Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1511441
MD5:16c1b3c872a490d259d8ccca7cedad11
SHA1:3d5ab5e1ad2270dfa7dba9328be6a0b8c867e908
SHA256:58dbc61b141b1ba5c957c2a4bf1036a8ff92135ecc88085925e7c2bace660860
Tags:exe
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Machine Learning detection for dropped file
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6796 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 16C1B3C872A490D259D8CCCA7CEDAD11)
    • file.tmp (PID: 3720 cmdline: "C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp" /SL5="$20428,3195553,56832,C:\Users\user\Desktop\file.exe" MD5: FAC4C28483FA3BE6BBCBB9544E768C0B)
      • freeprogramingtv32.exe (PID: 1800 cmdline: "C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe" -i MD5: EF7530E4B883531FD823363CAE0463A0)
  • cleanup
{"C2 list": ["beeyiuc.comC"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000002.00000002.2929265237.0000000002712000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: freeprogramingtv32.exe PID: 1800JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-09-15T13:55:54.665683+020020494671A Network Trojan was detected192.168.2.449736185.196.8.21480TCP
        2024-09-15T13:55:57.580967+020020494671A Network Trojan was detected192.168.2.449736185.196.8.21480TCP
        2024-09-15T13:55:57.932793+020020494671A Network Trojan was detected192.168.2.449736185.196.8.21480TCP
        2024-09-15T13:55:58.740593+020020494671A Network Trojan was detected192.168.2.449740185.196.8.21480TCP
        2024-09-15T13:55:59.548731+020020494671A Network Trojan was detected192.168.2.449741185.196.8.21480TCP
        2024-09-15T13:56:00.366296+020020494671A Network Trojan was detected192.168.2.449742185.196.8.21480TCP
        2024-09-15T13:56:01.201427+020020494671A Network Trojan was detected192.168.2.449743185.196.8.21480TCP
        2024-09-15T13:56:01.556782+020020494671A Network Trojan was detected192.168.2.449743185.196.8.21480TCP
        2024-09-15T13:56:02.370326+020020494671A Network Trojan was detected192.168.2.449744185.196.8.21480TCP
        2024-09-15T13:56:03.236756+020020494671A Network Trojan was detected192.168.2.449745185.196.8.21480TCP
        2024-09-15T13:56:03.581051+020020494671A Network Trojan was detected192.168.2.449745185.196.8.21480TCP
        2024-09-15T13:56:03.928369+020020494671A Network Trojan was detected192.168.2.449745185.196.8.21480TCP
        2024-09-15T13:56:04.742235+020020494671A Network Trojan was detected192.168.2.449746185.196.8.21480TCP
        2024-09-15T13:56:05.597968+020020494671A Network Trojan was detected192.168.2.449747185.196.8.21480TCP
        2024-09-15T13:56:06.424544+020020494671A Network Trojan was detected192.168.2.449748185.196.8.21480TCP
        2024-09-15T13:56:06.771344+020020494671A Network Trojan was detected192.168.2.449748185.196.8.21480TCP
        2024-09-15T13:56:07.590774+020020494671A Network Trojan was detected192.168.2.449749185.196.8.21480TCP
        2024-09-15T13:56:08.402041+020020494671A Network Trojan was detected192.168.2.449750185.196.8.21480TCP
        2024-09-15T13:56:09.212851+020020494671A Network Trojan was detected192.168.2.449751185.196.8.21480TCP
        2024-09-15T13:56:10.025953+020020494671A Network Trojan was detected192.168.2.449752185.196.8.21480TCP
        2024-09-15T13:56:10.840863+020020494671A Network Trojan was detected192.168.2.449753185.196.8.21480TCP
        2024-09-15T13:56:11.653919+020020494671A Network Trojan was detected192.168.2.449754185.196.8.21480TCP
        2024-09-15T13:56:12.479146+020020494671A Network Trojan was detected192.168.2.449755185.196.8.21480TCP
        2024-09-15T13:56:13.296919+020020494671A Network Trojan was detected192.168.2.449756185.196.8.21480TCP
        2024-09-15T13:56:13.652098+020020494671A Network Trojan was detected192.168.2.449756185.196.8.21480TCP
        2024-09-15T13:56:14.465756+020020494671A Network Trojan was detected192.168.2.449757185.196.8.21480TCP
        2024-09-15T13:56:15.303053+020020494671A Network Trojan was detected192.168.2.449758185.196.8.21480TCP
        2024-09-15T13:56:16.120176+020020494671A Network Trojan was detected192.168.2.449759185.196.8.21480TCP
        2024-09-15T13:56:16.928031+020020494671A Network Trojan was detected192.168.2.449760185.196.8.21480TCP
        2024-09-15T13:56:17.772303+020020494671A Network Trojan was detected192.168.2.449761185.196.8.21480TCP
        2024-09-15T13:56:18.615510+020020494671A Network Trojan was detected192.168.2.449762185.196.8.21480TCP
        2024-09-15T13:56:19.433862+020020494671A Network Trojan was detected192.168.2.449763185.196.8.21480TCP
        2024-09-15T13:56:20.247297+020020494671A Network Trojan was detected192.168.2.449764185.196.8.21480TCP
        2024-09-15T13:56:21.052795+020020494671A Network Trojan was detected192.168.2.449765185.196.8.21480TCP
        2024-09-15T13:56:21.876208+020020494671A Network Trojan was detected192.168.2.449766185.196.8.21480TCP
        2024-09-15T13:56:22.234210+020020494671A Network Trojan was detected192.168.2.449766185.196.8.21480TCP
        2024-09-15T13:56:22.583463+020020494671A Network Trojan was detected192.168.2.449766185.196.8.21480TCP
        2024-09-15T13:56:23.422809+020020494671A Network Trojan was detected192.168.2.449767185.196.8.21480TCP
        2024-09-15T13:56:23.785208+020020494671A Network Trojan was detected192.168.2.449767185.196.8.21480TCP
        2024-09-15T13:56:24.608723+020020494671A Network Trojan was detected192.168.2.449768185.196.8.21480TCP
        2024-09-15T13:56:24.958189+020020494671A Network Trojan was detected192.168.2.449768185.196.8.21480TCP
        2024-09-15T13:56:25.774256+020020494671A Network Trojan was detected192.168.2.449769185.196.8.21480TCP
        2024-09-15T13:56:26.595278+020020494671A Network Trojan was detected192.168.2.449770185.196.8.21480TCP
        2024-09-15T13:56:26.941466+020020494671A Network Trojan was detected192.168.2.449770185.196.8.21480TCP
        2024-09-15T13:56:27.290490+020020494671A Network Trojan was detected192.168.2.449770185.196.8.21480TCP
        2024-09-15T13:56:28.091523+020020494671A Network Trojan was detected192.168.2.449771185.196.8.21480TCP
        2024-09-15T13:56:28.906668+020020494671A Network Trojan was detected192.168.2.449772185.196.8.21480TCP
        2024-09-15T13:56:29.258690+020020494671A Network Trojan was detected192.168.2.449772185.196.8.21480TCP
        2024-09-15T13:56:30.081968+020020494671A Network Trojan was detected192.168.2.449773185.196.8.21480TCP
        2024-09-15T13:56:30.923177+020020494671A Network Trojan was detected192.168.2.449774185.196.8.21480TCP
        2024-09-15T13:56:31.279978+020020494671A Network Trojan was detected192.168.2.449774185.196.8.21480TCP
        2024-09-15T13:56:31.629543+020020494671A Network Trojan was detected192.168.2.449774185.196.8.21480TCP
        2024-09-15T13:56:32.451725+020020494671A Network Trojan was detected192.168.2.449775185.196.8.21480TCP
        2024-09-15T13:56:33.366497+020020494671A Network Trojan was detected192.168.2.449776185.196.8.21480TCP
        2024-09-15T13:56:34.200081+020020494671A Network Trojan was detected192.168.2.449777185.196.8.21480TCP
        2024-09-15T13:56:35.007645+020020494671A Network Trojan was detected192.168.2.449778185.196.8.21480TCP
        2024-09-15T13:56:35.896889+020020494671A Network Trojan was detected192.168.2.449779185.196.8.21480TCP
        2024-09-15T13:56:36.718667+020020494671A Network Trojan was detected192.168.2.449780185.196.8.21480TCP
        2024-09-15T13:56:37.068584+020020494671A Network Trojan was detected192.168.2.449780185.196.8.21480TCP
        2024-09-15T13:56:37.892510+020020494671A Network Trojan was detected192.168.2.449781185.196.8.21480TCP
        2024-09-15T13:56:38.735983+020020494671A Network Trojan was detected192.168.2.449782185.196.8.21480TCP
        2024-09-15T13:56:39.087427+020020494671A Network Trojan was detected192.168.2.449782185.196.8.21480TCP
        2024-09-15T13:56:39.932334+020020494671A Network Trojan was detected192.168.2.449783185.196.8.21480TCP
        2024-09-15T13:56:40.779893+020020494671A Network Trojan was detected192.168.2.449784185.196.8.21480TCP
        2024-09-15T13:56:41.595992+020020494671A Network Trojan was detected192.168.2.449785185.196.8.21480TCP
        2024-09-15T13:56:41.950046+020020494671A Network Trojan was detected192.168.2.449785185.196.8.21480TCP
        2024-09-15T13:56:42.793731+020020494671A Network Trojan was detected192.168.2.449786185.196.8.21480TCP
        2024-09-15T13:56:43.632048+020020494671A Network Trojan was detected192.168.2.449787185.196.8.21480TCP
        2024-09-15T13:56:44.464711+020020494671A Network Trojan was detected192.168.2.449788185.196.8.21480TCP
        2024-09-15T13:56:45.302301+020020494671A Network Trojan was detected192.168.2.449789185.196.8.21480TCP
        2024-09-15T13:56:46.126399+020020494671A Network Trojan was detected192.168.2.449790185.196.8.21480TCP
        2024-09-15T13:56:46.482038+020020494671A Network Trojan was detected192.168.2.449790185.196.8.21480TCP
        2024-09-15T13:56:47.293011+020020494671A Network Trojan was detected192.168.2.449791185.196.8.21480TCP
        2024-09-15T13:56:48.112792+020020494671A Network Trojan was detected192.168.2.449792185.196.8.21480TCP
        2024-09-15T13:56:48.933845+020020494671A Network Trojan was detected192.168.2.449793185.196.8.21480TCP
        2024-09-15T13:56:49.760762+020020494671A Network Trojan was detected192.168.2.449794185.196.8.21480TCP
        2024-09-15T13:56:50.578871+020020494671A Network Trojan was detected192.168.2.449795185.196.8.21480TCP
        2024-09-15T13:56:51.407828+020020494671A Network Trojan was detected192.168.2.449796185.196.8.21480TCP
        2024-09-15T13:56:51.759255+020020494671A Network Trojan was detected192.168.2.449796185.196.8.21480TCP
        2024-09-15T13:56:52.727965+020020494671A Network Trojan was detected192.168.2.449797185.196.8.21480TCP
        2024-09-15T13:56:53.592994+020020494671A Network Trojan was detected192.168.2.449798185.196.8.21480TCP
        2024-09-15T13:56:54.409471+020020494671A Network Trojan was detected192.168.2.449799185.196.8.21480TCP
        2024-09-15T13:56:55.229367+020020494671A Network Trojan was detected192.168.2.449800185.196.8.21480TCP
        2024-09-15T13:56:56.046244+020020494671A Network Trojan was detected192.168.2.449801185.196.8.21480TCP
        2024-09-15T13:56:57.144604+020020494671A Network Trojan was detected192.168.2.449802185.196.8.21480TCP
        2024-09-15T13:56:57.978961+020020494671A Network Trojan was detected192.168.2.449803185.196.8.21480TCP
        2024-09-15T13:56:58.821593+020020494671A Network Trojan was detected192.168.2.449804185.196.8.21480TCP
        2024-09-15T13:56:59.665656+020020494671A Network Trojan was detected192.168.2.449805185.196.8.21480TCP
        2024-09-15T13:57:00.485041+020020494671A Network Trojan was detected192.168.2.449806185.196.8.21480TCP
        2024-09-15T13:57:01.308009+020020494671A Network Trojan was detected192.168.2.449807185.196.8.21480TCP
        2024-09-15T13:57:02.154495+020020494671A Network Trojan was detected192.168.2.449808185.196.8.21480TCP
        2024-09-15T13:57:03.099744+020020494671A Network Trojan was detected192.168.2.449809185.196.8.21480TCP
        2024-09-15T13:57:03.934141+020020494671A Network Trojan was detected192.168.2.449810185.196.8.21480TCP
        2024-09-15T13:57:04.745497+020020494671A Network Trojan was detected192.168.2.449811185.196.8.21480TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-09-15T13:55:54.665683+020020501121A Network Trojan was detected192.168.2.449736185.196.8.21480TCP
        2024-09-15T13:55:57.580967+020020501121A Network Trojan was detected192.168.2.449736185.196.8.21480TCP
        2024-09-15T13:55:57.932793+020020501121A Network Trojan was detected192.168.2.449736185.196.8.21480TCP
        2024-09-15T13:55:58.740593+020020501121A Network Trojan was detected192.168.2.449740185.196.8.21480TCP
        2024-09-15T13:55:59.548731+020020501121A Network Trojan was detected192.168.2.449741185.196.8.21480TCP
        2024-09-15T13:56:00.366296+020020501121A Network Trojan was detected192.168.2.449742185.196.8.21480TCP
        2024-09-15T13:56:01.201427+020020501121A Network Trojan was detected192.168.2.449743185.196.8.21480TCP
        2024-09-15T13:56:01.556782+020020501121A Network Trojan was detected192.168.2.449743185.196.8.21480TCP
        2024-09-15T13:56:02.370326+020020501121A Network Trojan was detected192.168.2.449744185.196.8.21480TCP
        2024-09-15T13:56:03.236756+020020501121A Network Trojan was detected192.168.2.449745185.196.8.21480TCP
        2024-09-15T13:56:03.581051+020020501121A Network Trojan was detected192.168.2.449745185.196.8.21480TCP
        2024-09-15T13:56:03.928369+020020501121A Network Trojan was detected192.168.2.449745185.196.8.21480TCP
        2024-09-15T13:56:04.742235+020020501121A Network Trojan was detected192.168.2.449746185.196.8.21480TCP
        2024-09-15T13:56:05.597968+020020501121A Network Trojan was detected192.168.2.449747185.196.8.21480TCP
        2024-09-15T13:56:06.424544+020020501121A Network Trojan was detected192.168.2.449748185.196.8.21480TCP
        2024-09-15T13:56:06.771344+020020501121A Network Trojan was detected192.168.2.449748185.196.8.21480TCP
        2024-09-15T13:56:07.590774+020020501121A Network Trojan was detected192.168.2.449749185.196.8.21480TCP
        2024-09-15T13:56:08.402041+020020501121A Network Trojan was detected192.168.2.449750185.196.8.21480TCP
        2024-09-15T13:56:09.212851+020020501121A Network Trojan was detected192.168.2.449751185.196.8.21480TCP
        2024-09-15T13:56:10.025953+020020501121A Network Trojan was detected192.168.2.449752185.196.8.21480TCP
        2024-09-15T13:56:10.840863+020020501121A Network Trojan was detected192.168.2.449753185.196.8.21480TCP
        2024-09-15T13:56:11.653919+020020501121A Network Trojan was detected192.168.2.449754185.196.8.21480TCP
        2024-09-15T13:56:12.479146+020020501121A Network Trojan was detected192.168.2.449755185.196.8.21480TCP
        2024-09-15T13:56:13.296919+020020501121A Network Trojan was detected192.168.2.449756185.196.8.21480TCP
        2024-09-15T13:56:13.652098+020020501121A Network Trojan was detected192.168.2.449756185.196.8.21480TCP
        2024-09-15T13:56:14.465756+020020501121A Network Trojan was detected192.168.2.449757185.196.8.21480TCP
        2024-09-15T13:56:15.303053+020020501121A Network Trojan was detected192.168.2.449758185.196.8.21480TCP
        2024-09-15T13:56:16.120176+020020501121A Network Trojan was detected192.168.2.449759185.196.8.21480TCP
        2024-09-15T13:56:16.928031+020020501121A Network Trojan was detected192.168.2.449760185.196.8.21480TCP
        2024-09-15T13:56:17.772303+020020501121A Network Trojan was detected192.168.2.449761185.196.8.21480TCP
        2024-09-15T13:56:18.615510+020020501121A Network Trojan was detected192.168.2.449762185.196.8.21480TCP
        2024-09-15T13:56:19.433862+020020501121A Network Trojan was detected192.168.2.449763185.196.8.21480TCP
        2024-09-15T13:56:20.247297+020020501121A Network Trojan was detected192.168.2.449764185.196.8.21480TCP
        2024-09-15T13:56:21.052795+020020501121A Network Trojan was detected192.168.2.449765185.196.8.21480TCP
        2024-09-15T13:56:21.876208+020020501121A Network Trojan was detected192.168.2.449766185.196.8.21480TCP
        2024-09-15T13:56:22.234210+020020501121A Network Trojan was detected192.168.2.449766185.196.8.21480TCP
        2024-09-15T13:56:22.583463+020020501121A Network Trojan was detected192.168.2.449766185.196.8.21480TCP
        2024-09-15T13:56:23.422809+020020501121A Network Trojan was detected192.168.2.449767185.196.8.21480TCP
        2024-09-15T13:56:23.785208+020020501121A Network Trojan was detected192.168.2.449767185.196.8.21480TCP
        2024-09-15T13:56:24.608723+020020501121A Network Trojan was detected192.168.2.449768185.196.8.21480TCP
        2024-09-15T13:56:24.958189+020020501121A Network Trojan was detected192.168.2.449768185.196.8.21480TCP
        2024-09-15T13:56:25.774256+020020501121A Network Trojan was detected192.168.2.449769185.196.8.21480TCP
        2024-09-15T13:56:26.595278+020020501121A Network Trojan was detected192.168.2.449770185.196.8.21480TCP
        2024-09-15T13:56:26.941466+020020501121A Network Trojan was detected192.168.2.449770185.196.8.21480TCP
        2024-09-15T13:56:27.290490+020020501121A Network Trojan was detected192.168.2.449770185.196.8.21480TCP
        2024-09-15T13:56:28.091523+020020501121A Network Trojan was detected192.168.2.449771185.196.8.21480TCP
        2024-09-15T13:56:28.906668+020020501121A Network Trojan was detected192.168.2.449772185.196.8.21480TCP
        2024-09-15T13:56:29.258690+020020501121A Network Trojan was detected192.168.2.449772185.196.8.21480TCP
        2024-09-15T13:56:30.081968+020020501121A Network Trojan was detected192.168.2.449773185.196.8.21480TCP
        2024-09-15T13:56:30.923177+020020501121A Network Trojan was detected192.168.2.449774185.196.8.21480TCP
        2024-09-15T13:56:31.279978+020020501121A Network Trojan was detected192.168.2.449774185.196.8.21480TCP
        2024-09-15T13:56:31.629543+020020501121A Network Trojan was detected192.168.2.449774185.196.8.21480TCP
        2024-09-15T13:56:32.451725+020020501121A Network Trojan was detected192.168.2.449775185.196.8.21480TCP
        2024-09-15T13:56:33.366497+020020501121A Network Trojan was detected192.168.2.449776185.196.8.21480TCP
        2024-09-15T13:56:34.200081+020020501121A Network Trojan was detected192.168.2.449777185.196.8.21480TCP
        2024-09-15T13:56:35.007645+020020501121A Network Trojan was detected192.168.2.449778185.196.8.21480TCP
        2024-09-15T13:56:35.896889+020020501121A Network Trojan was detected192.168.2.449779185.196.8.21480TCP
        2024-09-15T13:56:36.718667+020020501121A Network Trojan was detected192.168.2.449780185.196.8.21480TCP
        2024-09-15T13:56:37.068584+020020501121A Network Trojan was detected192.168.2.449780185.196.8.21480TCP
        2024-09-15T13:56:37.892510+020020501121A Network Trojan was detected192.168.2.449781185.196.8.21480TCP
        2024-09-15T13:56:38.735983+020020501121A Network Trojan was detected192.168.2.449782185.196.8.21480TCP
        2024-09-15T13:56:39.087427+020020501121A Network Trojan was detected192.168.2.449782185.196.8.21480TCP
        2024-09-15T13:56:39.932334+020020501121A Network Trojan was detected192.168.2.449783185.196.8.21480TCP
        2024-09-15T13:56:40.779893+020020501121A Network Trojan was detected192.168.2.449784185.196.8.21480TCP
        2024-09-15T13:56:41.595992+020020501121A Network Trojan was detected192.168.2.449785185.196.8.21480TCP
        2024-09-15T13:56:41.950046+020020501121A Network Trojan was detected192.168.2.449785185.196.8.21480TCP
        2024-09-15T13:56:42.793731+020020501121A Network Trojan was detected192.168.2.449786185.196.8.21480TCP
        2024-09-15T13:56:43.632048+020020501121A Network Trojan was detected192.168.2.449787185.196.8.21480TCP
        2024-09-15T13:56:44.464711+020020501121A Network Trojan was detected192.168.2.449788185.196.8.21480TCP
        2024-09-15T13:56:45.302301+020020501121A Network Trojan was detected192.168.2.449789185.196.8.21480TCP
        2024-09-15T13:56:46.126399+020020501121A Network Trojan was detected192.168.2.449790185.196.8.21480TCP
        2024-09-15T13:56:46.482038+020020501121A Network Trojan was detected192.168.2.449790185.196.8.21480TCP
        2024-09-15T13:56:47.293011+020020501121A Network Trojan was detected192.168.2.449791185.196.8.21480TCP
        2024-09-15T13:56:48.112792+020020501121A Network Trojan was detected192.168.2.449792185.196.8.21480TCP
        2024-09-15T13:56:48.933845+020020501121A Network Trojan was detected192.168.2.449793185.196.8.21480TCP
        2024-09-15T13:56:49.760762+020020501121A Network Trojan was detected192.168.2.449794185.196.8.21480TCP
        2024-09-15T13:56:50.578871+020020501121A Network Trojan was detected192.168.2.449795185.196.8.21480TCP
        2024-09-15T13:56:51.407828+020020501121A Network Trojan was detected192.168.2.449796185.196.8.21480TCP
        2024-09-15T13:56:51.759255+020020501121A Network Trojan was detected192.168.2.449796185.196.8.21480TCP
        2024-09-15T13:56:52.727965+020020501121A Network Trojan was detected192.168.2.449797185.196.8.21480TCP
        2024-09-15T13:56:53.592994+020020501121A Network Trojan was detected192.168.2.449798185.196.8.21480TCP
        2024-09-15T13:56:54.409471+020020501121A Network Trojan was detected192.168.2.449799185.196.8.21480TCP
        2024-09-15T13:56:55.229367+020020501121A Network Trojan was detected192.168.2.449800185.196.8.21480TCP
        2024-09-15T13:56:56.046244+020020501121A Network Trojan was detected192.168.2.449801185.196.8.21480TCP
        2024-09-15T13:56:57.144604+020020501121A Network Trojan was detected192.168.2.449802185.196.8.21480TCP
        2024-09-15T13:56:57.978961+020020501121A Network Trojan was detected192.168.2.449803185.196.8.21480TCP
        2024-09-15T13:56:58.821593+020020501121A Network Trojan was detected192.168.2.449804185.196.8.21480TCP
        2024-09-15T13:56:59.665656+020020501121A Network Trojan was detected192.168.2.449805185.196.8.21480TCP
        2024-09-15T13:57:00.485041+020020501121A Network Trojan was detected192.168.2.449806185.196.8.21480TCP
        2024-09-15T13:57:01.308009+020020501121A Network Trojan was detected192.168.2.449807185.196.8.21480TCP
        2024-09-15T13:57:02.154495+020020501121A Network Trojan was detected192.168.2.449808185.196.8.21480TCP
        2024-09-15T13:57:03.099744+020020501121A Network Trojan was detected192.168.2.449809185.196.8.21480TCP
        2024-09-15T13:57:03.934141+020020501121A Network Trojan was detected192.168.2.449810185.196.8.21480TCP
        2024-09-15T13:57:04.745497+020020501121A Network Trojan was detected192.168.2.449811185.196.8.21480TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: freeprogramingtv32.exe.1800.2.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["beeyiuc.comC"]}
        Source: http://185.196.8.214/Virustotal: Detection: 11%Perma Link
        Source: C:\ProgramData\DPI Analog Input 9.15.45\DPI Analog Input 9.15.45.exeVirustotal: Detection: 34%Perma Link
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeVirustotal: Detection: 34%Perma Link
        Source: file.exeVirustotal: Detection: 26%Perma Link
        Source: file.exeReversingLabs: Detection: 15%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeJoe Sandbox ML: detected
        Source: C:\ProgramData\DPI Analog Input 9.15.45\DPI Analog Input 9.15.45.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0045D188 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D188
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0045D254 ArcFourCrypt,1_2_0045D254
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0045D23C ArcFourCrypt,1_2_0045D23C
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeUnpacked PE file: 2.2.freeprogramingtv32.exe.400000.0.unpack
        Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Free Programing TV_is1Jump to behavior
        Source: Binary string: msvcp71.pdbx# source: is-UFCL6.tmp.1.dr
        Source: Binary string: msvcr71.pdb< source: is-KSEJR.tmp.1.dr
        Source: Binary string: F:\Temp\openssl-1.1.1t\libssl-1_1.pdb source: is-UF6SG.tmp.1.dr
        Source: Binary string: msvcp71.pdb source: is-UFCL6.tmp.1.dr
        Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: file.tmp, 00000001.00000002.2929154321.0000000002403000.00000002.00000001.01000000.00000007.sdmp, file.tmp, 00000001.00000003.1683500134.00000000021E8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000003.1683406129.0000000003120000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.dr
        Source: Binary string: msvcr71.pdb source: is-KSEJR.tmp.1.dr
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004750DC FindFirstFileA,FindNextFileA,FindClose,1_2_004750DC
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004981F8 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004981F8
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49791 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49750 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49791 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49750 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49752 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49752 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49758 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49758 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49777 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49777 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49774 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49749 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49774 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49770 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49763 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49763 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49749 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49795 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49795 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49783 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49783 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49767 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49767 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49798 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49798 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49761 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49761 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49754 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49754 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49736 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49736 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49770 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49796 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49756 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49756 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49759 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49796 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49759 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49746 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49746 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49780 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49794 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49743 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49794 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49743 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49780 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49744 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49744 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49801 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49801 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49747 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49747 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49781 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49781 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49769 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49786 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49786 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49753 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49753 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49800 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49800 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49748 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49748 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49751 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49751 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49784 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49742 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49784 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49742 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49799 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49757 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49757 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49788 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49788 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49755 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49764 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49764 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49785 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49799 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49762 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49785 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49762 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49765 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49765 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49768 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49768 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49755 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49769 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49792 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49760 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49760 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49792 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49790 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49790 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49779 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49779 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49782 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49782 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49740 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49740 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49775 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49775 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49773 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49793 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49793 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49773 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49778 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49778 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49771 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49771 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49789 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49789 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49766 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49766 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49804 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49804 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49787 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49787 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49811 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49811 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49809 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49809 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49772 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49772 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49807 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49807 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49802 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49802 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49805 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49805 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49797 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49797 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49808 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49808 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49810 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49810 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49776 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49776 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49741 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49741 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49745 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49745 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49803 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49803 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49806 -> 185.196.8.214:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49806 -> 185.196.8.214:80
        Source: Malware configuration extractorURLs: beeyiuc.comC
        Source: global trafficTCP traffic: 192.168.2.4:49737 -> 195.154.173.35:2023
        Source: Joe Sandbox ViewIP Address: 185.196.8.214 185.196.8.214
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf915c0ee969c3a HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownUDP traffic detected without corresponding DNS query: 152.89.198.214
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02B972A7 Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_free,2_2_02B972A7
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf915c0ee969c3a HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1Host: beeyiuc.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: beeyiuc.com
        Source: freeprogramingtv32.exe, 00000002.00000002.2928475941.00000000008CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.196.8.214/
        Source: freeprogramingtv32.exe, 00000002.00000002.2928475941.00000000008A7000.00000004.00000020.00020000.00000000.sdmp, freeprogramingtv32.exe, 00000002.00000002.2928475941.00000000008E5000.00000004.00000020.00020000.00000000.sdmp, freeprogramingtv32.exe, 00000002.00000002.2929636913.0000000003520000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee90824
        Source: freeprogramingtv32.exe, 00000002.00000002.2928475941.00000000008DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df1
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://crl.certum.pl/cscasha2.crl0q
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
        Source: is-UF6SG.tmp.1.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
        Source: is-UF6SG.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
        Source: is-UF6SG.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
        Source: is-UF6SG.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
        Source: is-UF6SG.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
        Source: is-UF6SG.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
        Source: is-UF6SG.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://cscasha2.ocsp-certum.com04
        Source: is-UF6SG.tmp.1.drString found in binary or memory: http://ocsp.comodoca.com0
        Source: is-UF6SG.tmp.1.drString found in binary or memory: http://ocsp.sectigo.com0
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://ocsp.thawte.com0
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://repository.certum.pl/cscasha2.cer0
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://repository.certum.pl/ctnca.cer09
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://s.symcd.com06
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://subca.ocsp-certum.com01
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://www.certum.pl/CPS0
        Source: file.tmp, file.tmp, 00000001.00000000.1682543962.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-2N406.tmp.1.drString found in binary or memory: http://www.innosetup.com/
        Source: file.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
        Source: file.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: http://www.openssl.org/f
        Source: is-QTH1O.tmp.1.drString found in binary or memory: http://www.openssl.org/support/faq.html
        Source: file.exe, 00000000.00000003.1682031648.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.1681578774.00000000024C0000.00000004.00001000.00020000.00000000.sdmp, file.tmp, file.tmp, 00000001.00000000.1682543962.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-2N406.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
        Source: file.exe, 00000000.00000003.1682031648.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.1681578774.00000000024C0000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000000.1682543962.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-2N406.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: https://d.symcb.com/cps0%
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0.
        Source: is-UF6SG.tmp.1.drString found in binary or memory: https://sectigo.com/CPS0
        Source: is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drString found in binary or memory: https://www.certum.pl/CPS0
        Source: is-UF6SG.tmp.1.drString found in binary or memory: https://www.openssl.org/H
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0042F520 NtdllDefWindowProc_A,1_2_0042F520
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00423B84 NtdllDefWindowProc_A,1_2_00423B84
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004125D8 NtdllDefWindowProc_A,1_2_004125D8
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00478C14 NtdllDefWindowProc_A,1_2_00478C14
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00457594 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_00457594
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0042E934: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E934
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040840C0_2_0040840C
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004707F81_2_004707F8
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00480B4B1_2_00480B4B
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004352C81_2_004352C8
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004673A41_2_004673A4
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0048E0A81_2_0048E0A8
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0043035C1_2_0043035C
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004444C81_2_004444C8
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004345C41_2_004345C4
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00444A701_2_00444A70
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00486D241_2_00486D24
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00430EE81_2_00430EE8
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0045F0C41_2_0045F0C4
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004451681_2_00445168
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0045B1741_2_0045B174
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004694201_2_00469420
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004455741_2_00445574
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004519BC1_2_004519BC
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00487C841_2_00487C84
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0043DD501_2_0043DD50
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_024012601_2_02401260
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_02401D201_2_02401D20
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_004010512_2_00401051
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_00401C262_2_00401C26
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BCBCEB2_2_02BCBCEB
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BCBD582_2_02BCBD58
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BAE18D2_2_02BAE18D
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BA9E842_2_02BA9E84
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BB4E292_2_02BB4E29
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02B9EFAD2_2_02B9EFAD
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BADC992_2_02BADC99
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BAAC3A2_2_02BAAC3A
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BA84422_2_02BA8442
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BB2DB42_2_02BB2DB4
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BAE5A52_2_02BAE5A5
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: String function: 02BB5330 appears 138 times
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: String function: 02BA8AE0 appears 37 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 00408C0C appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 00406AC4 appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 0040595C appears 117 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 00457F1C appears 73 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 00403400 appears 60 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 00445DD4 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 00457D10 appears 98 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 004344DC appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 004078F4 appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 00403494 appears 83 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 00403684 appears 225 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 00453344 appears 97 times
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: String function: 004460A4 appears 59 times
        Source: file.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: file.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: file.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-2N406.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-2N406.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-2N406.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-3AOSI.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: file.exe, 00000000.00000003.1682031648.00000000021C8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
        Source: file.exe, 00000000.00000003.1681578774.00000000024C0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
        Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: freeprogramingtv32.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: DPI Analog Input 9.15.45.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/27@1/2
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BA08B8 FormatMessageA,GetLastError,2_2_02BA08B8
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00455E0C GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455E0C
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: CreateServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_0040265E
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0046E13C GetVersion,CoCreateInstance,1_2_0046E13C
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409C34 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409C34
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_004021E9 StartServiceCtrlDispatcherA,2_2_004021E9
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_004021E9 StartServiceCtrlDispatcherA,2_2_004021E9
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: file.exeVirustotal: Detection: 26%
        Source: file.exeReversingLabs: Detection: 15%
        Source: file.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
        Source: file.exeString found in binary or memory: /LOADINF="filename"
        Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp "C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp" /SL5="$20428,3195553,56832,C:\Users\user\Desktop\file.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess created: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe "C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe" -i
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp "C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp" /SL5="$20428,3195553,56832,C:\Users\user\Desktop\file.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess created: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe "C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe" -iJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: dsound.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Free Programing TV_is1Jump to behavior
        Source: file.exeStatic file information: File size 3466709 > 1048576
        Source: Binary string: msvcp71.pdbx# source: is-UFCL6.tmp.1.dr
        Source: Binary string: msvcr71.pdb< source: is-KSEJR.tmp.1.dr
        Source: Binary string: F:\Temp\openssl-1.1.1t\libssl-1_1.pdb source: is-UF6SG.tmp.1.dr
        Source: Binary string: msvcp71.pdb source: is-UFCL6.tmp.1.dr
        Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: file.tmp, 00000001.00000002.2929154321.0000000002403000.00000002.00000001.01000000.00000007.sdmp, file.tmp, 00000001.00000003.1683500134.00000000021E8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000003.1683406129.0000000003120000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.1.dr
        Source: Binary string: msvcr71.pdb source: is-KSEJR.tmp.1.dr

