c6d958f1fee819617ad34ec6a37e26f6dca6ef43bd7b
                                                    • Instruction ID: e7913d5a98343bdad80110deb6591c1f6ddab4890f074917b6cacf1ba5309d22
                                                    • Opcode Fuzzy Hash: f5356ccd534c58096d72c6d958f1fee819617ad34ec6a37e26f6dca6ef43bd7b
                                                    • Instruction Fuzzy Hash: 0F113A729082057BDB378E658C90EAFFFABDF82654B5441F9E84667201DBA20D02C7A0
                                                    APIs
                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe,00000104,?,00000000,?,?,?,?,00402F3E), ref: 00403978
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: FileModuleName
                                                    • String ID: C:\Users\user\AppData\Local\FFmpeg Smart GUI\ffmpegsmartgui32_64.exe$x5q
                                                    • API String ID: 514040917-3271329545
                                                    • Opcode ID: d19cce7575ed6d861219ae6d36446b8f64fb1756d8bebb839f01d6491cfa05e1
                                                    • Instruction ID: 9770bf3b923bf3f526403b81e464c5a22b29ad6242be3ce84e47a5001c686f92
                                                    • Opcode Fuzzy Hash: d19cce7575ed6d861219ae6d36446b8f64fb1756d8bebb839f01d6491cfa05e1
                                                    • Instruction Fuzzy Hash: 24113DB6900118BFD711EFA9DDC1C9B7BACEA45758B01027AF541F7281E6746E04CBA4
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9396A
                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 02B939C1
                                                      • Part of subcall function 02B91410: std::exception::exception.LIBCMT ref: 02B91428
                                                      • Part of subcall function 02B9A61E: __EH_prolog.LIBCMT ref: 02B9A623
                                                      • Part of subcall function 02B9A61E: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02B9A632
                                                      • Part of subcall function 02B9A61E: __CxxThrowException@8.LIBCMT ref: 02B9A651
                                                    Strings
                                                    • Day of month is not valid for year, xrefs: 02B939AC
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                    • String ID: Day of month is not valid for year
                                                    • API String ID: 1404951899-1521898139
                                                    • Opcode ID: 711c698e49e222ab77da6f5a42c3d473e7a7267022aa7fbbc0924c1d9a729b01
                                                    • Instruction ID: e63d5018dab0f70dea10ed1ca5bd121e49dd609405b6a492ed267469e8447c7c
                                                    • Opcode Fuzzy Hash: 711c698e49e222ab77da6f5a42c3d473e7a7267022aa7fbbc0924c1d9a729b01
                                                    • Instruction Fuzzy Hash: 3401D876920209AACF01EF94C801AFEB779FF18B10F4040AAFC0493300EB704B45CBA5
                                                    APIs
                                                    • std::exception::exception.LIBCMT ref: 02B9FB17
                                                    • __CxxThrowException@8.LIBCMT ref: 02B9FB2C
                                                      • Part of subcall function 02BA3B4C: _malloc.LIBCMT ref: 02BA3B64
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Exception@8Throw_mallocstd::exception::exception
                                                    • String ID: bad allocation
                                                    • API String ID: 4063778783-2104205924
                                                    • Opcode ID: 36d7ee3a3733cd4ab40af1da10471f3f49c3b7aea5c8ffd0101387e2f4b1e246
                                                    • Instruction ID: 6badb42fd4ca09ed4148120c0b40092902aee992fd3cb64f8d9d8642981c936f
                                                    • Opcode Fuzzy Hash: 36d7ee3a3733cd4ab40af1da10471f3f49c3b7aea5c8ffd0101387e2f4b1e246
                                                    • Instruction Fuzzy Hash: 59F0277060430AAA9F04FAA89C219FFB3EDDF00714F4006FAE821D3280EFB0F9408994
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B93C1B
                                                    • std::bad_exception::bad_exception.LIBCMT ref: 02B93C30
                                                      • Part of subcall function 02BA24B7: std::exception::exception.LIBCMT ref: 02BA24C1
                                                      • Part of subcall function 02B9A657: __EH_prolog.LIBCMT ref: 02B9A65C
                                                      • Part of subcall function 02B9A657: __CxxThrowException@8.LIBCMT ref: 02B9A685