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeUnpacked PE file: 2.2.freeprogramingtv32.exe.400000.0.unpack .text:ER;_creg_9:R;_dreg_9:W;.rsrc:R;_ereg_9:EW; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeUnpacked PE file: 2.2.freeprogramingtv32.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
        Source: freeprogramingtv32.exe.1.drStatic PE information: section name: _creg_9
        Source: freeprogramingtv32.exe.1.drStatic PE information: section name: _dreg_9
        Source: freeprogramingtv32.exe.1.drStatic PE information: section name: _ereg_9
        Source: is-3AOSI.tmp.1.drStatic PE information: section name: .eh_fram
        Source: DPI Analog Input 9.15.45.exe.2.drStatic PE information: section name: _creg_9
        Source: DPI Analog Input 9.15.45.exe.2.drStatic PE information: section name: _dreg_9
        Source: DPI Analog Input 9.15.45.exe.2.drStatic PE information: section name: _ereg_9
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004065C8 push 00406605h; ret 0_2_004065FD
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004840DC push 004841EAh; ret 1_2_004841E2
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0040994C push 00409989h; ret 1_2_00409981
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004062B4 push ecx; mov dword ptr [esp], eax1_2_004062B5
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004104E0 push ecx; mov dword ptr [esp], edx1_2_004104E5
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00412928 push 0041298Bh; ret 1_2_00412983
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00494E00 push ecx; mov dword ptr [esp], ecx1_2_00494E05
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0040CE38 push ecx; mov dword ptr [esp], edx1_2_0040CE3A
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004592D0 push 00459314h; ret 1_2_0045930C
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0040F398 push ecx; mov dword ptr [esp], edx1_2_0040F39A
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00443440 push ecx; mov dword ptr [esp], ecx1_2_00443444
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004857CC push ecx; mov dword ptr [esp], ecx1_2_004857D1
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004517F8 push 0045182Bh; ret 1_2_00451823
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004519BC push ecx; mov dword ptr [esp], eax1_2_004519C1
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00477C5C push ecx; mov dword ptr [esp], edx1_2_00477C5D
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00419C28 push ecx; mov dword ptr [esp], ecx1_2_00419C2D
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0045FD1C push ecx; mov dword ptr [esp], ecx1_2_0045FD20
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00499D30 pushad ; retf 1_2_00499D3F
        Source: freeprogramingtv32.exe.1.drStatic PE information: section name: .text entropy: 7.760848310830026
        Source: DPI Analog Input 9.15.45.exe.2.drStatic PE information: section name: .text entropy: 7.760848310830026

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02B9F7D6
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\is-UFCL6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\msvcr71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\is-2N406.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\libeay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\ssleay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\is-KSEJR.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeFile created: C:\ProgramData\DPI Analog Input 9.15.45\DPI Analog Input 9.15.45.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\is-QTH1O.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-RAKJO.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\is-3AOSI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\is-ID0G0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\libssl-1_1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-RAKJO.tmp\_isetup\_isdecmp.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\is-UF6SG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-RAKJO.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\Qt5OpenGL.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Free Programing TV\msvcp71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-RAKJO.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeFile created: C:\ProgramData\DPI Analog Input 9.15.45\DPI Analog Input 9.15.45.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02B9F7D6
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_004021E9 StartServiceCtrlDispatcherA,2_2_004021E9
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004241DC IsIconic,SetActiveWindow,SetFocus,1_2_004241DC
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00424194 IsIconic,SetActiveWindow,1_2_00424194
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00418384 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418384
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0042285C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042285C
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00417598 IsIconic,GetCapture,1_2_00417598
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00483A90 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_00483A90
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00417CCE IsIconic,SetWindowPos,1_2_00417CCE
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00417CD0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CD0
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0041F118 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F118
        Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_00401B4B
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_02B9F8DA
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeWindow / User API: threadDelayed 5889Jump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeWindow / User API: threadDelayed 3964Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\is-UFCL6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\msvcr71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\is-2N406.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\libeay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\ssleay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\is-KSEJR.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\is-QTH1O.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-RAKJO.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\is-3AOSI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\is-ID0G0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\libssl-1_1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-RAKJO.tmp\_isetup\_isdecmp.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\is-UF6SG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-RAKJO.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\Qt5OpenGL.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Free Programing TV\msvcp71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-RAKJO.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5972
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-20149
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe TID: 2832Thread sleep count: 5889 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe TID: 2832Thread sleep time: -11778000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe TID: 708Thread sleep count: 64 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe TID: 708Thread sleep time: -3840000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe TID: 2832Thread sleep count: 3964 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe TID: 2832Thread sleep time: -7928000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004750DC FindFirstFileA,FindNextFileA,FindClose,1_2_004750DC
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004981F8 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004981F8
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409B78 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B78
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeThread delayed: delay time: 60000Jump to behavior
        Source: freeprogramingtv32.exe, 00000002.00000002.2928475941.00000000007F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
        Source: freeprogramingtv32.exe, 00000002.00000002.2928475941.00000000008E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: freeprogramingtv32.exe, 00000002.00000002.2928475941.00000000008E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW6;
        Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-6769
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeAPI call chain: ExitProcess graph end nodegraph_2-20444
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BB00FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02BB00FE
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BB00FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02BB00FE
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02B96487 RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,2_2_02B96487
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BA9468 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_02BA9468
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_00478658 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478658
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0042E09C AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E09C
        Source: C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exeCode function: 2_2_02BA7FAD cpuid 2_2_02BA7FAD
        Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,0_2_0040520C
        Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,0_2_00405258
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: GetLocaleInfoA,1_2_00408568
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: GetLocaleInfoA,1_2_004085B4
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_004585C8 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_004585C8
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmpCode function: 1_2_0045559C GetUserNameA,1_2_0045559C
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405CF4 GetVersionExA,0_2_00405CF4