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                    • String ID: bad cast
                                                    • API String ID: 1300498068-3145022300
                                                    • Opcode ID: 03f6c370fbf2b59dfccff85dc4d9608eb44ef5cb51b61490f2143604a47de46a
                                                    • Instruction ID: 6dad7ff8946db09b39ef3bc61dacac1b65ad31437da729657400ed64dd7bdbce
                                                    • Opcode Fuzzy Hash: 03f6c370fbf2b59dfccff85dc4d9608eb44ef5cb51b61490f2143604a47de46a
                                                    • Instruction Fuzzy Hash: BEF0E5329006088BCB1ADF58D450AFAB776EF51311F1040EEED065B350CBB29A46CB91
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B93886
                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 02B938A5
                                                      • Part of subcall function 02B91410: std::exception::exception.LIBCMT ref: 02B91428
                                                      • Part of subcall function 02B9898C: _memmove.LIBCMT ref: 02B989AC
                                                    Strings
                                                    • Day of month value is out of range 1..31, xrefs: 02B93894
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                    • String ID: Day of month value is out of range 1..31
                                                    • API String ID: 3258419250-1361117730
                                                    • Opcode ID: 05a63605efb9918696e9467754818e31705de51b0214628bfb7f6d7a9ed6904d
                                                    • Instruction ID: bce1bd32a4e3e9740da5dcc21a5cebc70682920899a8630e81dd5dbd868ac2f1
                                                    • Opcode Fuzzy Hash: 05a63605efb9918696e9467754818e31705de51b0214628bfb7f6d7a9ed6904d
                                                    • Instruction Fuzzy Hash: 4FE0D872A102045BDB25AB98CC117FDB7B9DF0CB10F4440DAE80263380DAF11944CFD5
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B938D2
                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 02B938F1
                                                      • Part of subcall function 02B91410: std::exception::exception.LIBCMT ref: 02B91428
                                                      • Part of subcall function 02B9898C: _memmove.LIBCMT ref: 02B989AC
                                                    Strings
                                                    • Year is out of valid range: 1400..10000, xrefs: 02B938E0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                    • String ID: Year is out of valid range: 1400..10000
                                                    • API String ID: 3258419250-2344417016
                                                    • Opcode ID: 9315de6baeac2facd6509db84e53355648033ad7da36cdbe409a36f2e579527a
                                                    • Instruction ID: ac6ac71fa2bd7b033f4ff92aed2f9c9993b01665ef330b3f3d19b0d017a28442
                                                    • Opcode Fuzzy Hash: 9315de6baeac2facd6509db84e53355648033ad7da36cdbe409a36f2e579527a
                                                    • Instruction Fuzzy Hash: 33E0D872B102055BDB25EB98CC117FDB7B9DF08710F0444DAE902672C0DAF11940CF95
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9391E
                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 02B9393D
                                                      • Part of subcall function 02B91410: std::exception::exception.LIBCMT ref: 02B91428
                                                      • Part of subcall function 02B9898C: _memmove.LIBCMT ref: 02B989AC
                                                    Strings
                                                    • Month number is out of range 1..12, xrefs: 02B9392C
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                    • String ID: Month number is out of range 1..12
                                                    • API String ID: 3258419250-4198407886
                                                    • Opcode ID: d27473b191dd8eb5bd0c6c55e8347a3a1f586010c2a3e057b468ce634b327636
                                                    • Instruction ID: ed6acc6cb11d15e32d272dc82325b22d3a99dfb3f4734c49b6ef5beb2227547b
                                                    • Opcode Fuzzy Hash: d27473b191dd8eb5bd0c6c55e8347a3a1f586010c2a3e057b468ce634b327636
                                                    • Instruction Fuzzy Hash: 8FE0D872A102089BDB25BB98CC117FDB7B9DF08710F0440DAE80263280DAF11940CFD5
                                                    APIs
                                                    • TlsAlloc.KERNEL32 ref: 02B919CC
                                                    • GetLastError.KERNEL32 ref: 02B919D9