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2929265237.0000000002712000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: freeprogramingtv32.exe PID: 1800, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2929265237.0000000002712000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: freeprogramingtv32.exe PID: 1800, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Command and Scripting Interpreter
        5
        Windows Service
        1
        DLL Side-Loading
        3
        Obfuscated Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        Service Execution
        1
        Bootkit
        1
        Access Token Manipulation
        22
        Software Packing
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook5
        Windows Service
        1
        DLL Side-Loading
        NTDS35
        System Information Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
        Process Injection
        1
        Masquerading
        LSA Secrets141
        Security Software Discovery
        SSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Access Token Manipulation
        DCSync21
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
        Process Injection
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Bootkit
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
        Remote System Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        System Network Configuration Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        file.exe26%VirustotalBrowse
        file.exe16%ReversingLabsWin32.Trojan.Munp
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe100%Joe Sandbox ML
        C:\ProgramData\DPI Analog Input 9.15.45\DPI Analog Input 9.15.45.exe100%Joe Sandbox ML
        C:\ProgramData\DPI Analog Input 9.15.45\DPI Analog Input 9.15.45.exe34%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\Qt5OpenGL.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Free Programing TV\Qt5OpenGL.dll (copy)0%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe34%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\is-3AOSI.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Free Programing TV\is-3AOSI.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\is-ID0G0.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Free Programing TV\is-ID0G0.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\is-KSEJR.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Free Programing TV\is-KSEJR.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\is-QTH1O.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Free Programing TV\is-QTH1O.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\is-UF6SG.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Free Programing TV\is-UF6SG.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\is-UFCL6.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Free Programing TV\is-UFCL6.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\libeay32.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Free Programing TV\libeay32.dll (copy)0%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\libssl-1_1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Free Programing TV\libssl-1_1.dll (copy)0%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\msvcp71.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Free Programing TV\msvcp71.dll (copy)0%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\msvcr71.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Free Programing TV\msvcr71.dll (copy)0%VirustotalBrowse
        C:\Users\user\AppData\Local\Free Programing TV\ssleay32.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Free Programing TV\ssleay32.dll (copy)0%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://sectigo.com/CPS00%URL Reputationsafe
        http://ocsp.sectigo.com00%URL Reputationsafe
        http://ocsp.thawte.com00%URL Reputationsafe
        http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
        http://www.innosetup.com/0%Avira URL Cloudsafe
        http://185.196.8.214/0%Avira URL Cloudsafe
        http://repository.certum.pl/cscasha2.cer00%Avira URL Cloudsafe
        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%Avira URL Cloudsafe
        http://repository.certum.pl/ctnca.cer090%Avira URL Cloudsafe
        http://crl.certum.pl/ctnca.crl0k0%Avira URL Cloudsafe
        http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU0%Avira URL Cloudsafe
        http://repository.certum.pl/ctnca.cer090%VirustotalBrowse
        http://repository.certum.pl/cscasha2.cer00%VirustotalBrowse
        http://www.innosetup.com/1%VirustotalBrowse
        http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%Avira URL Cloudsafe
        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%VirustotalBrowse
        http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU0%VirustotalBrowse
        http://185.196.8.214/11%VirustotalBrowse
        http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline0%Avira URL Cloudsafe
        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%Avira URL Cloudsafe
        http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%VirustotalBrowse
        http://crl.certum.pl/cscasha2.crl0q0%Avira URL Cloudsafe
        https://www.certum.pl/CPS00%Avira URL Cloudsafe
        http://cscasha2.ocsp-certum.com040%Avira URL Cloudsafe
        http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline0%VirustotalBrowse
        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%VirustotalBrowse
        http://www.openssl.org/support/faq.html0%Avira URL Cloudsafe
        http://beeyiuc.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf915c0ee969c3a0%Avira URL Cloudsafe
        http://crl.certum.pl/ctnca.crl0k0%VirustotalBrowse
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%Avira URL Cloudsafe
        https://www.certum.pl/CPS00%VirustotalBrowse
        http://www.openssl.org/support/faq.html0%VirustotalBrowse
        http://www.remobjects.com/psU0%Avira URL Cloudsafe
        http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908240%Avira URL Cloudsafe
        http://crl.certum.pl/cscasha2.crl0q0%VirustotalBrowse
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%Avira URL Cloudsafe
        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%Avira URL Cloudsafe
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%VirustotalBrowse
        http://subca.ocsp-certum.com010%Avira URL Cloudsafe
        http://www.remobjects.com/psU0%VirustotalBrowse
        https://www.openssl.org/H0%Avira URL Cloudsafe
        http://www.remobjects.com/ps0%Avira URL Cloudsafe
        http://beeyiuc.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c90170%Avira URL Cloudsafe
        https://www.openssl.org/H0%VirustotalBrowse
        http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df10%Avira URL Cloudsafe
        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%VirustotalBrowse
        beeyiuc.comC0%Avira URL Cloudsafe
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%VirustotalBrowse
        http://www.openssl.org/f0%Avira URL Cloudsafe
        http://www.certum.pl/CPS00%Avira URL Cloudsafe
        http://www.openssl.org/f0%VirustotalBrowse
        http://www.remobjects.com/ps0%VirustotalBrowse
        http://www.certum.pl/CPS00%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        beeyiuc.com
        185.196.8.214
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://beeyiuc.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf915c0ee969c3atrue
          • Avira URL Cloud: safe
          unknown
          http://beeyiuc.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017true
          • Avira URL Cloud: safe
          unknown
          beeyiuc.comCtrue
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.innosetup.com/file.tmp, file.tmp, 00000001.00000000.1682543962.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-2N406.tmp.1.drfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://185.196.8.214/freeprogramingtv32.exe, 00000002.00000002.2928475941.00000000008CB000.00000004.00000020.00020000.00000000.sdmpfalse
          • 11%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://sectigo.com/CPS0is-UF6SG.tmp.1.drfalse
          • URL Reputation: safe
          unknown
          http://repository.certum.pl/ctnca.cer09is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://repository.certum.pl/cscasha2.cer0is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0is-UF6SG.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://ocsp.sectigo.com0is-UF6SG.tmp.1.drfalse
          • URL Reputation: safe
          unknown
          http://crl.certum.pl/ctnca.crl0kis-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUfile.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://ocsp.thawte.com0is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drfalse
          • URL Reputation: safe
          unknown
          http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#is-UF6SG.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlinefile.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#is-UF6SG.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.certum.pl/CPS0is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://crl.certum.pl/cscasha2.crl0qis-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://cscasha2.ocsp-certum.com04is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.openssl.org/support/faq.htmlis-QTH1O.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tis-UF6SG.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.remobjects.com/psUfile.exe, 00000000.00000003.1682031648.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.1681578774.00000000024C0000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000000.1682543962.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-2N406.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee90824freeprogramingtv32.exe, 00000002.00000002.2928475941.00000000008A7000.00000004.00000020.00020000.00000000.sdmp, freeprogramingtv32.exe, 00000002.00000002.2928475941.00000000008E5000.00000004.00000020.00020000.00000000.sdmp, freeprogramingtv32.exe, 00000002.00000002.2929636913.0000000003520000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yis-UF6SG.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://crl.thawte.com/ThawteTimestampingCA.crl0is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drfalse
          • URL Reputation: safe
          unknown
          http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#is-UF6SG.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://subca.ocsp-certum.com01is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.openssl.org/His-UF6SG.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.remobjects.com/psfile.exe, 00000000.00000003.1682031648.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.1681578774.00000000024C0000.00000004.00001000.00020000.00000000.sdmp, file.tmp, file.tmp, 00000001.00000000.1682543962.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-2N406.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://185.196.8.214/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df1freeprogramingtv32.exe, 00000002.00000002.2928475941.00000000008DE000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.openssl.org/fis-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.certum.pl/CPS0is-QTH1O.tmp.1.dr, is-ID0G0.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          195.154.173.35
          unknownFrance
          12876OnlineSASFRfalse
          185.196.8.214
          beeyiuc.comSwitzerland
          34888SIMPLECARRER2ITtrue
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1511441
          Start date and time:2024-09-15 13:54:07 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 55s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:file.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@5/27@1/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 92%
          • Number of executed functions: 199
          • Number of non-executed functions: 246
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtDeviceIoControlFile calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          07:55:34API Interceptor344799x Sleep call for process: freeprogramingtv32.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          185.196.8.2140WD_8nY0HPqEosjVHQm7HffJ.exeGet hashmaliciousSocks5SystemzBrowse
            soon.exeGet hashmaliciousSocks5SystemzBrowse
              fe61hqe0Dt.exeGet hashmaliciousSocks5SystemzBrowse
                file.exeGet hashmaliciousSocks5SystemzBrowse
                  file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                    file.exeGet hashmaliciousSocks5SystemzBrowse
                      file.exeGet hashmaliciousSocks5SystemzBrowse
                        file.exeGet hashmaliciousSocks5SystemzBrowse
                          install.exeGet hashmaliciousSocks5SystemzBrowse
                            install.exeGet hashmaliciousSocks5SystemzBrowse
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              SIMPLECARRER2IT0WD_8nY0HPqEosjVHQm7HffJ.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              soon.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              02_reversed.exeGet hashmaliciousRemcosBrowse
                              • 185.208.158.82
                              fe61hqe0Dt.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              file.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                              • 185.196.8.214
                              file.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              file.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              file.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              install.exeGet hashmaliciousSocks5SystemzBrowse
                              • 185.196.8.214
                              OnlineSASFRQvTbUiFWlo.elfGet hashmaliciousMiraiBrowse
                              • 51.158.232.137
                              BkkZPdT1uc.exeGet hashmaliciousXmrigBrowse
                              • 163.172.154.142
                              myfile.exeGet hashmaliciousSodinokibi, Chaos, Netwalker, Revil, TrojanRansomBrowse
                              • 51.15.159.75
                              PO#100600574.vbsGet hashmaliciousGuLoaderBrowse
                              • 195.154.30.162
                              bot_library.exeGet hashmaliciousUnknownBrowse
                              • 212.129.32.142
                              arm7.elfGet hashmaliciousMirai, MoobotBrowse
                              • 51.158.220.49
                              bot_library.exeGet hashmaliciousUnknownBrowse
                              • 62.210.97.21
                              https://sweet-solomon.67-23-166-125.plesk.page/dave_jackson_tremblay/fouleebel--_--legardaise/victorien--_--.andre/tonysandrine.--_--henedieu/david.hernandez--_--aristizabalGet hashmaliciousUnknownBrowse
                              • 51.159.84.191
                              http://virastman.irGet hashmaliciousUnknownBrowse
                              • 212.129.43.222
                              SecuriteInfo.com.FileRepMalware.835.16222.exeGet hashmaliciousUnknownBrowse
                              • 212.47.236.27
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\user\AppData\Local\Free Programing TV\Qt5OpenGL.dll (copy)0WD_8nY0HPqEosjVHQm7HffJ.exeGet hashmaliciousSocks5SystemzBrowse
                                soon.exeGet hashmaliciousSocks5SystemzBrowse
                                  cHQg24hABF.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, Stealc, Vidar, XWorm, zgRATBrowse
                                    fe61hqe0Dt.exeGet hashmaliciousSocks5SystemzBrowse
                                      file.exeGet hashmaliciousSocks5SystemzBrowse
                                        file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                                          file.exeGet hashmaliciousSocks5SystemzBrowse
                                            file.exeGet hashmaliciousSocks5SystemzBrowse
                                              gn22aYCGh4.exeGet hashmaliciousUnknownBrowse
                                                setup.exeGet hashmaliciousUnknownBrowse
                                                  Process:C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):2674102
                                                  Entropy (8bit):6.4789996164233346
                                                  Encrypted:false
                                                  SSDEEP:49152:9wGEraSvuJ0xGkpOQs1S5DQTXji45Nkdl:SdubJ0xGkEHo5DQTXjnPk/
                                                  MD5:EF7530E4B883531FD823363CAE0463A0
                                                  SHA1:D1DEC026B12299681F17DEDE7C3EF33C4C3C063A
                                                  SHA-256:93FB8A694EB01DD6F54203C1423647909DC8B6D0EEFD72DE97B0496135108AAF
                                                  SHA-512:6992D7DB16E10D525276802649C1881D320A32B8BA3FA9508B257E10380D9F90258FC1114D17C038422556FD86F57B4F99932DFB94A0E178C76A6836A664E494
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: Virustotal, Detection: 34%, Browse
                                                  Reputation:low
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t..L.................`..........Fl.......p....@...........................(.....1.).....................................$s...........h...........................................................................p...............................text....].......`.................. ..`_creg_9......p... ...p..............@..@_dreg_9.H ..........................@....rsrc....p.......p..................@..@_ereg_9......0......................a...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  File Type:ISO-8859 text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):8
                                                  Entropy (8bit):2.0
                                                  Encrypted:false
                                                  SSDEEP:3:/n:/
                                                  MD5:476FBD91C2CB67C5FD6CDE5D2813E7E7
                                                  SHA1:F76C1BDA267B83FB496CF0FCBC906CD52A35EE15
                                                  SHA-256:87904147F8EB9CE24500CDC8B81500BA09974AFF4A369488421A5BD55761199F
                                                  SHA-512:62FE0DE8FF65A89F3D50099D3839B1166E5BA0D24DF82A43BCEFC53FD4692878D0F62EE3296460547AEFDA432358C9617493A08AACF57F14D5B5653FD485C465
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:Q..f....
                                                  Process:C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):4
                                                  Entropy (8bit):0.8112781244591328
                                                  Encrypted:false
                                                  SSDEEP:3:hln:z
                                                  MD5:4FC68C0E28230B671D55876476544B99
                                                  SHA1:D2DB17938548183540C0BB0EFF593ED7F90ADB7C
                                                  SHA-256:B7FC02907B1FE26A09F41A20CBCB2899ECD2B028A973D1997530873BCD349966
                                                  SHA-512:7244B64031446790942901F46F65B6E8B9610F4A88D8DCDEE1FC6C9B7EE9407A0F15ADCABD0B060702407B23B90663E9FC8889591D13C9AA421B6B20D8DBBF24
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:\...
                                                  Process:C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):128
                                                  Entropy (8bit):2.9545817380615236
                                                  Encrypted:false
                                                  SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                  MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                  SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                  SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                  SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                  Process:C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):128
                                                  Entropy (8bit):1.2701231977328944
                                                  Encrypted:false
                                                  SSDEEP:3:WAmJuXDz8/:HHzc
                                                  MD5:0D6174E4525CFDED5DD1C9440B9DC1E7
                                                  SHA1:173EF30A035CE666278904625EADCFAE09233A47
                                                  SHA-256:458677CDF0E1A4E87D32AB67D6A5EEA9E67CB3545D79A21A0624E6BB5E1087E7
                                                  SHA-512:86DA96385985A1BA3D67A8676A041CA563838F474DF33D82B6ECD90C101703B30747121A6B7281E025A3C11CE28ACCEDFC94DB4E8D38E391199458056C2CD27A
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:ccddf9e705966c2f471db9..........................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):334848
                                                  Entropy (8bit):6.5257884005400015
                                                  Encrypted:false
                                                  SSDEEP:6144:JmuFcP82IqE5RSbvQpYVgMW2i32blpDW2pmoZ1:JmuFc02IqE7SbLVgR1O
                                                  MD5:C1D465E061D7D02895DAEB19BDB28AC9
                                                  SHA1:5E729EE51DF080545C7031D771B85094A2B2D4E9
                                                  SHA-256:777917D30F277A9E88D8FC04E69B955A2B0BD3F2BCF2E36F7F9CFFEF2583EE60
                                                  SHA-512:438ADAA0AC3AD47621D288E3FF56493CC7DE4E2A89FC5420E246A6045DB79E7CB84A28D3F3420841340AB33BD632F12FDC3A4E9D8EF99601CA9F975B7F8309E1
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Joe Sandbox View:
                                                  • Filename: 0WD_8nY0HPqEosjVHQm7HffJ.exe, Detection: malicious, Browse
                                                  • Filename: soon.exe, Detection: malicious, Browse
                                                  • Filename: cHQg24hABF.exe, Detection: malicious, Browse
                                                  • Filename: fe61hqe0Dt.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: gn22aYCGh4.exe, Detection: malicious, Browse
                                                  • Filename: setup.exe, Detection: malicious, Browse
                                                  Reputation:moderate, very likely benign file
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#................ ..............a.................................g........ ......................P..Z........j...p..8.......................d............................`......................@................................text...............................`.P`.data...............................@.0..rdata...s.......t..................@.p@.eh_framD....p.......<..............@.0@.bss....H....@........................p..edata..Z....P......................@.0@.idata...j.......l..................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...8....p......................@.0..reloc..d........ ..................@.0B........................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:modified
                                                  Size (bytes):2674102
                                                  Entropy (8bit):6.4789996164233346
                                                  Encrypted:false
                                                  SSDEEP:49152:9wGEraSvuJ0xGkpOQs1S5DQTXji45Nkdl:SdubJ0xGkEHo5DQTXjnPk/
                                                  MD5:EF7530E4B883531FD823363CAE0463A0
                                                  SHA1:D1DEC026B12299681F17DEDE7C3EF33C4C3C063A
                                                  SHA-256:93FB8A694EB01DD6F54203C1423647909DC8B6D0EEFD72DE97B0496135108AAF
                                                  SHA-512:6992D7DB16E10D525276802649C1881D320A32B8BA3FA9508B257E10380D9F90258FC1114D17C038422556FD86F57B4F99932DFB94A0E178C76A6836A664E494
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: Virustotal, Detection: 34%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t..L.................`..........Fl.......p....@...........................(.....1.).....................................$s...........h...........................................................................p...............................text....].......`.................. ..`_creg_9......p... ...p..............@..@_dreg_9.H ..........................@....rsrc....p.......p..................@..@_ereg_9......0......................a...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):718497
                                                  Entropy (8bit):6.514969970877754
                                                  Encrypted:false
                                                  SSDEEP:12288:TTPcYn5c/rPx37/zHBA6a5UeYpChr1CERdSrNdyR623o1a+mxyF2:HPcYn5c/rPx37/zHBA6pFpCZ1CEu23oU
                                                  MD5:15A34E695704C037C2F6F57EC771662F
                                                  SHA1:E2422E9572A061B5B5192272EF1D97D3F5019A33
                                                  SHA-256:21C2374F81205E26AC8383DCF04E9499248B38166ADF8CE1B85F2CD8814B157A
                                                  SHA-512:1D20B0AFB21CBFF8680732A52BCEA1B6A2A05182394AB33DF42D451AE501720C246D3AA6C25E8E2E79A4834CBD959E338C4A00FB05446AFA635935B34342B34C
                                                  Malicious:true
                                                  Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................%..................................................................................................................CODE....@........................... ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................V..............@..P........................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):334848
                                                  Entropy (8bit):6.5257884005400015
                                                  Encrypted:false
                                                  SSDEEP:6144:JmuFcP82IqE5RSbvQpYVgMW2i32blpDW2pmoZ1:JmuFc02IqE7SbLVgR1O
                                                  MD5:C1D465E061D7D02895DAEB19BDB28AC9
                                                  SHA1:5E729EE51DF080545C7031D771B85094A2B2D4E9
                                                  SHA-256:777917D30F277A9E88D8FC04E69B955A2B0BD3F2BCF2E36F7F9CFFEF2583EE60
                                                  SHA-512:438ADAA0AC3AD47621D288E3FF56493CC7DE4E2A89FC5420E246A6045DB79E7CB84A28D3F3420841340AB33BD632F12FDC3A4E9D8EF99601CA9F975B7F8309E1
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#................ ..............a.................................g........ ......................P..Z........j...p..8.......................d............................`......................@................................text...............................`.P`.data...............................@.0..rdata...s.......t..................@.p@.eh_framD....p.......<..............@.0@.bss....H....@........................p..edata..Z....P......................@.0@.idata...j.......l..................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...8....p......................@.0..reloc..d........ ..................@.0B........................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):2674102
                                                  Entropy (8bit):6.478999429565673
                                                  Encrypted:false
                                                  SSDEEP:49152:4wGEraSvuJ0xGkpOQs1S5DQTXji45Nkdl:BdubJ0xGkEHo5DQTXjnPk/
                                                  MD5:BFC4C8B95799BA47F346C2E704CCBB91
                                                  SHA1:4B126F94C3E8514D4C7E8609848F4C8DE8FCE244
                                                  SHA-256:159B70D7C9DC8F7F7449EC045CCB37452C32E07F864C4D8E9940B28358218A37
                                                  SHA-512:6B112E96EC9AEC77FD93E8E92FF76E48CC6C09C0BB376E823CBAF26336B35CF67D347F5E1939BB7FB27005E264964C648A7401C2BE3E337F016DD9A0D8B1077F
                                                  Malicious:false
                                                  Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t..L.................`..........Fl.......p....@...........................(.....1.).....................................$s...........h...........................................................................p...............................text....].......`.................. ..`_creg_9......p... ...p..............@..@_dreg_9.H ..........................@....rsrc....p.......p..................@..@_ereg_9......0......................a...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):392048
                                                  Entropy (8bit):6.542831007177094
                                                  Encrypted:false
                                                  SSDEEP:6144:1eIwnft+S34NVSTjMFR+oVbKQfbno1/1oz6i2EDSD4I+XdtQXGMiFcoOjAWcIhbl:1eIwnft+S34NVSTQD+oVbKQfrC/1ct25
                                                  MD5:EE856A00410ECED8CC609936D01F954E
                                                  SHA1:705D378626AEC86FECFDF04C86244006BC3AF431
                                                  SHA-256:B6192300D3C1476EF3C25A368D055AA401035E78F9F6DBE5F93C84D36EF1FA62
                                                  SHA-512:666D731247DAEAE4B57925DFA8CAE845327FD34E0F6B9AAD1BCF471D1800D7E8AF5642A5FB6E0EC58BA3AC7DD98A6D3FE0B473F34C16FFB9985621C98C0463EF
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../.v[N.%[N.%[N.%4*.$QN.%4*.$.N.%4*.$IN.%4*.$YN.%.*.$HN.%.*.$GN.%.*.$KN.%.*.$XN.%[N.%.O.%.*.$iN.%.*.$ZN.%.*e%ZN.%.*.$ZN.%Rich[N.%........PE..L...D.r^...........!.....8..........^7.......P......................................'.....@..........................6..<)..L_..<.......X...............p3.......3..@,..............................`,..@............P...............................text....7.......8.................. ..`.rdata..l....P.......<..............@..@.data....?...p...6...X..............@....rsrc...X...........................@..@.reloc...3.......4..................@..B................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):348160
                                                  Entropy (8bit):6.542655141037356
                                                  Encrypted:false
                                                  SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                  MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                  SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                  SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                  SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1471856
                                                  Entropy (8bit):6.8308189184145665
                                                  Encrypted:false
                                                  SSDEEP:24576:6PQ+KpPa3kPjWWJy+0PX7PM6ZB9In8QmMMWwI6/I+no9R2aFVWKZxPo89/xc3lRc:brWW0jnMVpUBuwemQnGP8RqYr1mpbk3
                                                  MD5:A236287C42F921D109475D47E9DCAC2B
                                                  SHA1:6D7C177A0AC3076383669BCE46608EB4B6B787EC
                                                  SHA-256:63AA600A7C914C2D59280069169CC93E750E42C9A1146E238C9128E073D578FD
                                                  SHA-512:C325B12235AD77937E3799F1406EB6AA3BC5479BFDFF0EA2F2178FE243E63689AC37BB539ADCBB326B0DE6C09B884771AD57F59184A5B69065682855382ADD8A
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A.W.A.W.A.W.%.V.A.W.%.VeA.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.A.WUA.W.A.W.A.W2%.V.C.W2%.V.A.W2%.W.A.W2%.V.A.WRich.A.W................PE..L.....r^...........!.....v...............................................................@..........................r......H*..x.......X............B..p3..........@e..............................`e..@............................................text....u.......v.................. ..`.rdata..............z..............@..@.data........@...j... ..............@....rsrc...X...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):719720
                                                  Entropy (8bit):6.620042925263483
                                                  Encrypted:false
                                                  SSDEEP:12288:ST+z0ucMr64M+yiwUqfWY/EThHzgOXfpwN9Cu66vLHL1e13XYFU8HtUDsMBPxtFe:FPAeKLL1e6kpqsookesEiU1xJycD4R1z
                                                  MD5:20B6B06BBD211A8ACFE51193653E4167
                                                  SHA1:817D442B46DD6F35FD9641E0C7262C934ED76848
                                                  SHA-256:7A16E6ED0C0A49AEB8EA4972600A7A1422C92550602A150634B1C221F79300B4
                                                  SHA-512:0F0C31D46E7274F28F62AFBBB4A172CB088AF40F6C71A56297B08D83D16548C0A4FDA4CF5F4A29C1445EEDF15FE81FC405E2EB8680F92C744406D031A05A72C8
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+X?|o9Q/o9Q/o9Q/{RR.e9Q/{RT..9Q/{RU.}9Q/{RP.m9Q/=QT.r9Q/=QU.`9Q/=QR.z9Q/.PP.l9Q/o9P/j;Q/.PU.C9Q/.PQ.n9Q/.P./n9Q/.PS.n9Q/Richo9Q/................PE..L...3..c...........!.....d...~......Z........................................ .......9....@.............................4@...)..<.......................h).......S..@...T...............................@............................................text...Lb.......d.................. ..`.rdata...............h..............@..@.data...`I...`...6...D..............@....rsrc................z..............@..@.reloc...S.......T...~..............@..B........................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):499712
                                                  Entropy (8bit):6.414789978441117
                                                  Encrypted:false
                                                  SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                  MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                  SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                  SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                  SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1471856
                                                  Entropy (8bit):6.8308189184145665
                                                  Encrypted:false
                                                  SSDEEP:24576:6PQ+KpPa3kPjWWJy+0PX7PM6ZB9In8QmMMWwI6/I+no9R2aFVWKZxPo89/xc3lRc:brWW0jnMVpUBuwemQnGP8RqYr1mpbk3
                                                  MD5:A236287C42F921D109475D47E9DCAC2B
                                                  SHA1:6D7C177A0AC3076383669BCE46608EB4B6B787EC
                                                  SHA-256:63AA600A7C914C2D59280069169CC93E750E42C9A1146E238C9128E073D578FD
                                                  SHA-512:C325B12235AD77937E3799F1406EB6AA3BC5479BFDFF0EA2F2178FE243E63689AC37BB539ADCBB326B0DE6C09B884771AD57F59184A5B69065682855382ADD8A
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A.W.A.W.A.W.%.V.A.W.%.VeA.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.A.WUA.W.A.W.A.W2%.V.C.W2%.V.A.W2%.W.A.W2%.V.A.WRich.A.W................PE..L.....r^...........!.....v...............................................................@..........................r......H*..x.......X............B..p3..........@e..............................`e..@............................................text....u.......v.................. ..`.rdata..............z..............@..@.data........@...j... ..............@....rsrc...X...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):719720
                                                  Entropy (8bit):6.620042925263483
                                                  Encrypted:false
                                                  SSDEEP:12288:ST+z0ucMr64M+yiwUqfWY/EThHzgOXfpwN9Cu66vLHL1e13XYFU8HtUDsMBPxtFe:FPAeKLL1e6kpqsookesEiU1xJycD4R1z
                                                  MD5:20B6B06BBD211A8ACFE51193653E4167
                                                  SHA1:817D442B46DD6F35FD9641E0C7262C934ED76848
                                                  SHA-256:7A16E6ED0C0A49AEB8EA4972600A7A1422C92550602A150634B1C221F79300B4
                                                  SHA-512:0F0C31D46E7274F28F62AFBBB4A172CB088AF40F6C71A56297B08D83D16548C0A4FDA4CF5F4A29C1445EEDF15FE81FC405E2EB8680F92C744406D031A05A72C8
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+X?|o9Q/o9Q/o9Q/{RR.e9Q/{RT..9Q/{RU.}9Q/{RP.m9Q/=QT.r9Q/=QU.`9Q/=QR.z9Q/.PP.l9Q/o9P/j;Q/.PU.C9Q/.PQ.n9Q/.P./n9Q/.PS.n9Q/Richo9Q/................PE..L...3..c...........!.....d...~......Z........................................ .......9....@.............................4@...)..<.......................h).......S..@...T...............................@............................................text...Lb.......d.................. ..`.rdata...............h..............@..@.data...`I...`...6...D..............@....rsrc................z..............@..@.reloc...S.......T...~..............@..B........................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):499712
                                                  Entropy (8bit):6.414789978441117
                                                  Encrypted:false
                                                  SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                  MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                  SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                  SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                  SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):348160
                                                  Entropy (8bit):6.542655141037356
                                                  Encrypted:false
                                                  SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                  MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                  SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                  SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                  SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):392048
                                                  Entropy (8bit):6.542831007177094
                                                  Encrypted:false
                                                  SSDEEP:6144:1eIwnft+S34NVSTjMFR+oVbKQfbno1/1oz6i2EDSD4I+XdtQXGMiFcoOjAWcIhbl:1eIwnft+S34NVSTQD+oVbKQfrC/1ct25
                                                  MD5:EE856A00410ECED8CC609936D01F954E
                                                  SHA1:705D378626AEC86FECFDF04C86244006BC3AF431
                                                  SHA-256:B6192300D3C1476EF3C25A368D055AA401035E78F9F6DBE5F93C84D36EF1FA62
                                                  SHA-512:666D731247DAEAE4B57925DFA8CAE845327FD34E0F6B9AAD1BCF471D1800D7E8AF5642A5FB6E0EC58BA3AC7DD98A6D3FE0B473F34C16FFB9985621C98C0463EF
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../.v[N.%[N.%[N.%4*.$QN.%4*.$.N.%4*.$IN.%4*.$YN.%.*.$HN.%.*.$GN.%.*.$KN.%.*.$XN.%[N.%.O.%.*.$iN.%.*.$ZN.%.*e%ZN.%.*.$ZN.%Rich[N.%........PE..L...D.r^...........!.....8..........^7.......P......................................'.....@..........................6..<)..L_..<.......X...............p3.......3..@,..............................`,..@............P...............................text....7.......8.................. ..`.rdata..l....P.......<..............@..@.data....?...p...6...X..............@....rsrc...X...........................@..@.reloc...3.......4..................@..B................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:InnoSetup Log Free Programing TV, version 0x30, 4450 bytes, 051829\user, "C:\Users\user\AppData\Local\Free Programing TV"
                                                  Category:dropped
                                                  Size (bytes):4450
                                                  Entropy (8bit):4.622538963029862
                                                  Encrypted:false
                                                  SSDEEP:96:xCdWI488RpKUip5m9s+eOIhTgL4cVSQs0Lj2ydQNPYl/JfRfd:0dWI48epKUw5cHIhXcVSQ1Td5P
                                                  MD5:ED3EC40A99A875CACC79FAEC4FCA23FD
                                                  SHA1:8E43006886F0DCB89A583AC086C8B46FC3E7CC1D
                                                  SHA-256:7F7C3BF4E7F48469664548C6CF5280049E7B3AA19013E6950A03D2C68AFC142B
                                                  SHA-512:791F85C57BDE4363CC6003F9A8782A2035867748CCAFDBEF9CE93C0ECE4C9EA095ED3B4822351847DA51F051B3E16D15436AC315CDF566F5CC9D5EE43B09C82A
                                                  Malicious:false
                                                  Preview:Inno Setup Uninstall Log (b)....................................Free Programing TV..............................................................................................................Free Programing TV..............................................................................................................0.......b...%.................................................................................................................<.....i.....F*......O....051829.user/C:\Users\user\AppData\Local\Free Programing TV...........6.;.@.. .....g......IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User32.
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):718497
                                                  Entropy (8bit):6.514969970877754
                                                  Encrypted:false
                                                  SSDEEP:12288:TTPcYn5c/rPx37/zHBA6a5UeYpChr1CERdSrNdyR623o1a+mxyF2:HPcYn5c/rPx37/zHBA6pFpCZ1CEu23oU
                                                  MD5:15A34E695704C037C2F6F57EC771662F
                                                  SHA1:E2422E9572A061B5B5192272EF1D97D3F5019A33
                                                  SHA-256:21C2374F81205E26AC8383DCF04E9499248B38166ADF8CE1B85F2CD8814B157A
                                                  SHA-512:1D20B0AFB21CBFF8680732A52BCEA1B6A2A05182394AB33DF42D451AE501720C246D3AA6C25E8E2E79A4834CBD959E338C4A00FB05446AFA635935B34342B34C
                                                  Malicious:true
                                                  Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................%..................................................................................................................CODE....@........................... ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................V..............@..P........................................................................................................................................
                                                  Process:C:\Users\user\Desktop\file.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):707072
                                                  Entropy (8bit):6.5064730436236395
                                                  Encrypted:false
                                                  SSDEEP:12288:LTPcYn5c/rPx37/zHBA6a5UeYpChr1CERdSrNdyR623o1a+mxyF:PPcYn5c/rPx37/zHBA6pFpCZ1CEu23ot
                                                  MD5:FAC4C28483FA3BE6BBCBB9544E768C0B
                                                  SHA1:4297CBDA70F4243C7730B01C3040E8FC37AD76EC
                                                  SHA-256:DDFC26937B610C0DC32194E7D1AE23D7B00DF31B80BD44DDED58F7418C866E33
                                                  SHA-512:AC34D6494874BE41E1942B3DC0C31CD550034D0DD2F9C830965900ECB58911C31B4B3B2872DE9139FF094957BF92B8F515764BB4B8D0AC99E715B6DE0D4FB342
                                                  Malicious:true
                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................%..................................................................................................................CODE....@........................... ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................V..............@..P........................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):2560
                                                  Entropy (8bit):2.8818118453929262
                                                  Encrypted:false
                                                  SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                  MD5:A69559718AB506675E907FE49DEB71E9
                                                  SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                  SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                  SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):13312
                                                  Entropy (8bit):5.745960477552938
                                                  Encrypted:false
                                                  SSDEEP:384:BXvhMwoSitz/bjx7yxnbdn+EHvbsHoOODCg:BZ7FEAbd+EDsIO
                                                  MD5:A813D18268AFFD4763DDE940246DC7E5
                                                  SHA1:C7366E1FD925C17CC6068001BD38EAEF5B42852F
                                                  SHA-256:E19781AABE466DD8779CB9C8FA41BBB73375447066BB34E876CF388A6ED63C64
                                                  SHA-512:B310ED4CD2E94381C00A6A370FCB7CC867EBE425D705B69CAAAAFFDAFBAB91F72D357966916053E72E68ECF712F2AF7585500C58BB53EC3E1D539179FCB45FB4
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(............................@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):6144
                                                  Entropy (8bit):4.363359036723334
                                                  Encrypted:false
                                                  SSDEEP:48:SvrzfWvPcXegCPUo1vlZQrAxoONfHFZONfH3d1xCWMBFNL2piSS4k+bkg6j0KHc:+fkcXegaJ/ZAYNzcld1xaX12pTSKvkc
                                                  MD5:526426126AE5D326D0A24706C77D8C5C
                                                  SHA1:68BAEC323767C122F74A269D3AA6D49EB26903DB
                                                  SHA-256:B20A8D88C550981137ED831F2015F5F11517AEB649C29642D9D61DEA5EBC37D1
                                                  SHA-512:A2D824FB08BF0B2B2CC0B5E4AF8B13D5BC752EA0D195C6D40FD72AEC05360A3569EADE1749BDAC81CFB075112D0D3CD030D40F629DAF7ABCC243F9D8DCA8BFBE
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`..............................................................<!.......P.......@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc........P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):23312
                                                  Entropy (8bit):4.596242908851566
                                                  Encrypted:false
                                                  SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                  MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                  SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                  SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                  SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                  Malicious:false
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.997774360776952
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 98.73%
                                                  • Inno Setup installer (109748/4) 1.08%
                                                  • Windows Screen Saver (13104/52) 0.13%
                                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  File name:file.exe
                                                  File size:3'466'709 bytes
                                                  MD5:16c1b3c872a490d259d8ccca7cedad11
                                                  SHA1:3d5ab5e1ad2270dfa7dba9328be6a0b8c867e908
                                                  SHA256:58dbc61b141b1ba5c957c2a4bf1036a8ff92135ecc88085925e7c2bace660860
                                                  SHA512:ad69f082557cba19632be6ebacb33aba6686fd1e4b1c6ba0e4d9400a3fcaa849e9887241798464dbb2e0f0564a414ef5ccb2bff0aa1060ec028b3e6080930fc1
                                                  SSDEEP:98304:MP/iDooszUlDcnmtyYdH4UpA99UNPgj/HuT6BJkDpsqd:bDvszIhKUIgPNQJCs+
                                                  TLSH:C1F53340A1EBBCB2D66A8F724D1BC161D5037B014E7266B43DCD839EEB23585854EBF2
                                                  File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                  Icon Hash:2d2e3797b32b2b99
                                                  Entrypoint:0x40a5f8
                                                  Entrypoint Section:CODE
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:1
                                                  OS Version Minor:0
                                                  File Version Major:1
                                                  File Version Minor:0
                                                  Subsystem Version Major:1
                                                  Subsystem Version Minor:0
                                                  Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                  Instruction
                                                  push ebp
                                                  mov ebp, esp
                                                  add esp, FFFFFFC4h
                                                  push ebx
                                                  push esi
                                                  push edi
                                                  xor eax, eax
                                                  mov dword ptr [ebp-10h], eax
                                                  mov dword ptr [ebp-24h], eax
                                                  call 00007F30AC908293h
                                                  call 00007F30AC90949Ah
                                                  call 00007F30AC909729h
                                                  call 00007F30AC9097CCh
                                                  call 00007F30AC90B76Bh
                                                  call 00007F30AC90E0D6h
                                                  call 00007F30AC90E23Dh
                                                  xor eax, eax
                                                  push ebp
                                                  push 0040ACC9h
                                                  push dword ptr fs:[eax]
                                                  mov dword ptr fs:[eax], esp
                                                  xor edx, edx
                                                  push ebp
                                                  push 0040AC92h
                                                  push dword ptr fs:[edx]
                                                  mov dword ptr fs:[edx], esp
                                                  mov eax, dword ptr [0040C014h]
                                                  call 00007F30AC90ECEBh
                                                  call 00007F30AC90E8D6h
                                                  cmp byte ptr [0040B234h], 00000000h
                                                  je 00007F30AC90F7CEh
                                                  call 00007F30AC90EDE8h
                                                  xor eax, eax
                                                  call 00007F30AC908F89h
                                                  lea edx, dword ptr [ebp-10h]
                                                  xor eax, eax
                                                  call 00007F30AC90BD7Bh
                                                  mov edx, dword ptr [ebp-10h]
                                                  mov eax, 0040CE28h
                                                  call 00007F30AC90832Ah
                                                  push 00000002h
                                                  push 00000000h
                                                  push 00000001h
                                                  mov ecx, dword ptr [0040CE28h]
                                                  mov dl, 01h
                                                  mov eax, 0040738Ch
                                                  call 00007F30AC90C60Ah
                                                  mov dword ptr [0040CE2Ch], eax
                                                  xor edx, edx
                                                  push ebp
                                                  push 0040AC4Ah
                                                  push dword ptr fs:[edx]
                                                  mov dword ptr fs:[edx], esp
                                                  call 00007F30AC90ED46h
                                                  mov dword ptr [0040CE34h], eax
                                                  mov eax, dword ptr [0040CE34h]
                                                  cmp dword ptr [eax+0Ch], 00000000h
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  CODE0x10000x9d300x9e00c3bd95c4b1a8e5199981e0d9b45fd18cFalse0.6052709651898734data6.631765876950794IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  DATA0xb0000x2500x4001ee71d84f1c77af85f1f5c278f880572False0.306640625data2.751820662285145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  BSS0xc0000xe8c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                  .reloc0x100000x8c40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                  .rsrc0x110000x2c000x2c00db2b7f00f65c537f8d7ac4d1f0301e18False0.3288352272727273data4.539805835873732IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                  RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                  RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                  RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                  RT_STRING0x125740x2f2data0.35543766578249336
                                                  RT_STRING0x128680x30cdata0.3871794871794872
                                                  RT_STRING0x12b740x2cedata0.42618384401114207
                                                  RT_STRING0x12e440x68data0.75
                                                  RT_STRING0x12eac0xb4data0.6277777777777778
                                                  RT_STRING0x12f600xaedata0.5344827586206896
                                                  RT_RCDATA0x130100x2cdata1.25
                                                  RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                  RT_VERSION0x1307c0x4f4dataEnglishUnited States0.2618296529968454
                                                  RT_MANIFEST0x135700x5e8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4252645502645503
                                                  DLLImport
                                                  kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                  user32.dllMessageBoxA
                                                  oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                  advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                  kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                  user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                  comctl32.dllInitCommonControls
                                                  advapi32.dllAdjustTokenPrivileges
                                                  Language of compilation systemCountry where language is spokenMap
                                                  DutchNetherlands
                                                  EnglishUnited States
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-09-15T13:55:54.665683+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449736185.196.8.21480TCP
                                                  2024-09-15T13:55:54.665683+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449736185.196.8.21480TCP
                                                  2024-09-15T13:55:57.580967+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449736185.196.8.21480TCP
                                                  2024-09-15T13:55:57.580967+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449736185.196.8.21480TCP
                                                  2024-09-15T13:55:57.932793+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449736185.196.8.21480TCP
                                                  2024-09-15T13:55:57.932793+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449736185.196.8.21480TCP
                                                  2024-09-15T13:55:58.740593+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449740185.196.8.21480TCP
                                                  2024-09-15T13:55:58.740593+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449740185.196.8.21480TCP
                                                  2024-09-15T13:55:59.548731+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449741185.196.8.21480TCP
                                                  2024-09-15T13:55:59.548731+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449741185.196.8.21480TCP
                                                  2024-09-15T13:56:00.366296+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449742185.196.8.21480TCP
                                                  2024-09-15T13:56:00.366296+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449742185.196.8.21480TCP
                                                  2024-09-15T13:56:01.201427+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449743185.196.8.21480TCP
                                                  2024-09-15T13:56:01.201427+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449743185.196.8.21480TCP
                                                  2024-09-15T13:56:01.556782+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449743185.196.8.21480TCP
                                                  2024-09-15T13:56:01.556782+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449743185.196.8.21480TCP
                                                  2024-09-15T13:56:02.370326+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449744185.196.8.21480TCP
                                                  2024-09-15T13:56:02.370326+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449744185.196.8.21480TCP
                                                  2024-09-15T13:56:03.236756+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449745185.196.8.21480TCP
                                                  2024-09-15T13:56:03.236756+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449745185.196.8.21480TCP
                                                  2024-09-15T13:56:03.581051+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449745185.196.8.21480TCP
                                                  2024-09-15T13:56:03.581051+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449745185.196.8.21480TCP
                                                  2024-09-15T13:56:03.928369+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449745185.196.8.21480TCP
                                                  2024-09-15T13:56:03.928369+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449745185.196.8.21480TCP
                                                  2024-09-15T13:56:04.742235+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449746185.196.8.21480TCP
                                                  2024-09-15T13:56:04.742235+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449746185.196.8.21480TCP
                                                  2024-09-15T13:56:05.597968+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449747185.196.8.21480TCP
                                                  2024-09-15T13:56:05.597968+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449747185.196.8.21480TCP
                                                  2024-09-15T13:56:06.424544+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449748185.196.8.21480TCP
                                                  2024-09-15T13:56:06.424544+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449748185.196.8.21480TCP
                                                  2024-09-15T13:56:06.771344+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449748185.196.8.21480TCP
                                                  2024-09-15T13:56:06.771344+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449748185.196.8.21480TCP
                                                  2024-09-15T13:56:07.590774+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449749185.196.8.21480TCP
                                                  2024-09-15T13:56:07.590774+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449749185.196.8.21480TCP
                                                  2024-09-15T13:56:08.402041+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449750185.196.8.21480TCP
                                                  2024-09-15T13:56:08.402041+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449750185.196.8.21480TCP
                                                  2024-09-15T13:56:09.212851+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449751185.196.8.21480TCP
                                                  2024-09-15T13:56:09.212851+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449751185.196.8.21480TCP
                                                  2024-09-15T13:56:10.025953+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449752185.196.8.21480TCP
                                                  2024-09-15T13:56:10.025953+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449752185.196.8.21480TCP
                                                  2024-09-15T13:56:10.840863+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449753185.196.8.21480TCP
                                                  2024-09-15T13:56:10.840863+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449753185.196.8.21480TCP
                                                  2024-09-15T13:56:11.653919+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449754185.196.8.21480TCP
                                                  2024-09-15T13:56:11.653919+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449754185.196.8.21480TCP
                                                  2024-09-15T13:56:12.479146+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449755185.196.8.21480TCP
                                                  2024-09-15T13:56:12.479146+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449755185.196.8.21480TCP
                                                  2024-09-15T13:56:13.296919+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449756185.196.8.21480TCP
                                                  2024-09-15T13:56:13.296919+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449756185.196.8.21480TCP
                                                  2024-09-15T13:56:13.652098+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449756185.196.8.21480TCP
                                                  2024-09-15T13:56:13.652098+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449756185.196.8.21480TCP
                                                  2024-09-15T13:56:14.465756+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449757185.196.8.21480TCP
                                                  2024-09-15T13:56:14.465756+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449757185.196.8.21480TCP
                                                  2024-09-15T13:56:15.303053+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449758185.196.8.21480TCP
                                                  2024-09-15T13:56:15.303053+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449758185.196.8.21480TCP
                                                  2024-09-15T13:56:16.120176+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449759185.196.8.21480TCP
                                                  2024-09-15T13:56:16.120176+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449759185.196.8.21480TCP
                                                  2024-09-15T13:56:16.928031+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449760185.196.8.21480TCP
                                                  2024-09-15T13:56:16.928031+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449760185.196.8.21480TCP
                                                  2024-09-15T13:56:17.772303+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449761185.196.8.21480TCP
                                                  2024-09-15T13:56:17.772303+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449761185.196.8.21480TCP
                                                  2024-09-15T13:56:18.615510+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449762185.196.8.21480TCP
                                                  2024-09-15T13:56:18.615510+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449762185.196.8.21480TCP
                                                  2024-09-15T13:56:19.433862+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449763185.196.8.21480TCP
                                                  2024-09-15T13:56:19.433862+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449763185.196.8.21480TCP
                                                  2024-09-15T13:56:20.247297+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449764185.196.8.21480TCP
                                                  2024-09-15T13:56:20.247297+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449764185.196.8.21480TCP
                                                  2024-09-15T13:56:21.052795+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449765185.196.8.21480TCP
                                                  2024-09-15T13:56:21.052795+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449765185.196.8.21480TCP
                                                  2024-09-15T13:56:21.876208+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449766185.196.8.21480TCP
                                                  2024-09-15T13:56:21.876208+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449766185.196.8.21480TCP
                                                  2024-09-15T13:56:22.234210+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449766185.196.8.21480TCP
                                                  2024-09-15T13:56:22.234210+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449766185.196.8.21480TCP
                                                  2024-09-15T13:56:22.583463+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449766185.196.8.21480TCP
                                                  2024-09-15T13:56:22.583463+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449766185.196.8.21480TCP
                                                  2024-09-15T13:56:23.422809+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449767185.196.8.21480TCP
                                                  2024-09-15T13:56:23.422809+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449767185.196.8.21480TCP
                                                  2024-09-15T13:56:23.785208+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449767185.196.8.21480TCP
                                                  2024-09-15T13:56:23.785208+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449767185.196.8.21480TCP
                                                  2024-09-15T13:56:24.608723+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449768185.196.8.21480TCP
                                                  2024-09-15T13:56:24.608723+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449768185.196.8.21480TCP
                                                  2024-09-15T13:56:24.958189+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449768185.196.8.21480TCP
                                                  2024-09-15T13:56:24.958189+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449768185.196.8.21480TCP
                                                  2024-09-15T13:56:25.774256+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449769185.196.8.21480TCP
                                                  2024-09-15T13:56:25.774256+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449769185.196.8.21480TCP
                                                  2024-09-15T13:56:26.595278+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449770185.196.8.21480TCP
                                                  2024-09-15T13:56:26.595278+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449770185.196.8.21480TCP
                                                  2024-09-15T13:56:26.941466+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449770185.196.8.21480TCP
                                                  2024-09-15T13:56:26.941466+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449770185.196.8.21480TCP
                                                  2024-09-15T13:56:27.290490+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449770185.196.8.21480TCP
                                                  2024-09-15T13:56:27.290490+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449770185.196.8.21480TCP
                                                  2024-09-15T13:56:28.091523+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449771185.196.8.21480TCP
                                                  2024-09-15T13:56:28.091523+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449771185.196.8.21480TCP
                                                  2024-09-15T13:56:28.906668+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449772185.196.8.21480TCP
                                                  2024-09-15T13:56:28.906668+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449772185.196.8.21480TCP
                                                  2024-09-15T13:56:29.258690+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449772185.196.8.21480TCP
                                                  2024-09-15T13:56:29.258690+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449772185.196.8.21480TCP
                                                  2024-09-15T13:56:30.081968+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449773185.196.8.21480TCP
                                                  2024-09-15T13:56:30.081968+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449773185.196.8.21480TCP
                                                  2024-09-15T13:56:30.923177+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449774185.196.8.21480TCP
                                                  2024-09-15T13:56:30.923177+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449774185.196.8.21480TCP
                                                  2024-09-15T13:56:31.279978+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449774185.196.8.21480TCP
                                                  2024-09-15T13:56:31.279978+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449774185.196.8.21480TCP
                                                  2024-09-15T13:56:31.629543+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449774185.196.8.21480TCP
                                                  2024-09-15T13:56:31.629543+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449774185.196.8.21480TCP
                                                  2024-09-15T13:56:32.451725+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449775185.196.8.21480TCP
                                                  2024-09-15T13:56:32.451725+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449775185.196.8.21480TCP
                                                  2024-09-15T13:56:33.366497+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449776185.196.8.21480TCP
                                                  2024-09-15T13:56:33.366497+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449776185.196.8.21480TCP
                                                  2024-09-15T13:56:34.200081+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449777185.196.8.21480TCP
                                                  2024-09-15T13:56:34.200081+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449777185.196.8.21480TCP
                                                  2024-09-15T13:56:35.007645+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449778185.196.8.21480TCP
                                                  2024-09-15T13:56:35.007645+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449778185.196.8.21480TCP
                                                  2024-09-15T13:56:35.896889+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449779185.196.8.21480TCP
                                                  2024-09-15T13:56:35.896889+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449779185.196.8.21480TCP
                                                  2024-09-15T13:56:36.718667+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449780185.196.8.21480TCP
                                                  2024-09-15T13:56:36.718667+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449780185.196.8.21480TCP
                                                  2024-09-15T13:56:37.068584+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449780185.196.8.21480TCP
                                                  2024-09-15T13:56:37.068584+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449780185.196.8.21480TCP
                                                  2024-09-15T13:56:37.892510+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449781185.196.8.21480TCP
                                                  2024-09-15T13:56:37.892510+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449781185.196.8.21480TCP
                                                  2024-09-15T13:56:38.735983+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449782185.196.8.21480TCP
                                                  2024-09-15T13:56:38.735983+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449782185.196.8.21480TCP
                                                  2024-09-15T13:56:39.087427+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449782185.196.8.21480TCP
                                                  2024-09-15T13:56:39.087427+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449782185.196.8.21480TCP
                                                  2024-09-15T13:56:39.932334+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449783185.196.8.21480TCP
                                                  2024-09-15T13:56:39.932334+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449783185.196.8.21480TCP
                                                  2024-09-15T13:56:40.779893+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449784185.196.8.21480TCP
                                                  2024-09-15T13:56:40.779893+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449784185.196.8.21480TCP
                                                  2024-09-15T13:56:41.595992+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449785185.196.8.21480TCP
                                                  2024-09-15T13:56:41.595992+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449785185.196.8.21480TCP
                                                  2024-09-15T13:56:41.950046+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449785185.196.8.21480TCP
                                                  2024-09-15T13:56:41.950046+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449785185.196.8.21480TCP
                                                  2024-09-15T13:56:42.793731+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449786185.196.8.21480TCP
                                                  2024-09-15T13:56:42.793731+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449786185.196.8.21480TCP
                                                  2024-09-15T13:56:43.632048+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449787185.196.8.21480TCP
                                                  2024-09-15T13:56:43.632048+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449787185.196.8.21480TCP
                                                  2024-09-15T13:56:44.464711+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449788185.196.8.21480TCP
                                                  2024-09-15T13:56:44.464711+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449788185.196.8.21480TCP
                                                  2024-09-15T13:56:45.302301+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449789185.196.8.21480TCP
                                                  2024-09-15T13:56:45.302301+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449789185.196.8.21480TCP
                                                  2024-09-15T13:56:46.126399+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449790185.196.8.21480TCP
                                                  2024-09-15T13:56:46.126399+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449790185.196.8.21480TCP
                                                  2024-09-15T13:56:46.482038+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449790185.196.8.21480TCP
                                                  2024-09-15T13:56:46.482038+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449790185.196.8.21480TCP
                                                  2024-09-15T13:56:47.293011+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449791185.196.8.21480TCP
                                                  2024-09-15T13:56:47.293011+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449791185.196.8.21480TCP
                                                  2024-09-15T13:56:48.112792+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449792185.196.8.21480TCP
                                                  2024-09-15T13:56:48.112792+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449792185.196.8.21480TCP
                                                  2024-09-15T13:56:48.933845+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449793185.196.8.21480TCP
                                                  2024-09-15T13:56:48.933845+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449793185.196.8.21480TCP
                                                  2024-09-15T13:56:49.760762+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449794185.196.8.21480TCP
                                                  2024-09-15T13:56:49.760762+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449794185.196.8.21480TCP
                                                  2024-09-15T13:56:50.578871+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449795185.196.8.21480TCP
                                                  2024-09-15T13:56:50.578871+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449795185.196.8.21480TCP
                                                  2024-09-15T13:56:51.407828+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449796185.196.8.21480TCP
                                                  2024-09-15T13:56:51.407828+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449796185.196.8.21480TCP
                                                  2024-09-15T13:56:51.759255+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449796185.196.8.21480TCP
                                                  2024-09-15T13:56:51.759255+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449796185.196.8.21480TCP
                                                  2024-09-15T13:56:52.727965+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449797185.196.8.21480TCP
                                                  2024-09-15T13:56:52.727965+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449797185.196.8.21480TCP
                                                  2024-09-15T13:56:53.592994+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449798185.196.8.21480TCP
                                                  2024-09-15T13:56:53.592994+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449798185.196.8.21480TCP
                                                  2024-09-15T13:56:54.409471+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449799185.196.8.21480TCP
                                                  2024-09-15T13:56:54.409471+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449799185.196.8.21480TCP
                                                  2024-09-15T13:56:55.229367+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449800185.196.8.21480TCP
                                                  2024-09-15T13:56:55.229367+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449800185.196.8.21480TCP
                                                  2024-09-15T13:56:56.046244+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449801185.196.8.21480TCP
                                                  2024-09-15T13:56:56.046244+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449801185.196.8.21480TCP
                                                  2024-09-15T13:56:57.144604+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449802185.196.8.21480TCP
                                                  2024-09-15T13:56:57.144604+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449802185.196.8.21480TCP
                                                  2024-09-15T13:56:57.978961+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449803185.196.8.21480TCP
                                                  2024-09-15T13:56:57.978961+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449803185.196.8.21480TCP
                                                  2024-09-15T13:56:58.821593+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449804185.196.8.21480TCP
                                                  2024-09-15T13:56:58.821593+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449804185.196.8.21480TCP
                                                  2024-09-15T13:56:59.665656+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449805185.196.8.21480TCP
                                                  2024-09-15T13:56:59.665656+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449805185.196.8.21480TCP
                                                  2024-09-15T13:57:00.485041+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449806185.196.8.21480TCP
                                                  2024-09-15T13:57:00.485041+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449806185.196.8.21480TCP
                                                  2024-09-15T13:57:01.308009+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449807185.196.8.21480TCP
                                                  2024-09-15T13:57:01.308009+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449807185.196.8.21480TCP
                                                  2024-09-15T13:57:02.154495+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449808185.196.8.21480TCP
                                                  2024-09-15T13:57:02.154495+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449808185.196.8.21480TCP
                                                  2024-09-15T13:57:03.099744+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449809185.196.8.21480TCP
                                                  2024-09-15T13:57:03.099744+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449809185.196.8.21480TCP
                                                  2024-09-15T13:57:03.934141+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449810185.196.8.21480TCP
                                                  2024-09-15T13:57:03.934141+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449810185.196.8.21480TCP
                                                  2024-09-15T13:57:04.745497+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449811185.196.8.21480TCP
                                                  2024-09-15T13:57:04.745497+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449811185.196.8.21480TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Sep 15, 2024 13:55:53.970256090 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:53.975142002 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:53.975250006 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:53.975594997 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:53.980357885 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:54.665621042 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:54.665683031 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:54.667258024 CEST497372023192.168.2.4195.154.173.35
                                                  Sep 15, 2024 13:55:54.672049046 CEST202349737195.154.173.35192.168.2.4
                                                  Sep 15, 2024 13:55:54.672166109 CEST497372023192.168.2.4195.154.173.35
                                                  Sep 15, 2024 13:55:54.672216892 CEST497372023192.168.2.4195.154.173.35
                                                  Sep 15, 2024 13:55:54.677102089 CEST202349737195.154.173.35192.168.2.4
                                                  Sep 15, 2024 13:55:54.677146912 CEST497372023192.168.2.4195.154.173.35
                                                  Sep 15, 2024 13:55:54.681870937 CEST202349737195.154.173.35192.168.2.4
                                                  Sep 15, 2024 13:55:55.299565077 CEST202349737195.154.173.35192.168.2.4
                                                  Sep 15, 2024 13:55:55.342047930 CEST497372023192.168.2.4195.154.173.35
                                                  Sep 15, 2024 13:55:57.313724041 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:57.318629980 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:57.580874920 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:57.580966949 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:57.688524008 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:57.693526030 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:57.932581902 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:57.932792902 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:57.933456898 CEST497392023192.168.2.4195.154.173.35
                                                  Sep 15, 2024 13:55:57.938313961 CEST202349739195.154.173.35192.168.2.4
                                                  Sep 15, 2024 13:55:57.938404083 CEST497392023192.168.2.4195.154.173.35
                                                  Sep 15, 2024 13:55:57.938505888 CEST497392023192.168.2.4195.154.173.35
                                                  Sep 15, 2024 13:55:57.938549995 CEST497392023192.168.2.4195.154.173.35
                                                  Sep 15, 2024 13:55:57.943367958 CEST202349739195.154.173.35192.168.2.4
                                                  Sep 15, 2024 13:55:57.987855911 CEST202349739195.154.173.35192.168.2.4
                                                  Sep 15, 2024 13:55:58.049624920 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:58.050338984 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:58.055031061 CEST8049736185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:58.055129051 CEST4973680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:58.055277109 CEST8049740185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:58.055360079 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:58.055557966 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:58.060379982 CEST8049740185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:58.382786989 CEST202349739195.154.173.35192.168.2.4
                                                  Sep 15, 2024 13:55:58.382926941 CEST497392023192.168.2.4195.154.173.35
                                                  Sep 15, 2024 13:55:58.740447998 CEST8049740185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:58.740592957 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:58.861794949 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:58.862215996 CEST4974180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:58.866930962 CEST8049740185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:58.867063046 CEST8049741185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:58.867063999 CEST4974080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:58.867175102 CEST4974180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:58.867314100 CEST4974180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:58.872111082 CEST8049741185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:59.548640966 CEST8049741185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:59.548731089 CEST4974180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:59.673401117 CEST4974180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:59.673733950 CEST4974280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:59.678659916 CEST8049742185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:59.678700924 CEST8049741185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:55:59.678754091 CEST4974280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:59.678788900 CEST4974180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:59.678982973 CEST4974280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:55:59.683851004 CEST8049742185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:00.366180897 CEST8049742185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:00.366296053 CEST4974280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:00.485258102 CEST4974280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:00.485690117 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:00.490575075 CEST8049743185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:00.490709066 CEST8049742185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:00.490732908 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:00.490784883 CEST4974280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:00.490936041 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:00.495765924 CEST8049743185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:01.201309919 CEST8049743185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:01.201426983 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:01.315649033 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:01.320740938 CEST8049743185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:01.556662083 CEST8049743185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:01.556782007 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:01.672616005 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:01.673003912 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:01.677937031 CEST8049744185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:01.678039074 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:01.678134918 CEST8049743185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:01.678194046 CEST4974380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:01.678262949 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:01.683202028 CEST8049744185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:02.366827011 CEST8049744185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:02.370326042 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:02.536416054 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:02.536812067 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:02.541802883 CEST8049745185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:02.542212009 CEST8049744185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:02.542419910 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:02.542422056 CEST4974480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:02.545629978 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:02.550554991 CEST8049745185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:03.236615896 CEST8049745185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:03.236756086 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:03.345135927 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:03.350255013 CEST8049745185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:03.580848932 CEST8049745185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:03.581051111 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:03.689874887 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:03.695060015 CEST8049745185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:03.928208113 CEST8049745185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:03.928369045 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:04.047982931 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:04.048280954 CEST4974680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:04.053278923 CEST8049746185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:04.053364038 CEST4974680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:04.053483963 CEST4974680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:04.053585052 CEST8049745185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:04.053646088 CEST4974580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:04.058955908 CEST8049746185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:04.742130995 CEST8049746185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:04.742234945 CEST4974680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:04.875997066 CEST4974680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:04.876355886 CEST4974780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:04.881299973 CEST8049747185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:04.881427050 CEST4974780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:04.881597996 CEST8049746185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:04.881669998 CEST4974680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:04.883038044 CEST4974780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:04.889784098 CEST8049747185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:05.597886086 CEST8049747185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:05.597968102 CEST4974780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:05.720179081 CEST4974780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:05.720807076 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:05.727164030 CEST8049747185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:05.727277994 CEST4974780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:05.727444887 CEST8049748185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:05.727648973 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:05.727824926 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:05.734410048 CEST8049748185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:06.424293995 CEST8049748185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:06.424544096 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:06.534006119 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:06.538954020 CEST8049748185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:06.771215916 CEST8049748185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:06.771343946 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:06.892852068 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:06.893297911 CEST4974980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:06.898322105 CEST8049748185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:06.898369074 CEST8049749185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:06.898411989 CEST4974880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:06.898482084 CEST4974980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:06.898751974 CEST4974980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:06.903542042 CEST8049749185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:07.590563059 CEST8049749185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:07.590774059 CEST4974980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:07.705492020 CEST4974980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:07.706000090 CEST4975080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:07.714018106 CEST8049749185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:07.714036942 CEST8049750185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:07.714076042 CEST4974980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:07.714133978 CEST4975080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:07.714313030 CEST4975080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:07.719124079 CEST8049750185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:08.401971102 CEST8049750185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:08.402040958 CEST4975080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:08.518445969 CEST4975080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:08.518893957 CEST4975180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:08.523823023 CEST8049751185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:08.523927927 CEST4975180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:08.524120092 CEST4975180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:08.524246931 CEST8049750185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:08.524434090 CEST4975080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:08.528908014 CEST8049751185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:09.212583065 CEST8049751185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:09.212851048 CEST4975180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:09.330565929 CEST4975180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:09.330996037 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:09.336255074 CEST8049752185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:09.336302996 CEST8049751185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:09.336502075 CEST4975180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:09.336513996 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:09.336709976 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:09.341650963 CEST8049752185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:10.025723934 CEST8049752185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:10.025953054 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:10.141976118 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:10.142250061 CEST4975380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:10.147150040 CEST8049753185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:10.147217989 CEST8049752185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:10.147258997 CEST4975380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:10.147294998 CEST4975280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:10.147408962 CEST4975380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:10.152301073 CEST8049753185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:10.840734005 CEST8049753185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:10.840862989 CEST4975380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:10.954138041 CEST4975380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:10.954449892 CEST4975480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:10.959408998 CEST8049754185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:10.959476948 CEST8049753185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:10.959497929 CEST4975480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:10.959523916 CEST4975380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:10.959708929 CEST4975480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:10.964562893 CEST8049754185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:11.653692961 CEST8049754185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:11.653918982 CEST4975480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:11.766719103 CEST4975480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:11.767035961 CEST4975580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:11.771902084 CEST8049755185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:11.771984100 CEST4975580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:11.772097111 CEST8049754185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:11.772145033 CEST4975480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:11.772224903 CEST4975580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:11.777048111 CEST8049755185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:12.479068995 CEST8049755185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:12.479146004 CEST4975580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:12.594526052 CEST4975580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:12.594782114 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:12.599718094 CEST8049756185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:12.599822044 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:12.599955082 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:12.599967957 CEST8049755185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:12.600039959 CEST4975580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:12.604849100 CEST8049756185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:13.296746016 CEST8049756185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:13.296919107 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:13.409562111 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:13.414802074 CEST8049756185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:13.651885033 CEST8049756185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:13.652097940 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:13.773152113 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:13.773571014 CEST4975780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:13.778626919 CEST8049756185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:13.778669119 CEST8049757185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:13.778722048 CEST4975680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:13.778775930 CEST4975780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:13.778920889 CEST4975780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:13.783827066 CEST8049757185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:14.465457916 CEST8049757185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:14.465755939 CEST4975780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:14.579989910 CEST4975780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:14.580347061 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:14.585212946 CEST8049758185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:14.585283041 CEST8049757185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:14.585298061 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:14.585359097 CEST4975780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:14.585882902 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:14.590693951 CEST8049758185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:15.302892923 CEST8049758185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:15.303052902 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:15.422678947 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:15.423053026 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:15.427990913 CEST8049759185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:15.428047895 CEST8049758185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:15.428112030 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:15.428138018 CEST4975880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:15.428392887 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:15.433223009 CEST8049759185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:16.120045900 CEST8049759185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:16.120176077 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:16.241445065 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:16.241946936 CEST4976080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:16.246958971 CEST8049759185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:16.247005939 CEST8049760185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:16.247081995 CEST4975980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:16.247168064 CEST4976080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:16.247484922 CEST4976080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:16.252465010 CEST8049760185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:16.927876949 CEST8049760185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:16.928030968 CEST4976080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:17.049168110 CEST4976080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:17.049606085 CEST4976180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:17.054694891 CEST8049760185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:17.054789066 CEST8049761185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:17.054794073 CEST4976080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:17.054862022 CEST4976180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:17.055031061 CEST4976180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:17.060067892 CEST8049761185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:17.772099972 CEST8049761185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:17.772303104 CEST4976180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:17.893956900 CEST4976180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:17.894296885 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:17.899250031 CEST8049762185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:17.899286032 CEST8049761185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:17.899389982 CEST4976180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:17.899409056 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:17.899636030 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:17.904490948 CEST8049762185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:18.615401030 CEST8049762185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:18.615509987 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:18.736823082 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:18.737297058 CEST4976380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:18.742985964 CEST8049762185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:18.743027925 CEST8049763185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:18.743097067 CEST4976280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:18.743168116 CEST4976380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:18.743433952 CEST4976380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:18.748198032 CEST8049763185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:19.433630943 CEST8049763185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:19.433861971 CEST4976380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:19.549262047 CEST4976380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:19.549714088 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:19.554634094 CEST8049763185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:19.554699898 CEST8049764185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:19.554728031 CEST4976380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:19.554804087 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:19.554986954 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:19.559849977 CEST8049764185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:20.247206926 CEST8049764185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:20.247297049 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:20.361754894 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:20.362232924 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:20.367013931 CEST8049764185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:20.367121935 CEST4976480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:20.367206097 CEST8049765185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:20.367292881 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:20.367489100 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:20.373533964 CEST8049765185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:21.052726030 CEST8049765185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:21.052794933 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:21.174496889 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:21.174925089 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:21.179910898 CEST8049765185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:21.179954052 CEST8049766185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:21.180001974 CEST4976580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:21.180061102 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:21.180286884 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:21.185164928 CEST8049766185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:21.876090050 CEST8049766185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:21.876208067 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:21.987179041 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:21.992230892 CEST8049766185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:22.234103918 CEST8049766185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:22.234210014 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:22.346745968 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:22.351717949 CEST8049766185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:22.583301067 CEST8049766185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:22.583462954 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:22.706028938 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:22.706454992 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:22.711247921 CEST8049766185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:22.711293936 CEST8049767185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:22.711374998 CEST4976680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:22.711488008 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:22.711821079 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:22.716634035 CEST8049767185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:23.422576904 CEST8049767185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:23.422808886 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:23.544405937 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:23.549525023 CEST8049767185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:23.785114050 CEST8049767185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:23.785207987 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:23.908493996 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:23.909109116 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:23.913903952 CEST8049767185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:23.914031029 CEST4976780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:23.914133072 CEST8049768185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:23.914201021 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:23.914382935 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:23.919244051 CEST8049768185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:24.608568907 CEST8049768185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:24.608722925 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:24.721180916 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:24.726418972 CEST8049768185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:24.958019972 CEST8049768185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:24.958189011 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:25.080939054 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:25.081393003 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:25.086473942 CEST8049769185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:25.086560011 CEST8049768185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:25.086668968 CEST4976880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:25.086678982 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:25.086882114 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:25.091881037 CEST8049769185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:25.774142981 CEST8049769185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:25.774255991 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:25.891844988 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:25.892205954 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:25.897110939 CEST8049770185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:25.897219896 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:25.897320032 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:25.897448063 CEST8049769185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:25.897499084 CEST4976980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:25.902189016 CEST8049770185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:26.595196009 CEST8049770185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:26.595278025 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:26.704250097 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:26.709275961 CEST8049770185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:26.941339970 CEST8049770185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:26.941466093 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:27.047930002 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:27.052867889 CEST8049770185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:27.290354013 CEST8049770185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:27.290489912 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:27.407430887 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:27.407885075 CEST4977180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:27.412625074 CEST8049770185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:27.412686110 CEST4977080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:27.412733078 CEST8049771185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:27.412858009 CEST4977180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:27.413038015 CEST4977180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:27.417834044 CEST8049771185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:28.091331959 CEST8049771185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:28.091522932 CEST4977180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:28.204449892 CEST4977180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:28.204855919 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:28.209553957 CEST8049771185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:28.209640026 CEST4977180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:28.209722042 CEST8049772185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:28.209786892 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:28.209939003 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:28.214767933 CEST8049772185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:28.906548977 CEST8049772185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:28.906667948 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:29.016910076 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:29.021831036 CEST8049772185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:29.258594990 CEST8049772185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:29.258690119 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:29.376456976 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:29.376851082 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:29.381805897 CEST8049773185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:29.381925106 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:29.381977081 CEST8049772185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:29.382031918 CEST4977280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:29.382143974 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:29.386908054 CEST8049773185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:30.081876993 CEST8049773185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:30.081968069 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:30.219573975 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:30.219887018 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:30.224802971 CEST8049774185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:30.224900961 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:30.224922895 CEST8049773185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:30.224973917 CEST4977380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:30.225095987 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:30.229917049 CEST8049774185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:30.922903061 CEST8049774185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:30.923177004 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:31.033176899 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:31.038808107 CEST8049774185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:31.279489994 CEST8049774185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:31.279978037 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:31.391963959 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:31.397167921 CEST8049774185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:31.629300117 CEST8049774185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:31.629543066 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:31.751550913 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:31.751946926 CEST4977580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:31.758021116 CEST8049775185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:31.758147955 CEST4977580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:31.758198023 CEST8049774185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:31.758235931 CEST4977580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:31.758255959 CEST4977480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:31.764174938 CEST8049775185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:32.447911978 CEST8049775185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:32.451725006 CEST4977580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:32.663362980 CEST4977580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:32.666594028 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:32.668749094 CEST8049775185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:32.670562983 CEST4977580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:32.671648026 CEST8049776185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:32.674129963 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:32.674302101 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:32.679146051 CEST8049776185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:33.366411924 CEST8049776185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:33.366497040 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:33.485491991 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:33.485861063 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:33.490767002 CEST8049777185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:33.490825891 CEST8049776185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:33.490864038 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:33.490871906 CEST4977680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:33.491055012 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:33.495845079 CEST8049777185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:34.199765921 CEST8049777185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:34.200081110 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:34.315903902 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:34.316261053 CEST4977880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:34.321547031 CEST8049778185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:34.321654081 CEST4977880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:34.321768999 CEST4977880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:34.321907997 CEST8049777185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:34.321978092 CEST4977780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:34.327153921 CEST8049778185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:35.007534981 CEST8049778185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:35.007644892 CEST4977880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:35.198472977 CEST4977880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:35.198856115 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:35.203738928 CEST8049779185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:35.203804970 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:35.203867912 CEST8049778185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:35.203916073 CEST4977880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:35.210097075 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:35.214890003 CEST8049779185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:35.896727085 CEST8049779185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:35.896888971 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:36.016688108 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:36.017044067 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:36.022393942 CEST8049779185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:36.022414923 CEST8049780185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:36.022489071 CEST4977980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:36.022526026 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:36.022664070 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:36.027621984 CEST8049780185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:36.718580961 CEST8049780185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:36.718667030 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:36.829334021 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:36.834399939 CEST8049780185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:37.066749096 CEST8049780185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:37.068583965 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:37.193337917 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:37.193684101 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:37.198688030 CEST8049780185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:37.198755026 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:37.198777914 CEST4978080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:37.198848009 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:37.198996067 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:37.204000950 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:37.892420053 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:37.892509937 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:38.023269892 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:38.023611069 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:38.028934002 CEST8049782185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:38.028980970 CEST8049781185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:38.029031992 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:38.029067993 CEST4978180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:38.029206991 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:38.034704924 CEST8049782185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:38.735704899 CEST8049782185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:38.735982895 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:38.846863985 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:38.853403091 CEST8049782185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:39.087316036 CEST8049782185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:39.087426901 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:39.204190016 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:39.204528093 CEST4978380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:39.213248968 CEST8049782185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:39.213293076 CEST8049783185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:39.213428974 CEST4978280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:39.213485956 CEST4978380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:39.213638067 CEST4978380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:39.223054886 CEST8049783185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:39.932142019 CEST8049783185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:39.932333946 CEST4978380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:40.047702074 CEST4978380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:40.048178911 CEST4978480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:40.053498983 CEST8049784185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:40.053586006 CEST8049783185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:40.053649902 CEST4978480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:40.053683043 CEST4978380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:40.053845882 CEST4978480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:40.058814049 CEST8049784185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:40.779686928 CEST8049784185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:40.779892921 CEST4978480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:40.891763926 CEST4978480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:40.892076969 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:40.897053957 CEST8049785185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:40.897123098 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:40.897142887 CEST8049784185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:40.897243023 CEST4978480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:40.897407055 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:40.911461115 CEST8049785185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:41.595905066 CEST8049785185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:41.595992088 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:41.709767103 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:41.717469931 CEST8049785185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:41.949868917 CEST8049785185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:41.950046062 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:42.067629099 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:42.068077087 CEST4978680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:42.072876930 CEST8049785185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:42.072999954 CEST8049786185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:42.073005915 CEST4978580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:42.073061943 CEST4978680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:42.073271990 CEST4978680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:42.078099966 CEST8049786185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:42.790877104 CEST8049786185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:42.793730974 CEST4978680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:42.908479929 CEST4978680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:42.908926010 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:42.914424896 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:42.914551020 CEST8049786185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:42.914638996 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:42.914774895 CEST4978680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:42.914905071 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:42.919771910 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:43.631731033 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:43.632047892 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:43.761377096 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:43.761609077 CEST4978880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:43.767091036 CEST8049788185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:43.767406940 CEST4978880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:43.767550945 CEST8049787185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:43.767630100 CEST4978880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:43.767777920 CEST4978780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:43.772768021 CEST8049788185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:44.464615107 CEST8049788185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:44.464710951 CEST4978880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:44.580192089 CEST4978880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:44.580708027 CEST4978980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:44.585481882 CEST8049788185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:44.585556030 CEST4978880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:44.585653067 CEST8049789185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:44.585728884 CEST4978980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:44.585840940 CEST4978980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:44.590660095 CEST8049789185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:45.302161932 CEST8049789185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:45.302300930 CEST4978980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:45.423994064 CEST4978980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:45.424457073 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:45.429526091 CEST8049789185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:45.429569006 CEST8049790185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:45.429708958 CEST4978980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:45.429750919 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:45.429924011 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:45.434928894 CEST8049790185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:46.126235962 CEST8049790185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:46.126399040 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:46.240503073 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:46.249373913 CEST8049790185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:46.481950998 CEST8049790185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:46.482038021 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:46.594940901 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:46.595108986 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:46.600123882 CEST8049791185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:46.600200891 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:46.600306988 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:46.600495100 CEST8049790185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:46.600555897 CEST4979080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:46.609793901 CEST8049791185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:47.292912006 CEST8049791185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:47.293010950 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:47.408509970 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:47.408881903 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:47.413841963 CEST8049791185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:47.413928032 CEST4979180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:47.413960934 CEST8049792185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:47.414031982 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:47.414215088 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:47.419377089 CEST8049792185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:48.112646103 CEST8049792185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:48.112792015 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:48.237128019 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:48.237514019 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:48.242482901 CEST8049793185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:48.242600918 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:48.242753983 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:48.242793083 CEST8049792185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:48.242856979 CEST4979280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:48.247665882 CEST8049793185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:48.933758020 CEST8049793185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:48.933845043 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:49.054286003 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:49.054619074 CEST4979480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:49.059748888 CEST8049794185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:49.059847116 CEST4979480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:49.059900045 CEST8049793185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:49.059937000 CEST4979480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:49.059959888 CEST4979380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:49.065651894 CEST8049794185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:49.760507107 CEST8049794185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:49.760761976 CEST4979480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:49.877603054 CEST4979480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:49.877918959 CEST4979580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:49.883080006 CEST8049795185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:49.883183956 CEST4979580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:49.883285046 CEST8049794185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:49.883342981 CEST4979480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:49.883380890 CEST4979580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:49.888533115 CEST8049795185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:50.578775883 CEST8049795185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:50.578871012 CEST4979580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:50.688133001 CEST4979580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:50.688543081 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:50.693557978 CEST8049796185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:50.693759918 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:50.693924904 CEST8049795185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:50.693933964 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:50.694133043 CEST4979580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:50.698868036 CEST8049796185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:51.407538891 CEST8049796185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:51.407828093 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:51.518273115 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:51.524291992 CEST8049796185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:51.758948088 CEST8049796185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:51.759254932 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:51.877836943 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:51.878289938 CEST4979780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:52.028184891 CEST8049797185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:52.028341055 CEST8049796185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:52.028372049 CEST4979780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:52.028410912 CEST4979680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:52.030684948 CEST4979780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:52.035810947 CEST8049797185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:52.727859974 CEST8049797185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:52.727965117 CEST4979780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:52.877513885 CEST4979780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:52.877929926 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:52.891829967 CEST8049798185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:52.891998053 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:52.892306089 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:52.892333031 CEST8049797185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:52.892394066 CEST4979780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:52.897593021 CEST8049798185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:53.592663050 CEST8049798185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:53.592993975 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:53.706767082 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:53.707107067 CEST4979980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:53.712338924 CEST8049799185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:53.712382078 CEST8049798185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:53.712446928 CEST4979980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:53.712477922 CEST4979880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:53.712709904 CEST4979980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:53.717556953 CEST8049799185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:54.409368038 CEST8049799185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:54.409471035 CEST4979980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:54.533638000 CEST4979980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:54.534080982 CEST4980080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:54.538918018 CEST8049799185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:54.539015055 CEST4979980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:54.539030075 CEST8049800185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:54.539112091 CEST4980080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:54.539236069 CEST4980080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:54.544017076 CEST8049800185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:55.229031086 CEST8049800185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:55.229367018 CEST4980080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:55.354495049 CEST4980080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:55.354794025 CEST4980180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:55.360155106 CEST8049800185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:55.360241890 CEST8049801185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:55.360249996 CEST4980080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:55.360430002 CEST4980180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:55.360553026 CEST4980180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:55.365660906 CEST8049801185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:56.046024084 CEST8049801185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:56.046243906 CEST4980180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:56.158643961 CEST4980180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:56.159094095 CEST4980280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:56.164012909 CEST8049802185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:56.164122105 CEST8049801185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:56.164246082 CEST4980180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:56.164268017 CEST4980280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:56.164783955 CEST4980280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:56.169783115 CEST8049802185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:57.144510984 CEST8049802185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:57.144603968 CEST4980280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:57.274286985 CEST4980280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:57.274880886 CEST4980380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:57.279917002 CEST8049802185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:57.279978991 CEST4980280192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:57.280175924 CEST8049803185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:57.280246973 CEST4980380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:57.280400991 CEST4980380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:57.285964012 CEST8049803185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:57.978821993 CEST8049803185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:57.978960991 CEST4980380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:58.098865032 CEST4980380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:58.099327087 CEST4980480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:58.104177952 CEST8049803185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:58.104268074 CEST8049804185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:58.104269981 CEST4980380192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:58.104343891 CEST4980480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:58.104554892 CEST4980480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:58.109451056 CEST8049804185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:58.821500063 CEST8049804185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:58.821593046 CEST4980480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:58.944987059 CEST4980480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:58.945664883 CEST4980580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:58.950685978 CEST8049805185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:58.950831890 CEST4980580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:58.951037884 CEST4980580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:58.951042891 CEST8049804185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:58.951127052 CEST4980480192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:58.955905914 CEST8049805185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:59.665563107 CEST8049805185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:59.665656090 CEST4980580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:59.788395882 CEST4980580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:59.788783073 CEST4980680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:59.793629885 CEST8049806185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:59.793704033 CEST8049805185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:56:59.793709040 CEST4980680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:59.793800116 CEST4980580192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:59.793934107 CEST4980680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:56:59.798773050 CEST8049806185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:00.484935999 CEST8049806185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:00.485040903 CEST4980680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:00.599776030 CEST4980680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:00.600264072 CEST4980780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:00.605060101 CEST8049806185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:00.605091095 CEST8049807185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:00.605146885 CEST4980680192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:00.605221033 CEST4980780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:00.609174013 CEST4980780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:00.614077091 CEST8049807185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:01.307682991 CEST8049807185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:01.308008909 CEST4980780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:01.432687998 CEST4980780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:01.433319092 CEST4980880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:01.438909054 CEST8049807185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:01.438966036 CEST4980780192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:01.439100981 CEST8049808185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:01.439182997 CEST4980880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:01.439431906 CEST4980880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:01.444737911 CEST8049808185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:02.154284954 CEST8049808185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:02.154495001 CEST4980880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:02.398813963 CEST4980880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:02.403659105 CEST4980980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:02.404014111 CEST8049808185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:02.407942057 CEST4980880192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:02.411052942 CEST8049809185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:02.412765980 CEST4980980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:02.413309097 CEST4980980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:02.418195009 CEST8049809185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:03.097340107 CEST8049809185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:03.099744081 CEST4980980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:03.238223076 CEST4980980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:03.239012957 CEST4981080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:03.245857954 CEST8049810185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:03.245987892 CEST8049809185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:03.246062994 CEST4980980192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:03.246062994 CEST4981080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:03.246504068 CEST4981080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:03.251283884 CEST8049810185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:03.934073925 CEST8049810185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:03.934140921 CEST4981080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:04.054775953 CEST4981080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:04.055100918 CEST4981180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:04.060233116 CEST8049810185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:04.060260057 CEST8049811185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:04.060307980 CEST4981080192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:04.060344934 CEST4981180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:04.060467005 CEST4981180192.168.2.4185.196.8.214
                                                  Sep 15, 2024 13:57:04.065464973 CEST8049811185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:04.745443106 CEST8049811185.196.8.214192.168.2.4
                                                  Sep 15, 2024 13:57:04.745496988 CEST4981180192.168.2.4185.196.8.214
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Sep 15, 2024 13:55:53.821142912 CEST6338553192.168.2.4152.89.198.214
                                                  Sep 15, 2024 13:55:53.864814997 CEST5363385152.89.198.214192.168.2.4
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Sep 15, 2024 13:55:53.821142912 CEST192.168.2.4152.89.198.2140x3f33Standard query (0)beeyiuc.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Sep 15, 2024 13:55:53.864814997 CEST152.89.198.214192.168.2.40x3f33No error (0)beeyiuc.com185.196.8.214A (IP address)IN (0x0001)false
                                                  • beeyiuc.com
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.449736185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:55:53.975594997 CEST318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf915c0ee969c3a HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:55:54.665621042 CEST576INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:55:54 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 31 37 30 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 35 38 31 64 66 34 36 66 66 38 62 63 38 66 35 31 65 31 38 65 38 62 64 35 37 65 66 31 35 38 35 62 63 63 66 62 35 66 62 63 34 30 61 64 39 30 38 38 62 65 38 64 65 32 32 36 36 65 32 30 38 61 36 62 62 39 64 35 39 32 64 65 30 37 33 34 36 61 63 37 30 66 65 37 39 61 62 33 37 35 33 64 65 66 66 64 34 30 30 63 61 34 36 63 64 37 64 62 62 31 33 66 65 32 64 38 38 32 37 65 30 30 65 61 37 36 33 63 32 34 64 62 38 65 32 34 34 65 62 35 61 37 66 34 33 65 37 32 63 36 66 38 62 33 33 36 37 39 30 66 65 31 34 63 30 66 31 39 34 39 61 33 38 63 37 36 39 39 36 31 36 64 38 35 62 38 63 32 62 61 38 35 62 62 32 65 64 34 31 32 30 65 38 37 63 63 63 66 66 37 62 62 66 38 35 65 63 64 35 34 61 65 36 33 35 63 38 31 65 33 30 34 33 35 62 32 34 65 32 33 62 37 34 30 62 37 38 62 30 65 36 38 65 66 65 38 36 32 64 34 37 62 37 31 39 33 66 37 39 39 31 37 36 30 32 61 30 61 35 62 39 38 31 65 63 36 66 33 65 65 30 62 35 32 38 64 32 64 35 62 38 33 39 32 61 30 [TRUNCATED]
                                                  Data Ascii: 17067b68a8a3203a77b0418f55f677581df46ff8bc8f51e18e8bd57ef1585bccfb5fbc40ad9088be8de2266e208a6bb9d592de07346ac70fe79ab3753deffd400ca46cd7dbb13fe2d8827e00ea763c24db8e244eb5a7f43e72c6f8b336790fe14c0f1949a38c7699616d85b8c2ba85bb2ed4120e87cccff7bbf85ecd54ae635c81e30435b24e23b740b78b0e68efe862d47b7193f79917602a0a5b981ec6f3ee0b528d2d5b8392a05ef34b0cb90bf67d460012e346fa55ecbed0
                                                  Sep 15, 2024 13:55:57.313724041 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:55:57.580874920 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:55:57 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:55:57.688524008 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:55:57.932581902 CEST431INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:55:57 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 30 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 37 38 61 64 32 65 61 31 61 31 37 66 35 61 31 35 30 65 63 31 64 64 35 66 65 38 33 65 37 39 31 38 37 34 64 38 62 34 66 64 32 66 62 64 63 33 35 33 33 62 39 34 64 66 62 64 33 64 61 31 61 32 31 65 33 37 31 35 38 61 64 37 35 66 64 36 66 61 31 32 64 35 64 63 30 65 30 64 32 30 64 63 30 35 64 63 63 37 64 62 33 31 61 66 39 33 33 38 61 32 36 65 66 31 33 61 37 37 38 63 37 35 32 62 66 66 64 34 66 65 38 35 64 36 31 34 31 65 65 32 32 36 64 39 36 33 62 36 37 38 65 66 34 31 30 63 38 65 61 38 62 39 62 33 66 63 63 37 31 39 30 31 35 63 36 35 39 38 35 32 39 62 36 35 39 62 33 64 39 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e067b69c953804b26b565fe95b321bd19a55f78ad2ea1a17f5a150ec1dd5fe83e791874d8b4fd2fbdc3533b94dfbd3da1a21e37158ad75fd6fa12d5dc0e0d20dc05dcc7db31af9338a26ef13a778c752bffd4fe85d6141ee226d963b678ef410c8ea8b9b3fcc719015c6598529b659b3d90