                                                      • Part of subcall function 02B91712: __EH_prolog.LIBCMT ref: 02B91717
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocErrorH_prologLast
                                                    • String ID: tss
                                                    • API String ID: 249634027-1638339373
                                                    • Opcode ID: 6896a139e0d8fee3918137a83ccb81b8e83dfdebbf3ec731618565bf9cb8f60a
                                                    • Instruction ID: 3fde05776b2fe72792bf4eeb49d31220bab7f4aac40c8116402e2cecd7e4e5cb
                                                    • Opcode Fuzzy Hash: 6896a139e0d8fee3918137a83ccb81b8e83dfdebbf3ec731618565bf9cb8f60a
                                                    • Instruction Fuzzy Hash: DAE08632D142155BC6017B7CD80819BFBA49B85274F508BB7FDAD832D0EEB049109BD2
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B93BD8
                                                    • std::bad_exception::bad_exception.LIBCMT ref: 02B93BED
                                                      • Part of subcall function 02BA24B7: std::exception::exception.LIBCMT ref: 02BA24C1
                                                      • Part of subcall function 02B9A657: __EH_prolog.LIBCMT ref: 02B9A65C
                                                      • Part of subcall function 02B9A657: __CxxThrowException@8.LIBCMT ref: 02B9A685
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2907438967.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_ffmpegsmartgui32_64.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                    • String ID: bad cast
                                                    • API String ID: 1300498068-3145022300
                                                    • Opcode ID: 20f9de98ad39f46b4838d76e730bf587dff56b6319ebd6bcf22072973653db55
                                                    • Instruction ID: c75ed8ea45a45f12c5bb97de967a122a7e8dac7903a7a0bb73cf871604f011e5
                                                    • Opcode Fuzzy Hash: 20f9de98ad39f46b4838d76e730bf587dff56b6319ebd6bcf22072973653db55
                                                    • Instruction Fuzzy Hash: 88E012729002099BCB1AEF98D551BB9BBB2EF14305F5080E9ED0657790CBB65A46CB82
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32 ref: 0040215C
                                                    • GetModuleFileNameA.KERNEL32(00000000), ref: 0040260B
                                                    Strings
                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 0040D462
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: Module$FileHandleName
                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                    • API String ID: 4146042529-2036018995
                                                    • Opcode ID: 76ab3e3a85c627cba6681fe24a38b4c650a099f3d5d2f3cef96391b59eed7947
                                                    • Instruction ID: cac66732d6ed3f0f557f811cf847278d31df164b8b87644969f17de75c5c7756
                                                    • Opcode Fuzzy Hash: 76ab3e3a85c627cba6681fe24a38b4c650a099f3d5d2f3cef96391b59eed7947
                                                    • Instruction Fuzzy Hash: 26D0C7B5488505FAD24057A04F4DF7A7668A704301F31C177F613B11D1C6FC5949BA6F
                                                    APIs
                                                    • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404A98
                                                    • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404ACC
                                                    • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404AE6
                                                    • HeapFree.KERNEL32(00000000,?,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404AFD
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2906561451.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2906561451.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_ffmpegsmartgui32_64.jbxd
                                                    Similarity
                                                    • API ID: AllocHeap$FreeVirtual
                                                    • String ID:
                                                    • API String ID: 3499195154-0
                                                    • Opcode ID: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                    • Instruction ID: e2b6aa67baf941fda6b0a0502f281f3949fe5c10b928d307e266fea8edbc1969
                                                    • Opcode Fuzzy Hash: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                    • Instruction Fuzzy Hash: 1E1113B0201601EFC7208F19EE85E227BB5FB857217114A3AF692E65F1D770A845CB4C