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.449740185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:55:58.055557966 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:55:58.740447998 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:55:58 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.449741185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:55:58.867314100 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:55:59.548640966 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:55:59 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.449742185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:55:59.678982973 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:00.366180897 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:00 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.449743185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:00.490936041 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:01.201309919 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:01 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:01.315649033 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:01.556662083 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:01 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.449744185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:01.678262949 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:02.366827011 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:02 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.449745185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:02.545629978 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:03.236615896 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:03 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:03.345135927 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:03.580848932 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:03 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:03.689874887 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:03.928208113 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:03 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  7192.168.2.449746185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:04.053483963 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:04.742130995 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:04 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  8192.168.2.449747185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:04.883038044 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:05.597886086 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:05 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  9192.168.2.449748185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:05.727824926 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:06.424293995 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:06 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:06.534006119 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:06.771215916 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:06 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  10192.168.2.449749185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:06.898751974 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:07.590563059 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:07 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  11192.168.2.449750185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:07.714313030 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:08.401971102 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:08 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  12192.168.2.449751185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:08.524120092 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:09.212583065 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:09 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  13192.168.2.449752185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:09.336709976 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:10.025723934 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:09 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  14192.168.2.449753185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:10.147408962 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:10.840734005 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:10 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  15192.168.2.449754185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:10.959708929 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:11.653692961 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:11 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  16192.168.2.449755185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:11.772224903 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:12.479068995 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:12 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  17192.168.2.449756185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:12.599955082 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:13.296746016 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:13 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:13.409562111 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:13.651885033 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:13 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  18192.168.2.449757185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:13.778920889 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:14.465457916 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:14 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  19192.168.2.449758185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:14.585882902 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:15.302892923 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:15 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  20192.168.2.449759185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:15.428392887 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:16.120045900 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:16 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  21192.168.2.449760185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:16.247484922 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:16.927876949 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:16 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  22192.168.2.449761185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:17.055031061 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:17.772099972 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:17 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  23192.168.2.449762185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:17.899636030 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:18.615401030 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:18 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  24192.168.2.449763185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:18.743433952 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:19.433630943 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:19 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  25192.168.2.449764185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:19.554986954 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:20.247206926 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:20 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  26192.168.2.449765185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:20.367489100 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:21.052726030 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:20 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  27192.168.2.449766185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:21.180286884 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:21.876090050 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:21 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:21.987179041 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:22.234103918 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:22 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:22.346745968 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:22.583301067 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:22 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  28192.168.2.449767185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:22.711821079 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:23.422576904 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:23 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:23.544405937 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:23.785114050 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:23 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  29192.168.2.449768185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:23.914382935 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:24.608568907 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:24 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:24.721180916 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:24.958019972 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:24 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  30192.168.2.449769185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:25.086882114 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:25.774142981 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:25 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  31192.168.2.449770185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:25.897320032 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:26.595196009 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:26 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:26.704250097 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:26.941339970 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:26 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:27.047930002 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:27.290354013 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:27 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  32192.168.2.449771185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:27.413038015 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:28.091331959 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:27 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  33192.168.2.449772185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:28.209939003 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:28.906548977 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:28 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:29.016910076 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:29.258594990 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:29 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  34192.168.2.449773185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:29.382143974 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:30.081876993 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:29 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  35192.168.2.449774185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:30.225095987 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:30.922903061 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:30 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:31.033176899 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:31.279489994 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:31 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:31.391963959 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:31.629300117 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:31 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  36192.168.2.449775185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:31.758235931 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:32.447911978 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:32 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  37192.168.2.449776185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:32.674302101 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:33.366411924 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:33 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  38192.168.2.449777185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:33.491055012 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:34.199765921 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:34 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  39192.168.2.449778185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:34.321768999 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:35.007534981 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:34 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  40192.168.2.449779185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:35.210097075 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:35.896727085 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:35 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  41192.168.2.449780185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:36.022664070 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:36.718580961 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:36 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:36.829334021 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:37.066749096 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:36 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  42192.168.2.449781185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:37.198996067 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:37.892420053 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:37 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  43192.168.2.449782185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:38.029206991 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:38.735704899 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:38 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:38.846863985 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:39.087316036 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:38 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  44192.168.2.449783185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:39.213638067 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:39.932142019 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:39 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  45192.168.2.449784185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:40.053845882 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:40.779686928 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:40 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  46192.168.2.449785185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:40.897407055 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:41.595905066 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:41 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:41.709767103 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:41.949868917 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:41 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  47192.168.2.449786185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:42.073271990 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:42.790877104 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:42 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  48192.168.2.449787185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:42.914905071 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:43.631731033 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:43 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  49192.168.2.449788185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:43.767630100 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:44.464615107 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:44 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  50192.168.2.449789185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:44.585840940 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:45.302161932 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:45 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  51192.168.2.449790185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:45.429924011 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:46.126235962 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:46 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:46.240503073 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:46.481950998 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:46 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  52192.168.2.449791185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:46.600306988 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:47.292912006 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:47 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  53192.168.2.449792185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:47.414215088 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:48.112646103 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:48 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  54192.168.2.449793185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:48.242753983 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:48.933758020 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:48 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  55192.168.2.449794185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:49.059937000 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:49.760507107 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:49 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  56192.168.2.449795185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:49.883380890 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:50.578775883 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:50 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  57192.168.2.449796185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:50.693933964 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:51.407538891 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:51 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Sep 15, 2024 13:56:51.518273115 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:51.758948088 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:51 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  58192.168.2.449797185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:52.030684948 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:52.727859974 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:52 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  59192.168.2.449798185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:52.892306089 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:53.592663050 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:53 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  60192.168.2.449799185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:53.712709904 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:54.409368038 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:54 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  61192.168.2.449800185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:54.539236069 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:55.229031086 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:55 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  62192.168.2.449801185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:55.360553026 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:56.046024084 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:55 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  63192.168.2.449802185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:56.164783955 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:57.144510984 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:57 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  64192.168.2.449803185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:57.280400991 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:57.978821993 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:57 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  65192.168.2.449804185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:58.104554892 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:58.821500063 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:58 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  66192.168.2.449805185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:58.951037884 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:56:59.665563107 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:56:59 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  67192.168.2.449806185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:56:59.793934107 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:57:00.484935999 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:57:00 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  68192.168.2.449807185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:57:00.609174013 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:57:01.307682991 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:57:01 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  69192.168.2.449808185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:57:01.439431906 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:57:02.154284954 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:57:02 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  70192.168.2.449809185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:57:02.413309097 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:57:03.097340107 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:57:03 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  71192.168.2.449810185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:57:03.246504068 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:57:03.934073925 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:57:03 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  72192.168.2.449811185.196.8.214801800C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 15, 2024 13:57:04.060467005 CEST326OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee908244845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed939e3bcc6c9017 HTTP/1.1
                                                  Host: beeyiuc.com
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Sep 15, 2024 13:57:04.745443106 CEST220INHTTP/1.1 200 OK
                                                  Server: nginx/1.20.1
                                                  Date: Sun, 15 Sep 2024 11:57:04 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:07:54:59
                                                  Start date:15/09/2024
                                                  Path:C:\Users\user\Desktop\file.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\file.exe"
                                                  Imagebase:0x400000
                                                  File size:3'466'709 bytes
                                                  MD5 hash:16C1B3C872A490D259D8CCCA7CEDAD11
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:false

                                                  Target ID:1
                                                  Start time:07:54:59
                                                  Start date:15/09/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\is-0DKCV.tmp\file.tmp" /SL5="$20428,3195553,56832,C:\Users\user\Desktop\file.exe"
                                                  Imagebase:0x400000
                                                  File size:707'072 bytes
                                                  MD5 hash:FAC4C28483FA3BE6BBCBB9544E768C0B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:false

                                                  Target ID:2
                                                  Start time:07:55:00
                                                  Start date:15/09/2024
                                                  Path:C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Free Programing TV\freeprogramingtv32.exe" -i
                                                  Imagebase:0x400000
                                                  File size:2'674'102 bytes
                                                  MD5 hash:EF7530E4B883531FD823363CAE0463A0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2929265237.0000000002712000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  Antivirus matches:
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 34%, Virustotal, Browse
                                                  Reputation:low
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:21.5%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:2.4%
                                                    Total number of Nodes:1521
                                                    Total number of Limit Nodes:22
                                                    execution_graph 5451 407548 5452 407554 CloseHandle 5451->5452 5453 40755d 5451->5453 5452->5453 6688 402b48 RaiseException 5893 407749 5894 4076dc WriteFile 5893->5894 5899 407724 5893->5899 5895 4076e8 5894->5895 5896 4076ef 5894->5896 5897 40748c 35 API calls 5895->5897 5898 407700 5896->5898 5900 4073ec 34 API calls 5896->5900 5897->5896 5899->5893 5901 4077e0 5899->5901 5900->5898 5902 4078db InterlockedExchange 5901->5902 5904 407890 5901->5904 5903 4078e7 5902->5903 6689 40294a 6690 402952 6689->6690 6691 402967 6690->6691 6692 403554 4 API calls 6690->6692 6692->6690 6693 403f4a 6694 403f53 6693->6694 6696 403f5c 6693->6696 6697 403f07 6694->6697 6700 403f09 6697->6700 6699 403f3c 6699->6696 6701 403154 4 API calls 6700->6701 6703 403e9c 6700->6703 6706 403f3d 6700->6706 6720 403e9c 6700->6720 6701->6700 6702 403ef2 6705 402674 4 API calls 6702->6705 6703->6699 6703->6702 6709 403ea9 6703->6709 6711 403e8e 6703->6711 6708 403ecf 6705->6708 6706->6696 6708->6696 6709->6708 6710 402674 4 API calls 6709->6710 6710->6708 6712 403e4c 6711->6712 6713 403e67 6712->6713 6714 403e62 6712->6714 6715 403e7b 6712->6715 6718 403e78 6713->6718 6719 402674 4 API calls 6713->6719 6717 403cc8 4 API calls 6714->6717 6716 402674 4 API calls 6715->6716 6716->6718 6717->6713 6718->6702 6718->6709 6719->6718 6721 403ed7 6720->6721 6727 403ea9 6720->6727 6723 403ef2 6721->6723 6724 403e8e 4 API calls 6721->6724 6722 403ecf 6722->6700 6725 402674 4 API calls 6723->6725 6726 403ee6 6724->6726 6725->6722 6726->6723 6726->6727 6727->6722 6728 402674 4 API calls 6727->6728 6728->6722 6247 40ac4f 6248 40abc1 6247->6248 6249 4094d8 9 API calls 6248->6249 6251 40abed 6248->6251 6249->6251 6250 40ac06 6252 40ac1a 6250->6252 6253 40ac0f DestroyWindow 6250->6253 6251->6250 6254 40ac00 RemoveDirectoryA 6251->6254 6255 40ac42 6252->6255 6256 40357c 4 API calls 6252->6256 6253->6252 6254->6250 6257 40ac38 6256->6257 6258 4025ac 4 API calls 6257->6258 6258->6255 6259 403a52 6260 403a5a WriteFile 6259->6260 6262 403a74 6259->6262 6261 403a78 GetLastError 6260->6261 6260->6262 6261->6262 6263 402654 6264 403154 4 API calls 6263->6264 6265 402614 6264->6265 6266 402632 6265->6266 6267 403154 4 API calls 6265->6267 6267->6266 6268 40ac56 6269 40ac5d 6268->6269 6271 40ac88 6268->6271 6278 409448 6269->6278 6273 403198 4 API calls 6271->6273 6272 40ac62 6272->6271 6275 40ac80 MessageBoxA 6272->6275 6274 40acc0 6273->6274 6276 403198 4 API calls 6274->6276 6275->6271 6277 40acc8 6276->6277 6279 409454 GetCurrentProcess OpenProcessToken 6278->6279 6280 4094af ExitWindowsEx 6278->6280 6281 409466 6279->6281 6282 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6279->6282 6280->6281 6281->6272 6282->6280 6282->6281 6737 40995e 6739 409960 6737->6739 6738 409982 6739->6738 6740 40999e CallWindowProcA 6739->6740 6740->6738 6741 409960 6742 409982 6741->6742 6744 40996f 6741->6744 6743 40999e CallWindowProcA 6743->6742 6744->6742 6744->6743 6745 405160 6746 405173 6745->6746 6747 404e58 33 API calls 6746->6747 6748 405187 6747->6748 6283 402e64 6284 402e69 6283->6284 6285 402e7a RtlUnwind 6284->6285 6286 402e5e 6284->6286 6287 402e9d 6285->6287 5905 40766c SetFilePointer 5906 4076a3 5905->5906 5907 407693 GetLastError 5905->5907 5907->5906 5908 40769c 5907->5908 5909 40748c 35 API calls 5908->5909 5909->5906 6300 40667c IsDBCSLeadByte 6301 406694 6300->6301 6761 403f7d 6762 403fa2 6761->6762 6765 403f84 6761->6765 6764 403e8e 4 API calls 6762->6764 6762->6765 6763 403f8c 6764->6765 6765->6763 6766 402674 4 API calls 6765->6766 6767 403fca 6766->6767 6768 403d02 6774 403d12 6768->6774 6769 403ddf ExitProcess 6770 403db8 6771 403cc8 4 API calls 6770->6771 6773 403dc2 6771->6773 6772 403dea 6775 403cc8 4 API calls 6773->6775 6774->6769 6774->6770 6774->6772 6774->6774 6778 403da4 6774->6778 6779 403d8f MessageBoxA 6774->6779 6776 403dcc 6775->6776 6788 4019dc 6776->6788 6784 403fe4 6778->6784 6779->6770 6780 403dd1 6780->6769 6780->6772 6785 403fe8 6784->6785 6786 403f07 4 API calls 6785->6786 6787 404006 6786->6787 6789 401abb 6788->6789 6790 4019ed 6788->6790 6789->6780 6791 401a04 RtlEnterCriticalSection 6790->6791 6792 401a0e LocalFree 6790->6792 6791->6792 6793 401a41 6792->6793 6794 401a2f VirtualFree 6793->6794 6795 401a49 6793->6795 6794->6793 6796 401a70 LocalFree 6795->6796 6797 401a87 6795->6797 6796->6796 6796->6797 6798 401aa9 RtlDeleteCriticalSection 6797->6798 6799 401a9f RtlLeaveCriticalSection 6797->6799 6798->6780 6799->6798 6306 404206 6307 4041cc 6306->6307 6308 40420a 6306->6308 6309 403154 4 API calls 6308->6309 6310 404282 6308->6310 6311 404323 6309->6311 6312 402c08 6313 402c82 6312->6313 6316 402c19 6312->6316 6314 402c56 RtlUnwind 6315 403154 4 API calls 6314->6315 6315->6313 6316->6313 6316->6314 6319 402b28 6316->6319 6320 402b31 RaiseException 6319->6320 6321 402b47 6319->6321 6320->6321 6321->6314 6322 408c10 6323 408c17 6322->6323 6324 403198 4 API calls 6323->6324 6332 408cb1 6324->6332 6325 408cdc 6326 4031b8 4 API calls 6325->6326 6327 408d69 6326->6327 6328 408cc8 6330 4032fc 18 API calls 6328->6330 6329 403278 18 API calls 6329->6332 6330->6325 6331 4032fc 18 API calls 6331->6332 6332->6325 6332->6328 6332->6329 6332->6331 6337 40a814 6338 40a839 6337->6338 6339 40993c 29 API calls 6338->6339 6342 40a83e 6339->6342 6340 40a891 6371 4026c4 GetSystemTime 6340->6371 6342->6340 6345 408dd8 18 API calls 6342->6345 6343 40a896 6344 409330 46 API calls 6343->6344 6346 40a89e 6344->6346 6347 40a86d 6345->6347 6348 4031e8 18 API calls 6346->6348 6351 40a875 MessageBoxA 6347->6351 6349 40a8ab 6348->6349 6350 406928 19 API calls 6349->6350 6352 40a8b8 6350->6352 6351->6340 6353 40a882 6351->6353 6354 4066c0 19 API calls 6352->6354 6355 405864 19 API calls 6353->6355 6356 40a8c8 6354->6356 6355->6340 6357 406638 19 API calls 6356->6357 6358 40a8d9 6357->6358 6359 403340 18 API calls 6358->6359 6360 40a8e7 6359->6360 6361 4031e8 18 API calls 6360->6361 6362 40a8f7 6361->6362 6363 4074e0 37 API calls 6362->6363 6364 40a936 6363->6364 6365 402594 18 API calls 6364->6365 6366 40a956 6365->6366 6367 407a28 19 API calls 6366->6367 6368 40a998 6367->6368 6369 407cb8 35 API calls 6368->6369 6370 40a9bf 6369->6370 6371->6343 5449 407017 5450 407008 SetErrorMode 5449->5450 6372 403018 6373 403070 6372->6373 6374 403025 6372->6374 6375 40302a RtlUnwind 6374->6375 6376 40304e 6375->6376 6378 402f78 6376->6378 6379 402be8 6376->6379 6380 402bf1 RaiseException 6379->6380 6381 402c04 6379->6381 6380->6381 6381->6373 6386 40901e 6387 409010 6386->6387 6388 408fac Wow64RevertWow64FsRedirection 6387->6388 6389 409018 6388->6389 6390 409020 SetLastError 6391 409029 6390->6391 6406 403a28 ReadFile 6407 403a46 6406->6407 6408 403a49 GetLastError 6406->6408 5910 40762c ReadFile 5911 407663 5910->5911 5912 40764c 5910->5912 5913 407652 GetLastError 5912->5913 5914 40765c 5912->5914 5913->5911 5913->5914 5915 40748c 35 API calls 5914->5915 5915->5911 6810 40712e 6811 407118 6810->6811 6812 403198 4 API calls 6811->6812 6813 407120 6812->6813 6814 403198 4 API calls 6813->6814 6815 407128 6814->6815 5930 40a82f 5931 409ae8 18 API calls 5930->5931 5932 40a834 5931->5932 5933 40a839 5932->5933 5934 402f24 5 API calls 5932->5934 5967 40993c 5933->5967 5934->5933 5936 40a891 5972 4026c4 GetSystemTime 5936->5972 5938 40a83e 5938->5936 6033 408dd8 5938->6033 5939 40a896 5973 409330 5939->5973 5943 40a86d 5947 40a875 MessageBoxA 5943->5947 5944 4031e8 18 API calls 5945 40a8ab 5944->5945 5991 406928 5945->5991 5947->5936 5949 40a882 5947->5949 6036 405864 5949->6036 5954 40a8d9 6018 403340 5954->6018 5956 40a8e7 5957 4031e8 18 API calls 5956->5957 5958 40a8f7 5957->5958 5959 4074e0 37 API calls 5958->5959 5960 40a936 5959->5960 5961 402594 18 API calls 5960->5961 5962 40a956 5961->5962 5963 407a28 19 API calls 5962->5963 5964 40a998 5963->5964 5965 407cb8 35 API calls 5964->5965 5966 40a9bf 5965->5966 6040 40953c 5967->6040 5970 4098cc 19 API calls 5971 40995c 5970->5971 5971->5938 5972->5939 5980 409350 5973->5980 5976 409375 CreateDirectoryA 5977 4093ed 5976->5977 5978 40937f GetLastError 5976->5978 5979 40322c 4 API calls 5977->5979 5978->5980 5982 4093f7 5979->5982 5980->5976 5981 408dd8 18 API calls 5980->5981 5983 404c94 33 API calls 5980->5983 5986 407284 19 API calls 5980->5986 5989 408da8 18 API calls 5980->5989 5990 405890 18 API calls 5980->5990 6096 406cf4 5980->6096 6119 409224 5980->6119 5981->5980 5984 4031b8 4 API calls 5982->5984 5983->5980 5985 409411 5984->5985 5987 4031b8 4 API calls 5985->5987 5986->5980 5988 40941e 5987->5988 5988->5944 5989->5980 5990->5980 6225 406820 5991->6225 5994 403454 18 API calls 5995 40694a 5994->5995 5996 4066c0 5995->5996 6230 4068e4 5996->6230 5999 4066f0 6002 403340 18 API calls 5999->6002 6000 4066fe 6001 403454 18 API calls 6000->6001 6003 406711 6001->6003 6004 4066fc 6002->6004 6005 403340 18 API calls 6003->6005 6006 403198 4 API calls 6004->6006 6005->6004 6007 406733 6006->6007 6008 406638 6007->6008 6009 406642 6008->6009 6010 406665 6008->6010 6236 406950 6009->6236 6012 40322c 4 API calls 6010->6012 6014 40666e 6012->6014 6013 406649 6013->6010 6015 406654 6013->6015 6014->5954 6016 403340 18 API calls 6015->6016 6017 406662 6016->6017 6017->5954 6019 403344 6018->6019 6020 4033a5 6018->6020 6021 4031e8 6019->6021 6022 40334c 6019->6022 6026 403254 18 API calls 6021->6026 6028 4031fc 6021->6028 6022->6020 6023 40335b 6022->6023 6027 4031e8 18 API calls 6022->6027 6025 403254 18 API calls 6023->6025 6024 403228 6024->5956 6030 403375 6025->6030 6026->6028 6027->6023 6028->6024 6029 4025ac 4 API calls 6028->6029 6029->6024 6031 4031e8 18 API calls 6030->6031 6032 4033a1 6031->6032 6032->5956 6034 408da8 18 API calls 6033->6034 6035 408df4 6034->6035 6035->5943 6037 405869 6036->6037 6038 405940 19 API calls 6037->6038 6039 40587b 6038->6039 6039->6039 6047 40955b 6040->6047 6041 409590 6043 40959d GetUserDefaultLangID 6041->6043 6048 409592 6041->6048 6042 409594 6052 407024 GetModuleHandleA GetProcAddress 6042->6052 6043->6048 6046 40956f 6046->5970 6047->6041 6047->6042 6047->6046 6048->6046 6049 4095cb GetACP 6048->6049 6050 4095ef 6048->6050 6049->6046 6049->6048 6050->6046 6051 409615 GetACP 6050->6051 6051->6046 6051->6050 6053 407067 6052->6053 6054 40705e 6052->6054 6055 407070 6053->6055 6056 4070a8 6053->6056 6063 403198 4 API calls 6054->6063 6073 406f68 6055->6073 6057 406f68 RegOpenKeyExA 6056->6057 6061 4070c1 6057->6061 6059 407089 6060 4070de 6059->6060 6076 406f5c 6059->6076 6065 40322c 4 API calls 6060->6065 6061->6060 6064 406f5c 20 API calls 6061->6064 6067 407120 6063->6067 6068 4070d5 RegCloseKey 6064->6068 6069 4070eb 6065->6069 6070 403198 4 API calls 6067->6070 6068->6060 6071 4032fc 18 API calls 6069->6071 6072 407128 6070->6072 6071->6054 6072->6048 6074 406f73 6073->6074 6075 406f79 RegOpenKeyExA 6073->6075 6074->6075 6075->6059 6079 406e10 6076->6079 6080 406e36 RegQueryValueExA 6079->6080 6085 406e7b 6080->6085 6087 406e59 6080->6087 6081 406e73 6083 403198 4 API calls 6081->6083 6082 403198 4 API calls 6084 406f47 RegCloseKey 6082->6084 6083->6085 6084->6060 6085->6082 6086 403278 18 API calls 6086->6087 6087->6081 6087->6085 6087->6086 6088 403420 18 API calls 6087->6088 6089 406eb0 RegQueryValueExA 6088->6089 6089->6080 6090 406ecc 6089->6090 6090->6085 6091 4034f0 18 API calls 6090->6091 6092 406f0e 6091->6092 6093 406f20 6092->6093 6095 403420 18 API calls 6092->6095 6094 4031e8 18 API calls 6093->6094 6094->6085 6095->6093 6138 406a58 6096->6138 6100 406a58 19 API calls 6102 406d36 6100->6102 6101 406d26 6101->6100 6103 406d72 6101->6103 6104 406d42 6102->6104 6106 406a34 21 API calls 6102->6106 6146 406888 6103->6146 6104->6103 6107 406d67 6104->6107 6110 406a58 19 API calls 6104->6110 6106->6104 6107->6103 6158 406cc8 GetWindowsDirectoryA 6107->6158 6112 406d5b 6110->6112 6111 406638 19 API calls 6113 406d87 6111->6113 6112->6107 6114 406a34 21 API calls 6112->6114 6115 40322c 4 API calls 6113->6115 6114->6107 6116 406d91 6115->6116 6117 4031b8 4 API calls 6116->6117 6118 406dab 6117->6118 6118->5980 6120 409244 6119->6120 6121 406638 19 API calls 6120->6121 6122 40925d 6121->6122 6123 40322c 4 API calls 6122->6123 6130 409268 6123->6130 6124 406978 20 API calls 6124->6130 6126 408dd8 18 API calls 6126->6130 6127 4033b4 18 API calls 6127->6130 6128 405890 18 API calls 6128->6130 6130->6124 6130->6126 6130->6127 6130->6128 6131 4092e4 6130->6131 6198 4091b0 6130->6198 6206 409034 6130->6206 6132 40322c 4 API calls 6131->6132 6133 4092ef 6132->6133 6134 4031b8 4 API calls 6133->6134 6135 409309 6134->6135 6136 403198 4 API calls 6135->6136 6137 409311 6136->6137 6137->5980 6139 4034f0 18 API calls 6138->6139 6140 406a6b 6139->6140 6141 406a82 GetEnvironmentVariableA 6140->6141 6145 406a95 6140->6145 6160 406dec 6140->6160 6141->6140 6142 406a8e 6141->6142 6143 403198 4 API calls 6142->6143 6143->6145 6145->6101 6155 406a34 6145->6155 6147 403414 6146->6147 6148 4068ab GetFullPathNameA 6147->6148 6149 4068b7 6148->6149 6150 4068ce 6148->6150 6149->6150 6151 4068bf 6149->6151 6152 40322c 4 API calls 6150->6152 6153 403278 18 API calls 6151->6153 6154 4068cc 6152->6154 6153->6154 6154->6111 6164 4069dc 6155->6164 6159 406ce9 6158->6159 6159->6103 6161 406dfa 6160->6161 6162 4034f0 18 API calls 6161->6162 6163 406e08 6162->6163 6163->6140 6171 406978 6164->6171 6166 4069fe 6167 406a06 GetFileAttributesA 6166->6167 6168 406a1b 6167->6168 6169 403198 4 API calls 6168->6169 6170 406a23 6169->6170 6170->6101 6181 406744 6171->6181 6173 4069b0 6176 4069c6 6173->6176 6177 4069bb 6173->6177 6175 406989 6175->6173 6188 406970 CharPrevA 6175->6188 6189 403454 6176->6189 6178 40322c 4 API calls 6177->6178 6180 4069c4 6178->6180 6180->6166 6182 406755 6181->6182 6183 4067b9 6182->6183 6187 406773 6182->6187 6184 406680 IsDBCSLeadByte 6183->6184 6185 4067b4 6183->6185 6184->6185 6185->6175 6187->6185 6196 406680 IsDBCSLeadByte 6187->6196 6188->6175 6190 403486 6189->6190 6191 403459 6189->6191 6192 403198 4 API calls 6190->6192 6191->6190 6194 40346d 6191->6194 6193 40347c 6192->6193 6193->6180 6195 403278 18 API calls 6194->6195 6195->6193 6197 406694 6196->6197 6197->6187 6199 403198 4 API calls 6198->6199 6201 4091d1 6199->6201 6203 4091fe 6201->6203 6215 4032a8 6201->6215 6218 403494 6201->6218 6204 403198 4 API calls 6203->6204 6205 409213 6204->6205 6205->6130 6207 408f70 2 API calls 6206->6207 6208 40904a 6207->6208 6209 40904e 6208->6209 6222 406a48 6208->6222 6209->6130 6212 409081 6213 408fac Wow64RevertWow64FsRedirection 6212->6213 6214 409089 6213->6214 6214->6130 6216 403278 18 API calls 6215->6216 6217 4032b5 6216->6217 6217->6201 6219 403498 6218->6219 6221 4034c3 6218->6221 6220 4034f0 18 API calls 6219->6220 6220->6221 6221->6201 6223 4069dc 21 API calls 6222->6223 6224 406a52 GetLastError 6223->6224 6224->6212 6226 406744 IsDBCSLeadByte 6225->6226 6228 406835 6226->6228 6227 40687f 6227->5994 6228->6227 6229 406680 IsDBCSLeadByte 6228->6229 6229->6228 6231 4068f3 6230->6231 6232 406820 IsDBCSLeadByte 6231->6232 6234 4068fe 6232->6234 6233 4066ea 6233->5999 6233->6000 6234->6233 6235 406680 IsDBCSLeadByte 6234->6235 6235->6234 6237 406957 6236->6237 6238 40695b 6236->6238 6237->6013 6241 406970 CharPrevA 6238->6241 6240 40696c 6240->6013 6241->6240 6816 408f30 6819 408dfc 6816->6819 6820 408e05 6819->6820 6821 403198 4 API calls 6820->6821 6822 408e13 6820->6822 6821->6820 6823 403932 6824 403924 6823->6824 6825 40374c VariantClear 6824->6825 6826 40392c 6825->6826 5386 4075c4 SetFilePointer 5387 4075f7 5386->5387 5388 4075e7 GetLastError 5386->5388 5388->5387 5389 4075f0 5388->5389 5391 40748c GetLastError 5389->5391 5394 4073ec 5391->5394 5395 407284 19 API calls 5394->5395 5396 407414 5395->5396 5397 407434 5396->5397 5399 405194 33 API calls 5396->5399 5398 405890 18 API calls 5397->5398 5400 407443 5398->5400 5399->5397 5401 403198 4 API calls 5400->5401 5402 407460 5401->5402 5402->5387 6417 4076c8 WriteFile 6418 4076e8 6417->6418 6421 4076ef 6417->6421 6419 40748c 35 API calls 6418->6419 6419->6421 6420 407700 6421->6420 6422 4073ec 34 API calls 6421->6422 6422->6420 6423 402ccc 6426 402cfe 6423->6426 6427 402cdd 6423->6427 6424 402d88 RtlUnwind 6425 403154 4 API calls 6424->6425 6425->6426 6427->6424 6427->6426 6428 402b28 RaiseException 6427->6428 6429 402d7f 6428->6429 6429->6424 6835 403fcd 6836 403f07 4 API calls 6835->6836 6837 403fd6 6836->6837 6838 403e9c 4 API calls 6837->6838 6839 403fe2 6838->6839 6436 4024d0 6437 4024e4 6436->6437 6438 4024e9 6436->6438 6441 401918 4 API calls 6437->6441 6439 402518 6438->6439 6440 40250e RtlEnterCriticalSection 6438->6440 6443 4024ed 6438->6443 6451 402300 6439->6451 6440->6439 6441->6438 6444 402525 6447 402581 6444->6447 6448 402577 RtlLeaveCriticalSection 6444->6448 6446 401fd4 14 API calls 6449 402531 6446->6449 6448->6447 6449->6444 6450 40215c 9 API calls 6449->6450 6450->6444 6452 402314 6451->6452 6454 4023b8 6452->6454 6455 402335 6452->6455 6453 402344 6453->6444 6453->6446 6454->6453 6456 401d80 9 API calls 6454->6456 6459 402455 6454->6459 6461 401e84 6454->6461 6455->6453 6457 401b74 9 API calls 6455->6457 6456->6454 6457->6453 6459->6453 6460 401d00 9 API calls 6459->6460 6460->6453 6466 401768 6461->6466 6463 401e99 6464 401ea6 6463->6464 6465 401dcc 9 API calls 6463->6465 6464->6454 6465->6464 6467 401787 6466->6467 6468 40183b 6467->6468 6469 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6467->6469 6470 40132c LocalAlloc 6467->6470 6472 401821 6467->6472 6474 4017d6 6467->6474 6471 4015c4 VirtualAlloc 6468->6471 6475 4017e7 6468->6475 6469->6467 6470->6467 6471->6475 6473 40150c VirtualFree 6472->6473 6473->6475 6476 40150c VirtualFree 6474->6476 6475->6463 6476->6475 6477 4028d2 6478 4028da 6477->6478 6479 403554 4 API calls 6478->6479 6480 4028ef 6478->6480 6479->6478 6481 4025ac 4 API calls 6480->6481 6482 4028f4 6481->6482 6840 4019d3 6841 4019ba 6840->6841 6842 4019c3 RtlLeaveCriticalSection 6841->6842 6843 4019cd 6841->6843 6842->6843 5403 407fd4 5404 407fe6 5403->5404 5406 407fed 5403->5406 5414 407f10 5404->5414 5407 408021 5406->5407 5408 408015 5406->5408 5409 408017 5406->5409 5410 40804e 5407->5410 5412 407d7c 33 API calls 5407->5412 5428 407e2c 5408->5428 5425 407d7c 5409->5425 5412->5410 5415 407f25 5414->5415 5416 407d7c 33 API calls 5415->5416 5417 407f34 5415->5417 5416->5417 5418 407f6e 5417->5418 5420 407d7c 33 API calls 5417->5420 5419 407f82 5418->5419 5421 407d7c 33 API calls 5418->5421 5424 407fae 5419->5424 5435 407eb8 5419->5435 5420->5418 5421->5419 5424->5406 5438 4058c4 5425->5438 5427 407d9e 5427->5407 5429 405194 33 API calls 5428->5429 5430 407e57 5429->5430 5446 407de4 5430->5446 5432 407e5f 5433 403198 4 API calls 5432->5433 5434 407e74 5433->5434 5434->5407 5436 407ec7 VirtualFree 5435->5436 5437 407ed9 VirtualAlloc 5435->5437 5436->5437 5437->5424 5440 4058d0 5438->5440 5439 405194 33 API calls 5441 4058fd 5439->5441 5440->5439 5442 4031e8 18 API calls 5441->5442 5443 405908 5442->5443 5444 403198 4 API calls 5443->5444 5445 40591d 5444->5445 5445->5427 5447 4058c4 33 API calls 5446->5447 5448 407e06 5447->5448 5448->5432 6483 405ad4 6484 405ae4 6483->6484 6485 405adc 6483->6485 6486 405ae2 6485->6486 6487 405aeb 6485->6487 6490 405a4c 6486->6490 6488 405940 19 API calls 6487->6488 6488->6484 6491 405a54 6490->6491 6492 405a6e 6491->6492 6493 403154 4 API calls 6491->6493 6494 405a73 6492->6494 6495 405a8a 6492->6495 6493->6491 6496 405940 19 API calls 6494->6496 6497 403154 4 API calls 6495->6497 6498 405a86 6496->6498 6499 405a8f 6497->6499 6501 403154 4 API calls 6498->6501 6500 4059b0 33 API calls 6499->6500 6500->6498 6502 405ab8 6501->6502 6503 403154 4 API calls 6502->6503 6504 405ac6 6503->6504 6504->6484 5916 40a9de 5917 40aa03 5916->5917 5918 407918 InterlockedExchange 5917->5918 5919 40aa2d 5918->5919 5920 409ae8 18 API calls 5919->5920 5921 40aa3d 5919->5921 5920->5921 5926 4076ac SetEndOfFile 5921->5926 5923 40aa59 5924 4025ac 4 API calls 5923->5924 5925 40aa90 5924->5925 5927 4076c3 5926->5927 5928 4076bc 5926->5928 5927->5923 5929 40748c 35 API calls 5928->5929 5929->5927 6847 402be9 RaiseException 6848 402c04 6847->6848 6515 402af2 6516 402afe 6515->6516 6519 402ed0 6516->6519 6520 403154 4 API calls 6519->6520 6522 402ee0 6520->6522 6521 402b03 6522->6521 6524 402b0c 6522->6524 6525 402b25 6524->6525 6526 402b15 RaiseException 6524->6526 6525->6521 6526->6525 5454 40a5f8 5497 4030dc 5454->5497 5456 40a60e 5500 4042e8 5456->5500 5458 40a613 5503 40457c GetModuleHandleA GetProcAddress 5458->5503 5462 40a61d 5511 4065c8 5462->5511 5464 40a622 5520 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5464->5520 5471 40a665 5542 406c2c 5471->5542 5475 4031e8 18 API calls 5476 40a683 5475->5476 5556 4074e0 5476->5556 5482 407918 InterlockedExchange 5484 40a6d2 5482->5484 5483 40a710 5576 4074a0 5483->5576 5484->5483 5613 409ae8 5484->5613 5486 40a751 5580 407a28 5486->5580 5487 40a736 5487->5486 5488 409ae8 18 API calls 5487->5488 5488->5486 5490 40a776 5590 408b08 5490->5590 5494 40a7bc 5495 408b08 35 API calls 5494->5495 5496 40a7f5 5494->5496 5495->5494 5623 403094 5497->5623 5499 4030e1 GetModuleHandleA GetCommandLineA 5499->5456 5501 403154 4 API calls 5500->5501 5502 404323 5500->5502 5501->5502 5502->5458 5504 404598 5503->5504 5505 40459f GetProcAddress 5503->5505 5504->5505 5506 4045b5 GetProcAddress 5505->5506 5507 4045ae 5505->5507 5508 4045c4 SetProcessDEPPolicy 5506->5508 5509 4045c8 5506->5509 5507->5506 5508->5509 5510 404624 6F571CD0 5509->5510 5510->5462 5624 405ca8 5511->5624 5521 4090f7 5520->5521 5708 406fa0 SetErrorMode 5521->5708 5524 407284 19 API calls 5525 409127 5524->5525 5526 403198 4 API calls 5525->5526 5527 40913c 5526->5527 5528 409b78 GetSystemInfo VirtualQuery 5527->5528 5529 409ba2 5528->5529 5530 409c2c 5528->5530 5529->5530 5531 409c0d VirtualQuery 5529->5531 5532 409bcc VirtualProtect 5529->5532 5533 409bfb VirtualProtect 5529->5533 5534 409768 5530->5534 5531->5529 5531->5530 5532->5529 5533->5531 5714 406bd0 GetCommandLineA 5534->5714 5536 409850 5537 4031b8 4 API calls 5536->5537 5539 40986a 5537->5539 5538 406c2c 20 API calls 5541 409785 5538->5541 5539->5471 5606 409c88 5539->5606 5540 403454 18 API calls 5540->5541 5541->5536 5541->5538 5541->5540 5543 406c53 GetModuleFileNameA 5542->5543 5544 406c77 GetCommandLineA 5542->5544 5545 403278 18 API calls 5543->5545 5552 406c7c 5544->5552 5546 406c75 5545->5546 5550 406ca4 5546->5550 5547 406c81 5548 403198 4 API calls 5547->5548 5551 406c89 5548->5551 5549 406af0 18 API calls 5549->5552 5553 403198 4 API calls 5550->5553 5554 40322c 4 API calls 5551->5554 5552->5547 5552->5549 5552->5551 5555 406cb9 5553->5555 5554->5550 5555->5475 5557 4074ea 5556->5557 5721 407576 5557->5721 5724 407578 5557->5724 5558 407516 5559 40752a 5558->5559 5560 40748c 35 API calls 5558->5560 5563 409c34 FindResourceA 5559->5563 5560->5559 5564 409c49 5563->5564 5565 409c4e SizeofResource 5563->5565 5566 409ae8 18 API calls 5564->5566 5567 409c60 LoadResource 5565->5567 5568 409c5b 5565->5568 5566->5565 5570 409c73 LockResource 5567->5570 5571 409c6e 5567->5571 5569 409ae8 18 API calls 5568->5569 5569->5567 5573 409c84 5570->5573 5574 409c7f 5570->5574 5572 409ae8 18 API calls 5571->5572 5572->5570 5573->5482 5573->5484 5575 409ae8 18 API calls 5574->5575 5575->5573 5577 4074b4 5576->5577 5578 4074c4 5577->5578 5579 4073ec 34 API calls 5577->5579 5578->5487 5579->5578 5581 407a35 5580->5581 5582 405890 18 API calls 5581->5582 5583 407a89 5581->5583 5582->5583 5584 407918 InterlockedExchange 5583->5584 5585 407a9b 5584->5585 5586 405890 18 API calls 5585->5586 5587 407ab1 5585->5587 5586->5587 5588 405890 18 API calls 5587->5588 5589 407af4 5587->5589 5588->5589 5589->5490 5592 408b39 5590->5592 5596 408b82 5590->5596 5591 408bcd 5727 407cb8 5591->5727 5594 4034f0 18 API calls 5592->5594 5592->5596 5599 403420 18 API calls 5592->5599 5600 4031e8 18 API calls 5592->5600 5604 407cb8 35 API calls 5592->5604 5594->5592 5595 408be4 5598 4031b8 4 API calls 5595->5598 5596->5591 5597 4034f0 18 API calls 5596->5597 5602 403420 18 API calls 5596->5602 5603 4031e8 18 API calls 5596->5603 5605 407cb8 35 API calls 5596->5605 5597->5596 5601 408bfe 5598->5601 5599->5592 5600->5592 5620 404c20 5601->5620 5602->5596 5603->5596 5604->5592 5605->5596 5607 40322c 4 API calls 5606->5607 5608 409cab 5607->5608 5609 409cba MessageBoxA 5608->5609 5610 409ccf 5609->5610 5611 403198 4 API calls 5610->5611 5612 409cd7 5611->5612 5612->5471 5614 409af1 5613->5614 5615 409b09 5613->5615 5617 405890 18 API calls 5614->5617 5616 405890 18 API calls 5615->5616 5618 409b1a 5616->5618 5619 409b03 5617->5619 5618->5483 5619->5483 5749 402594 5620->5749 5622 404c2b 5622->5494 5623->5499 5625 405940 19 API calls 5624->5625 5626 405cb9 5625->5626 5627 405280 GetSystemDefaultLCID 5626->5627 5631 4052b6 5627->5631 5628 404cdc 19 API calls 5628->5631 5629 40520c 19 API calls 5629->5631 5630 4031e8 18 API calls 5630->5631 5631->5628 5631->5629 5631->5630 5632 405318 5631->5632 5633 404cdc 19 API calls 5632->5633 5634 40520c 19 API calls 5632->5634 5635 4031e8 18 API calls 5632->5635 5636 40539b 5632->5636 5633->5632 5634->5632 5635->5632 5637 4031b8 4 API calls 5636->5637 5638 4053b5 5637->5638 5639 4053c4 GetSystemDefaultLCID 5638->5639 5696 40520c GetLocaleInfoA 5639->5696 5642 4031e8 18 API calls 5643 405404 5642->5643 5644 40520c 19 API calls 5643->5644 5645 405419 5644->5645 5646 40520c 19 API calls 5645->5646 5647 40543d 5646->5647 5702 405258 GetLocaleInfoA 5647->5702 5650 405258 GetLocaleInfoA 5651 40546d 5650->5651 5652 40520c 19 API calls 5651->5652 5653 405487 5652->5653 5654 405258 GetLocaleInfoA 5653->5654 5655 4054a4 5654->5655 5656 40520c 19 API calls 5655->5656 5657 4054be 5656->5657 5658 4031e8 18 API calls 5657->5658 5659 4054cb 5658->5659 5660 40520c 19 API calls 5659->5660 5661 4054e0 5660->5661 5662 4031e8 18 API calls 5661->5662 5663 4054ed 5662->5663 5664 405258 GetLocaleInfoA 5663->5664 5665 4054fb 5664->5665 5666 40520c 19 API calls 5665->5666 5667 405515 5666->5667 5668 4031e8 18 API calls 5667->5668 5669 405522 5668->5669 5670 40520c 19 API calls 5669->5670 5671 405537 5670->5671 5672 4031e8 18 API calls 5671->5672 5673 405544 5672->5673 5674 40520c 19 API calls 5673->5674 5675 405559 5674->5675 5676 405576 5675->5676 5677 405567 5675->5677 5679 40322c 4 API calls 5676->5679 5704 40322c 5677->5704 5680 405574 5679->5680 5681 40520c 19 API calls 5680->5681 5682 405598 5681->5682 5683 4055b5 5682->5683 5684 4055a6 5682->5684 5686 403198 4 API calls 5683->5686 5685 40322c 4 API calls 5684->5685 5687 4055b3 5685->5687 5686->5687 5688 4033b4 18 API calls 5687->5688 5689 4055d7 5688->5689 5690 4033b4 18 API calls 5689->5690 5691 4055f1 5690->5691 5692 4031b8 4 API calls 5691->5692 5693 40560b 5692->5693 5694 405cf4 GetVersionExA 5693->5694 5695 405d0b 5694->5695 5695->5464 5697 405233 5696->5697 5698 405245 5696->5698 5699 403278 18 API calls 5697->5699 5700 40322c 4 API calls 5698->5700 5701 405243 5699->5701 5700->5701 5701->5642 5703 405274 5702->5703 5703->5650 5706 403230 5704->5706 5705 403252 5705->5680 5706->5705 5707 4025ac 4 API calls 5706->5707 5707->5705 5712 403414 5708->5712 5711 406fee 5711->5524 5713 403418 LoadLibraryA 5712->5713 5713->5711 5715 406af0 18 API calls 5714->5715 5716 406bf3 5715->5716 5717 406af0 18 API calls 5716->5717 5718 406c05 5716->5718 5717->5716 5719 403198 4 API calls 5718->5719 5720 406c1a 5719->5720 5720->5541 5722 407578 5721->5722 5723 4075b7 CreateFileA 5722->5723 5723->5558 5725 403414 5724->5725 5726 4075b7 CreateFileA 5725->5726 5726->5558 5728 407cd3 5727->5728 5730 407cc8 5727->5730 5733 407c5c 5728->5733 5730->5595 5732 405890 18 API calls 5732->5730 5734 407c70 5733->5734 5735 407caf 5733->5735 5734->5735 5737 407bac 5734->5737 5735->5730 5735->5732 5738 407bb7 5737->5738 5739 407bc8 5737->5739 5740 405890 18 API calls 5738->5740 5741 4074a0 34 API calls 5739->5741 5740->5739 5742 407bdc 5741->5742 5743 4074a0 34 API calls 5742->5743 5744 407bfd 5743->5744 5745 407918 InterlockedExchange 5744->5745 5746 407c12 5745->5746 5747 407c28 5746->5747 5748 405890 18 API calls 5746->5748 5747->5734 5748->5747 5750 402598 5749->5750 5752 4025a2 5749->5752 5755 401fd4 5750->5755 5751 40259e 5751->5752 5753 403154 4 API calls 5751->5753 5752->5622 5752->5752 5753->5752 5756 401fe8 5755->5756 5757 401fed 5755->5757 5766 401918 RtlInitializeCriticalSection 5756->5766 5759 402012 RtlEnterCriticalSection 5757->5759 5760 40201c 5757->5760 5763 401ff1 5757->5763 5759->5760 5760->5763 5773 401ee0 5760->5773 5763->5751 5764 402147 5764->5751 5765 40213d RtlLeaveCriticalSection 5765->5764 5767 40193c RtlEnterCriticalSection 5766->5767 5768 401946 5766->5768 5767->5768 5769 401964 LocalAlloc 5768->5769 5770 40197e 5769->5770 5771 4019c3 RtlLeaveCriticalSection 5770->5771 5772 4019cd 5770->5772 5771->5772 5772->5757 5776 401ef0 5773->5776 5774 401f1c 5777 401f40 5774->5777 5784 401d00 5774->5784 5776->5774 5776->5777 5779 401e58 5776->5779 5777->5764 5777->5765 5788 4016d8 5779->5788 5782 401e75 5782->5776 5785 401d4e 5784->5785 5786 401d1e 5784->5786 5785->5786 5857 401c68 5785->5857 5786->5777 5791 4016f4 5788->5791 5790 4016fe 5813 4015c4 5790->5813 5791->5790 5795 40174f 5791->5795 5797 40175b 5791->5797 5805 401430 5791->5805 5817 40132c 5791->5817 5794 40170a 5794->5797 5821 40150c 5795->5821 5797->5782 5798 401dcc 5797->5798 5831 401d80 5798->5831 5801 40132c LocalAlloc 5802 401df0 5801->5802 5804 401df8 5802->5804 5835 401b44 5802->5835 5804->5782 5806 40143f VirtualAlloc 5805->5806 5808 40146c 5806->5808 5809 40148f 5806->5809 5825 4012e4 5808->5825 5809->5791 5812 40147c VirtualFree 5812->5809 5815 40160a 5813->5815 5814 40163a 5814->5794 5815->5814 5816 401626 VirtualAlloc 5815->5816 5816->5814 5816->5815 5818 401348 5817->5818 5819 4012e4 LocalAlloc 5818->5819 5820 40138f 5819->5820 5820->5791 5824 40153b 5821->5824 5822 401594 5822->5797 5823 401568 VirtualFree 5823->5824 5824->5822 5824->5823 5828 40128c 5825->5828 5829 401298 LocalAlloc 5828->5829 5830 4012aa 5828->5830 5829->5830 5830->5809 5830->5812 5832 401d92 5831->5832 5833 401d89 5831->5833 5832->5801 5833->5832 5840 401b74 5833->5840 5836 401b61 5835->5836 5837 401b52 5835->5837 5836->5804 5838 401d00 9 API calls 5837->5838 5839 401b5f 5838->5839 5839->5804 5843 40215c 5840->5843 5842 401b95 5842->5832 5844 40217a 5843->5844 5845 402175 5843->5845 5847 4021ab RtlEnterCriticalSection 5844->5847 5848 40217e 5844->5848 5855 4021b5 5844->5855 5846 401918 4 API calls 5845->5846 5846->5844 5847->5855 5848->5842 5849 4021c1 5851 4022e3 RtlLeaveCriticalSection 5849->5851 5852 4022ed 5849->5852 5850 402244 5850->5848 5853 401d80 7 API calls 5850->5853 5851->5852 5852->5842 5853->5848 5854 402270 5854->5849 5856 401d00 7 API calls 5854->5856 5855->5849 5855->5850 5855->5854 5856->5849 5858 401c7a 5857->5858 5859 401c9d 5858->5859 5860 401caf 5858->5860 5870 40188c 5859->5870 5862 40188c 3 API calls 5860->5862 5863 401cad 5862->5863 5864 401b44 9 API calls 5863->5864 5869 401cc5 5863->5869 5865 401cd4 5864->5865 5866 401cee 5865->5866 5880 401b98 5865->5880 5885 4013a0 5866->5885 5869->5786 5871 4018b2 5870->5871 5879 40190b 5870->5879 5889 401658 5871->5889 5874 40132c LocalAlloc 5875 4018cf 5874->5875 5876 40150c VirtualFree 5875->5876 5877 4018e6 5875->5877 5876->5877 5878 4013a0 LocalAlloc 5877->5878 5877->5879 5878->5879 5879->5863 5881 401b9d 5880->5881 5883 401bab 5880->5883 5882 401b74 9 API calls 5881->5882 5884 401baa 5882->5884 5883->5866 5884->5866 5886 4013ab 5885->5886 5887 4012e4 LocalAlloc 5886->5887 5888 4013c6 5886->5888 5887->5888 5888->5869 5890 40168f 5889->5890 5891 4016cf 5890->5891 5892 4016a9 VirtualFree 5890->5892 5891->5874 5892->5890 6849 402dfa 6850 402e26 6849->6850 6851 402e0d 6849->6851 6853 402ba4 6851->6853 6854 402bc9 6853->6854 6855 402bad 6853->6855 6854->6850 6856 402bb5 RaiseException 6855->6856 6856->6854 6857 4075fa GetFileSize 6858 407626 6857->6858 6859 407616 GetLastError 6857->6859 6859->6858 6860 40761f 6859->6860 6861 40748c 35 API calls 6860->6861 6861->6858 6862 406ffb 6863 407008 SetErrorMode 6862->6863 6531 403a80 CloseHandle 6532 403a90 6531->6532 6533 403a91 GetLastError 6531->6533 6534 404283 6535 4042c3 6534->6535 6536 403154 4 API calls 6535->6536 6537 404323 6536->6537 6864 404185 6865 4041ff 6864->6865 6866 403154 4 API calls 6865->6866 6867 4041cc 6865->6867 6868 404323 6866->6868 6538 403e87 6539 403e4c 6538->6539 6540 403e62 6539->6540 6541 403e7b 6539->6541 6542 403e67 6539->6542 6547 403cc8 6540->6547 6543 402674 4 API calls 6541->6543 6545 403e78 6542->6545 6551 402674 6542->6551 6543->6545 6548 403cd6 6547->6548 6549 402674 4 API calls 6548->6549 6550 403ceb 6548->6550 6549->6550 6550->6542 6552 403154 4 API calls 6551->6552 6553 40267a 6552->6553 6553->6545 6562 407e90 6563 407eb8 VirtualFree 6562->6563 6564 407e9d 6563->6564 6567 403e95 6568 403e4c 6567->6568 6569 403e62 6568->6569 6570 403e7b 6568->6570 6571 403e67 6568->6571 6573 403cc8 4 API calls 6569->6573 6572 402674 4 API calls 6570->6572 6574 403e78 6571->6574 6575 402674 4 API calls 6571->6575 6572->6574 6573->6571 6575->6574 6576 40ac97 6585 4096fc 6576->6585 6579 402f24 5 API calls 6580 40aca1 6579->6580 6581 403198 4 API calls 6580->6581 6582 40acc0 6581->6582 6583 403198 4 API calls 6582->6583 6584 40acc8 6583->6584 6594 4056ac 6585->6594 6587 409745 6590 403198 4 API calls 6587->6590 6588 409717 6588->6587 6600 40720c 6588->6600 6592 40975a 6590->6592 6591 409735 6593 40973d MessageBoxA 6591->6593 6592->6579 6592->6580 6593->6587 6595 403154 4 API calls 6594->6595 6596 4056b1 6595->6596 6597 4056c9 6596->6597 6598 403154 4 API calls 6596->6598 6597->6588 6599 4056bf 6598->6599 6599->6588 6601 4056ac 4 API calls 6600->6601 6602 40721b 6601->6602 6603 407221 6602->6603 6604 40722f 6602->6604 6605 40322c 4 API calls 6603->6605 6607 40724b 6604->6607 6608 40723f 6604->6608 6606 40722d 6605->6606 6606->6591 6618 4032b8 6607->6618 6611 4071d0 6608->6611 6612 40322c 4 API calls 6611->6612 6613 4071df 6612->6613 6614 4071fc 6613->6614 6615 406950 CharPrevA 6613->6615 6614->6606 6616 4071eb 6615->6616 6616->6614 6617 4032fc 18 API calls 6616->6617 6617->6614 6619 403278 18 API calls 6618->6619 6620 4032c2 6619->6620 6620->6606 6621 403a97 6622 403aac 6621->6622 6623 403bbc GetStdHandle 6622->6623 6624 403b0e CreateFileA 6622->6624 6625 403ab2 6622->6625 6626 403c17 GetLastError 6623->6626 6638 403bba 6623->6638 6624->6626 6627 403b2c 6624->6627 6626->6625 6629 403b3b GetFileSize 6627->6629 6627->6638 6629->6626 6630 403b4e SetFilePointer 6629->6630 6630->6626 6634 403b6a ReadFile 6630->6634 6631 403be7 GetFileType 6631->6625 6633 403c02 CloseHandle 6631->6633 6633->6625 6634->6626 6635 403b8c 6634->6635 6636 403b9f SetFilePointer 6635->6636 6635->6638 6636->6626 6637 403bb0 SetEndOfFile 6636->6637 6637->6626 6637->6638 6638->6625 6638->6631 6643 40aaa2 6644 40aad2 6643->6644 6645 40aadc CreateWindowExA SetWindowLongA 6644->6645 6646 405194 33 API calls 6645->6646 6647 40ab5f 6646->6647 6648 4032fc 18 API calls 6647->6648 6649 40ab6d 6648->6649 6650 4032fc 18 API calls 6649->6650 6651 40ab7a 6650->6651 6652 406b7c 19 API calls 6651->6652 6653 40ab86 6652->6653 6654 4032fc 18 API calls 6653->6654 6655 40ab8f 6654->6655 6656 4099ec 43 API calls 6655->6656 6657 40aba1 6656->6657 6658 4098cc 19 API calls 6657->6658 6659 40abb4 6657->6659 6658->6659 6660 40abed 6659->6660 6661 4094d8 9 API calls 6659->6661 6662 40ac06 6660->6662 6665 40ac00 RemoveDirectoryA 6660->6665 6661->6660 6663 40ac1a 6662->6663 6664 40ac0f DestroyWindow 6662->6664 6666 40ac42 6663->6666 6667 40357c 4 API calls 6663->6667 6664->6663 6665->6662 6668 40ac38 6667->6668 6669 4025ac 4 API calls 6668->6669 6669->6666 6881 405ba2 6883 405ba4 6881->6883 6882 405be0 6886 405940 19 API calls 6882->6886 6883->6882 6884 405bf7 6883->6884 6885 405bda 6883->6885 6889 404cdc 19 API calls 6884->6889 6885->6882 6887 405c4c 6885->6887 6894 405bf3 6886->6894 6888 4059b0 33 API calls 6887->6888 6888->6894 6890 405c20 6889->6890 6892 4059b0 33 API calls 6890->6892 6891 403198 4 API calls 6893 405c86 6891->6893 6892->6894 6894->6891 6895 408da4 6896 408dc8 6895->6896 6897 408c80 18 API calls 6896->6897 6898 408dd1 6897->6898 6670 402caa 6671 403154 4 API calls 6670->6671 6672 402caf 6671->6672 6913 4011aa 6914 4011ac GetStdHandle 6913->6914 6673 4028ac 6674 402594 18 API calls 6673->6674 6675 4028b6 6674->6675 4984 40aab4 4985 40aab8 SetLastError 4984->4985 5016 409648 GetLastError 4985->5016 4989 40aad2 4990 40aadc CreateWindowExA SetWindowLongA 4989->4990 5029 405194 4990->5029 4994 40ab6d 4995 4032fc 18 API calls 4994->4995 4996 40ab7a 4995->4996 5046 406b7c GetCommandLineA 4996->5046 4999 4032fc 18 API calls 5000 40ab8f 4999->5000 5051 4099ec 5000->5051 5002 40aba1 5004 40abb4 5002->5004 5072 4098cc 5002->5072 5005 40abd4 5004->5005 5006 40abed 5004->5006 5078 4094d8 5005->5078 5008 40ac06 5006->5008 5011 40ac00 RemoveDirectoryA 5006->5011 5009 40ac1a 5008->5009 5010 40ac0f DestroyWindow 5008->5010 5015 40ac42 5009->5015 5086 40357c 5009->5086 5010->5009 5011->5008 5013 40ac38 5099 4025ac 5013->5099 5104 404c94 5016->5104 5024 4096c3 5119 4031b8 5024->5119 5030 4051a8 33 API calls 5029->5030 5031 4051a3 5030->5031 5032 4032fc 5031->5032 5033 403300 5032->5033 5034 40333f 5032->5034 5035 4031e8 5033->5035 5036 40330a 5033->5036 5034->4994 5042 403254 18 API calls 5035->5042 5043 4031fc 5035->5043 5037 403334 5036->5037 5038 40331d 5036->5038 5039 4034f0 18 API calls 5037->5039 5280 4034f0 5038->5280 5045 403322 5039->5045 5040 403228 5040->4994 5042->5043 5043->5040 5044 4025ac 4 API calls 5043->5044 5044->5040 5045->4994 5306 406af0 5046->5306 5048 406ba1 5049 403198 4 API calls 5048->5049 5050 406bbf 5049->5050 5050->4999 5320 4033b4 5051->5320 5053 409a27 5054 409a59 CreateProcessA 5053->5054 5055 409a65 5054->5055 5056 409a6c CloseHandle 5054->5056 5057 409648 35 API calls 5055->5057 5058 409a75 5056->5058 5057->5056 5059 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5058->5059 5060 409a7a MsgWaitForMultipleObjects 5059->5060 5060->5058 5061 409a91 5060->5061 5062 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5061->5062 5063 409a96 GetExitCodeProcess CloseHandle 5062->5063 5064 409ab6 5063->5064 5065 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5064->5065 5066 409abe 5065->5066 5066->5002 5067 402f24 5068 403154 4 API calls 5067->5068 5069 402f29 5068->5069 5326 402bcc 5069->5326 5071 402f51 5071->5071 5073 40990e 5072->5073 5074 4098d4 5072->5074 5073->5004 5074->5073 5075 403420 18 API calls 5074->5075 5076 409908 5075->5076 5329 408e80 5076->5329 5079 409532 5078->5079 5083 4094eb 5078->5083 5079->5006 5080 4094f3 Sleep 5080->5083 5081 409503 Sleep 5081->5083 5083->5079 5083->5080 5083->5081 5084 40951a GetLastError 5083->5084 5352 408fbc 5083->5352 5084->5079 5085 409524 GetLastError 5084->5085 5085->5079 5085->5083 5089 403591 5086->5089 5095 4035a0 5086->5095 5087 4035b1 5090 403198 4 API calls 5087->5090 5088 4035b8 5091 4031b8 4 API calls 5088->5091 5092 4035d0 5089->5092 5093 40359b 5089->5093 5094 4035b6 5089->5094 5090->5094 5091->5094 5092->5094 5097 40357c 4 API calls 5092->5097 5093->5095 5096 4035ec 5093->5096 5094->5013 5095->5087 5095->5088 5096->5094 5369 403554 5096->5369 5097->5092 5100 4025ba 5099->5100 5102 4025b0 5099->5102 5100->5015 5101 402632 5101->5101 5102->5100 5102->5101 5103 403154 4 API calls 5102->5103 5103->5101 5127 4051a8 5104->5127 5107 407284 FormatMessageA 5108 4072aa 5107->5108 5109 403278 18 API calls 5108->5109 5110 4072c7 5109->5110 5111 408da8 5110->5111 5112 408dc8 5111->5112 5270 408c80 5112->5270 5115 405890 5116 405897 5115->5116 5117 4031e8 18 API calls 5116->5117 5118 4058af 5117->5118 5118->5024 5121 4031be 5119->5121 5120 4031e3 5123 403198 5120->5123 5121->5120 5122 4025ac 4 API calls 5121->5122 5122->5121 5124 4031b7 5123->5124 5125 40319e 5123->5125 5124->4989 5124->5067 5125->5124 5126 4025ac 4 API calls 5125->5126 5126->5124 5128 4051c5 5127->5128 5135 404e58 5128->5135 5131 4051f1 5140 403278 5131->5140 5137 404e73 5135->5137 5136 404e85 5136->5131 5145 404be4 5136->5145 5137->5136 5148 404f7a 5137->5148 5155 404e4c 5137->5155 5141 403254 18 API calls 5140->5141 5142 403288 5141->5142 5143 403198 4 API calls 5142->5143 5144 4032a0 5143->5144 5144->5107 5262 405940 5145->5262 5147 404bf5 5147->5131 5149 404f8b 5148->5149 5152 404fd9 5148->5152 5149->5152 5153 40505f 5149->5153 5151 404ff7 5151->5137 5152->5151 5158 404df4 5152->5158 5153->5151 5162 404e38 5153->5162 5156 403198 4 API calls 5155->5156 5157 404e56 5156->5157 5157->5137 5159 404e02 5158->5159 5165 404bfc 5159->5165 5161 404e30 5161->5152 5192 4039a4 5162->5192 5168 4059b0 5165->5168 5167 404c15 5167->5161 5169 4059be 5168->5169 5178 404cdc LoadStringA 5169->5178 5172 405194 33 API calls 5173 4059f6 5172->5173 5181 4031e8 5173->5181 5176 4031b8 4 API calls 5177 405a1b 5176->5177 5177->5167 5179 403278 18 API calls 5178->5179 5180 404d09 5179->5180 5180->5172 5182 4031ec 5181->5182 5185 4031fc 5181->5185 5182->5185 5187 403254 5182->5187 5183 403228 5183->5176 5185->5183 5186 4025ac 4 API calls 5185->5186 5186->5183 5188 403274 5187->5188 5189 403258 5187->5189 5188->5185 5190 402594 18 API calls 5189->5190 5191 403261 5190->5191 5191->5185 5193 4039ab 5192->5193 5198 4038b4 5193->5198 5195 4039cb 5196 403198 4 API calls 5195->5196 5197 4039d2 5196->5197 5197->5151 5199 4038d5 5198->5199 5200 4038c8 5198->5200 5202 403934 5199->5202 5203 4038db 5199->5203 5226 403780 5200->5226 5204 403993 5202->5204 5205 40393b 5202->5205 5206 4038e1 5203->5206 5207 4038ee 5203->5207 5208 4037f4 3 API calls 5204->5208 5209 403941 5205->5209 5210 40394b 5205->5210 5233 403894 5206->5233 5212 403894 6 API calls 5207->5212 5215 4038d0 5208->5215 5248 403864 5209->5248 5214 4037f4 3 API calls 5210->5214 5216 4038fc 5212->5216 5217 40395d 5214->5217 5215->5195 5238 4037f4 5216->5238 5220 403864 23 API calls 5217->5220 5219 403917 5244 40374c 5219->5244 5221 403976 5220->5221 5224 40374c VariantClear 5221->5224 5223 40392c 5223->5195 5225 40398b 5224->5225 5225->5195 5227 4037f0 5226->5227 5228 403744 5226->5228 5227->5215 5228->5226 5229 4037ab 5228->5229 5230 403793 VariantClear 5228->5230 5231 4037dc VariantCopyInd 5228->5231 5232 403198 4 API calls 5228->5232 5229->5215 5230->5228 5231->5227 5231->5228 5232->5228 5253 4036b8 5233->5253 5236 40374c VariantClear 5237 4038a9 5236->5237 5237->5215 5239 403845 VariantChangeTypeEx 5238->5239 5240 40380a VariantChangeTypeEx 5238->5240 5241 403832 5239->5241 5242 403826 5240->5242 5241->5219 5243 40374c VariantClear 5242->5243 5243->5241 5245 403766 5244->5245 5246 403759 5244->5246 5245->5223 5246->5245 5247 403779 VariantClear 5246->5247 5247->5223 5259 40369c SysStringLen 5248->5259 5251 40374c VariantClear 5252 403882 5251->5252 5252->5215 5254 4036cb 5253->5254 5255 403706 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5254->5255 5256 4036db 5254->5256 5257 40372e 5255->5257 5258 4036ed MultiByteToWideChar SysAllocStringLen 5256->5258 5257->5236 5258->5257 5260 403610 21 API calls 5259->5260 5261 4036b3 5260->5261 5261->5251 5263 40594c 5262->5263 5264 404cdc 19 API calls 5263->5264 5265 405972 5264->5265 5266 4031e8 18 API calls 5265->5266 5267 40597d 5266->5267 5268 403198 4 API calls 5267->5268 5269 405992 5268->5269 5269->5147 5271 403198 4 API calls 5270->5271 5273 408cb1 5270->5273 5271->5273 5272 4031b8 4 API calls 5274 408d69 5272->5274 5275 408cc8 5273->5275 5276 403278 18 API calls 5273->5276 5278 408cdc 5273->5278 5279 4032fc 18 API calls 5273->5279 5274->5115 5277 4032fc 18 API calls 5275->5277 5276->5273 5277->5278 5278->5272 5279->5273 5281 4034fd 5280->5281 5288 40352d 5280->5288 5283 403526 5281->5283 5286 403509 5281->5286 5282 403198 4 API calls 5285 403517 5282->5285 5284 403254 18 API calls 5283->5284 5284->5288 5285->5045 5289 4025c4 5286->5289 5288->5282 5291 4025ca 5289->5291 5290 4025dc 5290->5285 5290->5290 5291->5290 5293 403154 5291->5293 5294 403164 5293->5294 5295 40318c TlsGetValue 5293->5295 5294->5290 5296 403196 5295->5296 5297 40316f 5295->5297 5296->5290 5301 40310c 5297->5301 5299 403174 TlsGetValue 5300 403184 5299->5300 5300->5290 5302 403120 LocalAlloc 5301->5302 5303 403116 5301->5303 5304 40313e TlsSetValue 5302->5304 5305 403132 5302->5305 5303->5302 5304->5305 5305->5299 5307 406b1c 5306->5307 5308 403278 18 API calls 5307->5308 5309 406b29 5308->5309 5316 403420 5309->5316 5311 406b31 5312 4031e8 18 API calls 5311->5312 5313 406b49 5312->5313 5314 403198 4 API calls 5313->5314 5315 406b6b 5314->5315 5315->5048 5317 403426 5316->5317 5319 403437 5316->5319 5318 403254 18 API calls 5317->5318 5317->5319 5318->5319 5319->5311 5321 4033bc 5320->5321 5322 403254 18 API calls 5321->5322 5323 4033cf 5322->5323 5324 4031e8 18 API calls 5323->5324 5325 4033f7 5324->5325 5327 402bd5 RaiseException 5326->5327 5328 402be6 5326->5328 5327->5328 5328->5071 5330 408e8e 5329->5330 5332 408ea6 5330->5332 5342 408e18 5330->5342 5333 408e18 18 API calls 5332->5333 5334 408eca 5332->5334 5333->5334 5345 407918 5334->5345 5336 408ee5 5337 408e18 18 API calls 5336->5337 5338 408ef8 5336->5338 5337->5338 5339 408e18 18 API calls 5338->5339 5340 403278 18 API calls 5338->5340 5341 408f27 5338->5341 5339->5338 5340->5338 5341->5073 5343 405890 18 API calls 5342->5343 5344 408e29 5343->5344 5344->5332 5348 4078c4 5345->5348 5349 4078d6 5348->5349 5350 4078e7 5348->5350 5351 4078db InterlockedExchange 5349->5351 5350->5336 5351->5350 5360 408f70 5352->5360 5354 408fd2 5355 408fd6 5354->5355 5356 408ff2 DeleteFileA GetLastError 5354->5356 5355->5083 5357 409010 5356->5357 5366 408fac 5357->5366 5361 408f7a 5360->5361 5362 408f7e 5360->5362 5361->5354 5363 408fa0 SetLastError 5362->5363 5364 408f87 Wow64DisableWow64FsRedirection 5362->5364 5365 408f9b 5363->5365 5364->5365 5365->5354 5367 408fb1 Wow64RevertWow64FsRedirection 5366->5367 5368 408fbb 5366->5368 5367->5368 5368->5083 5370 403566 5369->5370 5372 403578 5370->5372 5373 403604 5370->5373 5372->5096 5374 40357c 5373->5374 5379 4035d0 5374->5379 5380 40359b 5374->5380 5381 4035b6 5374->5381 5382 4035a0 5374->5382 5375 4035b1 5377 403198 4 API calls 5375->5377 5376 4035b8 5378 4031b8 4 API calls 5376->5378 5377->5381 5378->5381 5379->5381 5384 40357c 4 API calls 5379->5384 5380->5382 5383 4035ec 5380->5383 5381->5370 5382->5375 5382->5376 5383->5381 5385 403554 4 API calls 5383->5385 5384->5379 5385->5383 6676 401ab9 6677 401a96 6676->6677 6678 401aa9 RtlDeleteCriticalSection 6677->6678 6679 401a9f RtlLeaveCriticalSection 6677->6679 6679->6678

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 116 409b78-409b9c GetSystemInfo VirtualQuery 117 409ba2 116->117 118 409c2c-409c33 116->118 119 409c21-409c26 117->119 119->118 120 409ba4-409bab 119->120 121 409c0d-409c1f VirtualQuery 120->121 122 409bad-409bb1 120->122 121->118 121->119 122->121 123 409bb3-409bbb 122->123 124 409bcc-409bdd VirtualProtect 123->124 125 409bbd-409bc0 123->125 127 409be1-409be3 124->127 128 409bdf 124->128 125->124 126 409bc2-409bc5 125->126 126->124 129 409bc7-409bca 126->129 130 409bf2-409bf5 127->130 128->127 129->124 129->127 131 409be5-409bee call 409b70 130->131 132 409bf7-409bf9 130->132 131->130 132->121 133 409bfb-409c08 VirtualProtect 132->133 133->121
                                                    APIs
                                                    • GetSystemInfo.KERNEL32(?), ref: 00409B8A
                                                    • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B95
                                                    • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BD6
                                                    • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409C08
                                                    • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409C18
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Virtual$ProtectQuery$InfoSystem
                                                    • String ID:
                                                    • API String ID: 2441996862-0
                                                    • Opcode ID: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                    • Instruction ID: 4a1d84bb43d4a47cf168f169447d483ed62c711ee8ccb48f5bfbfd053dbeaed9
                                                    • Opcode Fuzzy Hash: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                    • Instruction Fuzzy Hash: D421A1B16043006BDA309AA99C85E57B7E8AF45360F144C2BFA99E72C3D239FC40C669
                                                    APIs
                                                    • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                    • Instruction ID: 1248db9972fbf410c55bf070b604c98f5d62b90992f8f49b6b6440a9954d2c50
                                                    • Opcode Fuzzy Hash: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                    • Instruction Fuzzy Hash: E2E0927170021427D710A9A99C86AEB725CEB58310F0002BFB904E73C6EDB49E804AED

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040A618), ref: 00404582
                                                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                    • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                    • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                    • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,0040A618), ref: 004045C6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModulePolicyProcess
                                                    • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                    • API String ID: 3256987805-3653653586
                                                    • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                    • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                    • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                    • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                    Control-flow Graph

                                                    APIs
                                                    • SetLastError.KERNEL32 ref: 0040AAC1
                                                      • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,021B1D64), ref: 0040966C
                                                    • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                    • SetWindowLongA.USER32(00020428,000000FC,00409960), ref: 0040AB15
                                                    • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                    • DestroyWindow.USER32(00020428,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$ErrorLast$CreateDestroyDirectoryLongRemove
                                                    • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                    • API String ID: 3757039580-3001827809
                                                    • Opcode ID: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
                                                    • Instruction ID: 81987b3bab642c92fe87a7372e0454594c4b8fe140ce311e0f93b1eeebf6ab37
                                                    • Opcode Fuzzy Hash: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
                                                    • Instruction Fuzzy Hash: 25412E70604204DBDB10EBA9EE89B9E37A5EB44304F10467FF510B72E2D7B89855CB9D

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090C4
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090DE
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                    • API String ID: 1646373207-2130885113
                                                    • Opcode ID: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                    • Instruction ID: 214dda5481ef482ebe311b1329301f35405b1013d97e3062c17ffb2c8286d57d
                                                    • Opcode Fuzzy Hash: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                    • Instruction Fuzzy Hash: 21017C70748342AEFB00BB76DD4AB163A68E785704F60457BF640BA2D3DABD4C04D66E

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                    • SetWindowLongA.USER32(00020428,000000FC,00409960), ref: 0040AB15
                                                      • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040AB86,?), ref: 00406B94
                                                      • Part of subcall function 004099EC: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021B1D64,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                      • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021B1D64,00409AD8,00000000), ref: 00409A70
                                                      • Part of subcall function 004099EC: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                      • Part of subcall function 004099EC: GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                      • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021B1D64,00409AD8), ref: 00409AA4
                                                    • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                    • DestroyWindow.USER32(00020428,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
                                                    • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                    • API String ID: 3586484885-3001827809
                                                    • Opcode ID: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
                                                    • Instruction ID: d3376fcde1141b4290a3dca450fc2844fa47922897975e075ebf06e3b6db64eb
                                                    • Opcode Fuzzy Hash: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
                                                    • Instruction Fuzzy Hash: 77411A71604204DFD714EBA9EE85B5A37B5EB48304F20427BF500BB2E1D7B8A855CB9D

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021B1D64,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                    • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021B1D64,00409AD8,00000000), ref: 00409A70
                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                    • GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                    • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021B1D64,00409AD8), ref: 00409AA4
                                                      • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,021B1D64), ref: 0040966C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                    • String ID: D
                                                    • API String ID: 3356880605-2746444292
                                                    • Opcode ID: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                    • Instruction ID: b58d0f6e2b8975977e6c7b71aada5392bea55c03070ce9fad3dcef5aa6d4018a
                                                    • Opcode Fuzzy Hash: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                    • Instruction Fuzzy Hash: EE1142B16402486EDB00EBE6CC42F9EB7ACEF49714F50013BB604F72C6DA785D048A69

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 136 401918-40193a RtlInitializeCriticalSection 137 401946-40197c call 4012dc * 3 LocalAlloc 136->137 138 40193c-401941 RtlEnterCriticalSection 136->138 145 4019ad-4019c1 137->145 146 40197e 137->146 138->137 149 4019c3-4019c8 RtlLeaveCriticalSection 145->149 150 4019cd 145->150 148 401983-401995 146->148 148->148 151 401997-4019a6 148->151 149->150 151->145
                                                    APIs
                                                    • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                    • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                    • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                    • String ID:
                                                    • API String ID: 730355536-0
                                                    • Opcode ID: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                    • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                    • Opcode Fuzzy Hash: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                    • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D

                                                    Control-flow Graph

                                                    APIs
                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Message
                                                    • String ID: .tmp$y@
                                                    • API String ID: 2030045667-2396523267
                                                    • Opcode ID: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
                                                    • Instruction ID: 5e9257013af3d55ef2b6e359c41f87f67318ae2a4e6dbf07461b5d8c6de74657
                                                    • Opcode Fuzzy Hash: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
                                                    • Instruction Fuzzy Hash: 3B41C030704200CFD311EF25DED1A1A77A5EB49304B214A3AF804B73E1CAB9AC11CBAD

                                                    Control-flow Graph

                                                    APIs
                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Message
                                                    • String ID: .tmp$y@
                                                    • API String ID: 2030045667-2396523267
                                                    • Opcode ID: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
                                                    • Instruction ID: 95bba075cf9db07042691c1556ef0613dbe482a65a3614fff4d0ead14828e6f7
                                                    • Opcode Fuzzy Hash: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
                                                    • Instruction Fuzzy Hash: E341BE30700200DFC711EF65DED2A1A77A5EB49304B104A3AF804B73E2CAB9AC01CBAD

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                    • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID: .tmp
                                                    • API String ID: 1375471231-2986845003
                                                    • Opcode ID: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                    • Instruction ID: b240cf9bc22f775501a2d99da134be40bb2f76fb21a7d6e050461713caae6e8b
                                                    • Opcode Fuzzy Hash: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                    • Instruction Fuzzy Hash: 9E216774A00208ABDB05EFA1C8429DFB7B8EF88304F50457BE901B73C2DA3C9E058A65

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 342 407749-40774a 343 4076dc-4076e6 WriteFile 342->343 344 40774c-40776f 342->344 346 4076e8-4076ea call 40748c 343->346 347 4076ef-4076f2 343->347 345 407770-407785 344->345 348 407787 345->348 349 4077f9 345->349 346->347 351 407700-407704 347->351 352 4076f4-4076fb call 4073ec 347->352 353 40778a-40778f 348->353 354 4077fd-407802 348->354 355 40783b-40783d 349->355 356 4077fb 349->356 352->351 360 407803-407819 353->360 362 407791-407792 353->362 354->360 358 407841-407843 355->358 356->354 361 40785b-40785c 358->361 360->361 372 40781b 360->372 363 4078d6-4078eb call 407890 InterlockedExchange 361->363 364 40785e-40788c 361->364 365 407724-407741 362->365 366 407794-4077b4 362->366 385 407912-407917 363->385 386 4078ed-407910 363->386 381 407820-407823 364->381 382 407890-407893 364->382 368 407743 365->368 369 4077b5 365->369 366->369 373 407746-407747 368->373 374 4077b9 368->374 377 4077b6-4077b7 369->377 378 4077f7-4077f8 369->378 379 40781e-40781f 372->379 373->342 380 4077bb-4077cd 373->380 374->380 377->374 378->349 379->381 380->358 387 4077cf-4077d4 380->387 384 407898 381->384 388 407824 381->388 382->384 389 40789a 384->389 386->385 386->386 387->355 392 4077d6-4077de 387->392 388->389 391 407825 388->391 395 40789f 389->395 393 407896-407897 391->393 394 407826-40782d 391->394 392->345 405 4077e0 392->405 393->384 397 4078a1 394->397 398 40782f 394->398 395->397 402 4078a3 397->402 403 4078ac 397->403 400 407832-407833 398->400 401 4078a5-4078aa 398->401 400->355 400->379 404 4078ae-4078af 401->404 402->401 403->404 404->395 406 4078b1-4078bd 404->406 405->378 406->384 407 4078bf-4078c0 406->407
                                                    APIs
                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                    • Instruction ID: 20d0a63744b7af467993d3e8aec565234b7be2d060ba20bf9fd199bb98bd5a4e
                                                    • Opcode Fuzzy Hash: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                    • Instruction Fuzzy Hash: 8251D12294D2910FC7126B7849685A53FE0FE5331132E92FBC5C1AB1A3D27CA847D35B

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 408 401fd4-401fe6 409 401fe8 call 401918 408->409 410 401ffb-402010 408->410 414 401fed-401fef 409->414 412 402012-402017 RtlEnterCriticalSection 410->412 413 40201c-402025 410->413 412->413 415 402027 413->415 416 40202c-402032 413->416 414->410 419 401ff1-401ff6 414->419 415->416 417 402038-40203c 416->417 418 4020cb-4020d1 416->418 420 402041-402050 417->420 421 40203e 417->421 423 4020d3-4020e0 418->423 424 40211d-40211f call 401ee0 418->424 422 40214f-402158 419->422 420->418 425 402052-402060 420->425 421->420 427 4020e2-4020ea 423->427 428 4020ef-40211b call 402f54 423->428 432 402124-40213b 424->432 430 402062-402066 425->430 431 40207c-402080 425->431 427->428 428->422 434 402068 430->434 435 40206b-40207a 430->435 437 402082 431->437 438 402085-4020a0 431->438 439 402147 432->439 440 40213d-402142 RtlLeaveCriticalSection 432->440 434->435 441 4020a2-4020c6 call 402f54 435->441 437->438 438->441 440->439 441->422
                                                    APIs
                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00402148), ref: 00402017
                                                      • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                      • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                      • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                      • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                    • String ID:
                                                    • API String ID: 296031713-0
                                                    • Opcode ID: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                    • Instruction ID: b272be6629c35a549fc4f1c5a19e6e0df2414f51bb24a7fd7fb800939d1160d0
                                                    • Opcode Fuzzy Hash: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                    • Instruction Fuzzy Hash: D4419CB2A40711DFDB108F69DEC562A77A0FB58314B25837AD984B73E1D378A842CB48

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 444 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                    • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLibraryLoadMode
                                                    • String ID:
                                                    • API String ID: 2987862817-0
                                                    • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                    • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                    • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                    • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568
                                                    APIs
                                                    • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                    • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021B03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$FilePointer
                                                    • String ID:
                                                    • API String ID: 1156039329-0
                                                    • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                    • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                    • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                    • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 448 40762c-40764a ReadFile 449 407663-40766a 448->449 450 40764c-407650 448->450 451 407652-40765a GetLastError 450->451 452 40765c-40765e call 40748c 450->452 451->449 451->452 452->449
                                                    APIs
                                                    • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                    • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastRead
                                                    • String ID:
                                                    • API String ID: 1948546556-0
                                                    • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                    • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                    • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                    • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB
                                                    APIs
                                                    • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                    • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021B03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$FilePointer
                                                    • String ID:
                                                    • API String ID: 1156039329-0
                                                    • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                    • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                    • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                    • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Virtual$AllocFree
                                                    • String ID:
                                                    • API String ID: 2087232378-0
                                                    • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                    • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                    • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                    • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                    APIs
                                                    • GetSystemDefaultLCID.KERNEL32(00000000,004053B6), ref: 0040529F
                                                      • Part of subcall function 00404CDC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CF9
                                                      • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: DefaultInfoLoadLocaleStringSystem
                                                    • String ID:
                                                    • API String ID: 1658689577-0
                                                    • Opcode ID: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                    • Instruction ID: b95c725f163960c8622ba1b0af82130980b93a97e76f79286a035b518bc8de08
                                                    • Opcode Fuzzy Hash: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                    • Instruction Fuzzy Hash: 90314F75E01509ABCB00DF95C8C19EEB379FF84304F158577E815BB286E739AE068B98
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                    • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                    • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                    • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                    • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                    • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                    • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                    • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                    • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                    • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                    APIs
                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021B03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastWrite
                                                    • String ID:
                                                    • API String ID: 442123175-0
                                                    • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                    • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                    • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                    • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                    APIs
                                                    • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FormatMessage
                                                    • String ID:
                                                    • API String ID: 1306739567-0
                                                    • Opcode ID: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                    • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                    • Opcode Fuzzy Hash: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                    • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                    APIs
                                                    • SetEndOfFile.KERNEL32(?,021C8000,0040AA59,00000000), ref: 004076B3
                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021B03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLast
                                                    • String ID:
                                                    • API String ID: 734332943-0
                                                    • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                    • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                    • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                    • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                    APIs
                                                    • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                    • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                    • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                    • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                    APIs
                                                    • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                    • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                    • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                    • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                    APIs
                                                    • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CharPrev
                                                    • String ID:
                                                    • API String ID: 122130370-0
                                                    • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                    • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                    • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                    • Instruction Fuzzy Hash:
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                    • Instruction ID: 1e7236936b067224bcb0a7c190bcfb18a105a15b1652d3161176e1d0ad605fa4
                                                    • Opcode Fuzzy Hash: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                    • Instruction Fuzzy Hash: 43116371A042059BDB00EF19C881B5B7794AF44359F05807AF958AB2C6DB38E800CBAA
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID:
                                                    • API String ID: 1263568516-0
                                                    • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                    • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                    • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                    • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                    • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                    • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                    • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID:
                                                    • API String ID: 1263568516-0
                                                    • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                    • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                    • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                    • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040949D
                                                    • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004094A2
                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                    • String ID: SeShutdownPrivilege
                                                    • API String ID: 107509674-3733053543
                                                    • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                    • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                    • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                    • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                    APIs
                                                    • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409C3E
                                                    • SizeofResource.KERNEL32(00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 00409C51
                                                    • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000), ref: 00409C63
                                                    • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92), ref: 00409C74
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLockSizeof
                                                    • String ID:
                                                    • API String ID: 3473537107-0
                                                    • Opcode ID: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                    • Instruction ID: 5c2a5118689e511edc0a9dde7e1b9e77d0383d271af581b44440e1e73e890ea9
                                                    • Opcode Fuzzy Hash: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                    • Instruction Fuzzy Hash: B0E07E80B8874726FA6576FB08C7B6B008C4BA570EF00003BB700792C3DDBC8C04462E
                                                    APIs
                                                    • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                    • Instruction ID: 1db3d1c1bb6fab5f91442dea8a08a829cd161d84d3a7e1f0c2fe21aaaafd944f
                                                    • Opcode Fuzzy Hash: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                    • Instruction Fuzzy Hash: 9ED02EA230E2006AE210808B2C84EBB4A9CCEC53A0F00007FF648C3242D2208C029B76
                                                    APIs
                                                    • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: SystemTime
                                                    • String ID:
                                                    • API String ID: 2656138-0
                                                    • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                    • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                    • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                    • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                    APIs
                                                    • GetVersionExA.KERNEL32(?,004065F0,00000000,004065FE,?,?,?,?,?,0040A622), ref: 00405D02
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Version
                                                    • String ID:
                                                    • API String ID: 1889659487-0
                                                    • Opcode ID: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                    • Instruction ID: 4c33b40dd65743d8d98a5ffd827b1eb297e5dd4f71424004bfe2d5ab9b26ea54
                                                    • Opcode Fuzzy Hash: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                    • Instruction Fuzzy Hash: 00C0126040070186D7109B31DC02B1672D4AB44310F4405396DA4963C2E73C80018A6E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                    • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                    • Opcode Fuzzy Hash: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                    • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 0040704D
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 004070A1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressCloseHandleModuleProc
                                                    • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                    • API String ID: 4190037839-2401316094
                                                    • Opcode ID: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                    • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                    • Opcode Fuzzy Hash: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                    • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                    • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                    • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                    • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                    • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                    • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                    • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                    • String ID:
                                                    • API String ID: 1694776339-0
                                                    • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                    • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                    • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                    • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                    APIs
                                                    • GetSystemDefaultLCID.KERNEL32(00000000,0040560C,?,?,?,?,00000000,00000000,00000000,?,004065EB,00000000,004065FE), ref: 004053DE
                                                      • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                      • Part of subcall function 00405258: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale$DefaultSystem
                                                    • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                    • API String ID: 1044490935-665933166
                                                    • Opcode ID: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                    • Instruction ID: cc137df54ae1fcbb63b87987e69a719e9c27c4b31815d0debc5c9b1d2781c89a
                                                    • Opcode Fuzzy Hash: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                    • Instruction Fuzzy Hash: F8515374B00548ABDB00EBA59891A5F7769DB88304F50D5BBB515BB3C6CA3DCA058F1C
                                                    APIs
                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                    • LocalFree.KERNEL32(006DA550,00000000,00401AB4), ref: 00401A1B
                                                    • VirtualFree.KERNEL32(?,00000000,00008000,006DA550,00000000,00401AB4), ref: 00401A3A
                                                    • LocalFree.KERNEL32(006DB550,?,00000000,00008000,006DA550,00000000,00401AB4), ref: 00401A79
                                                    • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                    • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                    • String ID:
                                                    • API String ID: 3782394904-0
                                                    • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                    • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                    • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                    • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                    APIs
                                                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                    • ExitProcess.KERNEL32 ref: 00403DE5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ExitMessageProcess
                                                    • String ID: Error$Runtime error at 00000000$9@
                                                    • API String ID: 1220098344-1503883590
                                                    • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                    • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                    • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                    • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                    • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                    • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$AllocString
                                                    • String ID:
                                                    • API String ID: 262959230-0
                                                    • Opcode ID: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                    • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                    • Opcode Fuzzy Hash: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                    • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                    APIs
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,00409918,00000000), ref: 00406E4C
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID: )q@
                                                    • API String ID: 3660427363-2284170586
                                                    • Opcode ID: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                    • Instruction ID: 22a93fbabe645b78fd14ced98f65bd4bcb22fe3fd6f8222f7fa8e6a3c98f8dfc
                                                    • Opcode Fuzzy Hash: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                    • Instruction Fuzzy Hash: E6415E31D0021AAFDB21DF95C881BAFB7B8EB04704F56447AE901F7280D738AF108B99
                                                    APIs
                                                    • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 00409CBD
                                                    Strings
                                                    • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 00409CA1
                                                    • Setup, xrefs: 00409CAD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Message
                                                    • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
                                                    • API String ID: 2030045667-3271211647
                                                    • Opcode ID: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                    • Instruction ID: b8b600ed6bdfe48e96a015bdf4867c85bc36f5512d0f27a60c0f94c744360238
                                                    • Opcode Fuzzy Hash: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                    • Instruction Fuzzy Hash: 8EE0E5302482087EE311EA528C13F6A7BACE789B04F600477F900B15C3D6786E00A068
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(00000000,0040A60E), ref: 004030E3
                                                    • GetCommandLineA.KERNEL32(00000000,0040A60E), ref: 004030EE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CommandHandleLineModule
                                                    • String ID: U1hd.@
                                                    • API String ID: 2123368496-2904493091
                                                    • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                    • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                    • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                    • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                    APIs
                                                    • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 004094F7
                                                    • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409507
                                                    • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 0040951A
                                                    • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409524
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2928176733.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2928139024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928211787.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2928242616.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastSleep
                                                    • String ID:
                                                    • API String ID: 1458359878-0
                                                    • Opcode ID: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                    • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                    • Opcode Fuzzy Hash: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                    • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                    Execution Graph

                                                    Execution Coverage:15.6%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:4.9%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:54
                                                    execution_graph 50403 40cd00 50404 40cd12 50403->50404 50405 40cd0d 50403->50405 50407 406f48 CloseHandle 50405->50407 50407->50404 54064 42f520 54065 42f52b 54064->54065 54066 42f52f NtdllDefWindowProc_A 54064->54066 54066->54065 50408 480b4b 50409 480b54 50408->50409 50410 480b7f 50408->50410 50409->50410 50411 480b71 50409->50411 50414 480bbe 50410->50414 50869 47f5f8 18 API calls 50410->50869 50867 476da4 202 API calls 50411->50867 50413 480be2 50421 480c1e 50413->50421 50422 480c00 50413->50422 50414->50413 50417 480bd5 50414->50417 50418 480bd7 50414->50418 50416 480bb1 50870 47f660 56 API calls 50416->50870 50425 47f63c 56 API calls 50417->50425 50871 47f6d0 56 API calls 50418->50871 50419 480b76 50419->50410 50868 408be0 19 API calls 50419->50868 50874 47f490 38 API calls 50421->50874 50426 480c15 50422->50426 50872 47f660 56 API calls 50422->50872 50425->50413 50873 47f490 38 API calls 50426->50873 50430 480c1c 50431 480c2e 50430->50431 50432 480c34 50430->50432 50433 480c32 50431->50433 50534 47f63c 50431->50534 50432->50433 50434 47f63c 56 API calls 50432->50434 50539 47c7c0 50433->50539 50434->50433 50437 480c5b 50613 47cce8 50437->50613 50954 47f124 56 API calls 50534->50954 50536 47f657 50955 408be0 19 API calls 50536->50955 50956 42d898 GetWindowsDirectoryA 50539->50956 50541 47c7e4 50542 403450 18 API calls 50541->50542 50543 47c7f1 50542->50543 50958 42d8c4 GetSystemDirectoryA 50543->50958 50545 47c7f9 50546 403450 18 API calls 50545->50546 50547 47c806 50546->50547 50960 42d8f0 50547->50960 50549 47c80e 50550 403450 18 API calls 50549->50550 50551 47c81b 50550->50551 50552 47c824 50551->50552 50553 47c840 50551->50553 51016 42d208 50552->51016 50555 403400 4 API calls 50553->50555 50557 47c83e 50555->50557 50559 47c885 50557->50559 51024 42c8cc 50557->51024 50558 403450 18 API calls 50558->50557 50964 47c648 50559->50964 50564 403450 18 API calls 50566 47c86d 50564->50566 50565 403450 18 API calls 50567 47c8a1 50565->50567 50566->50559 50569 403450 18 API calls 50566->50569 50568 47c8bf 50567->50568 50570 4035c0 18 API calls 50567->50570 50571 47c648 22 API calls 50568->50571 50569->50559 50570->50568 50572 47c8ce 50571->50572 50573 403450 18 API calls 50572->50573 50574 47c8db 50573->50574 50575 47c903 50574->50575 50576 42c3fc 19 API calls 50574->50576 50577 47c96a 50575->50577 50580 47c648 22 API calls 50575->50580 50578 47c8f1 50576->50578 50579 47ca32 50577->50579 50582 47c98a SHGetKnownFolderPath 50577->50582 50581 4035c0 18 API calls 50578->50581 50584 47ca5c 50579->50584 50585 47ca3b 50579->50585 50583 47c91b 50580->50583 50581->50575 50588 47c9a4 50582->50588 50589 47c9df SHGetKnownFolderPath 50582->50589 50590 403450 18 API calls 50583->50590 50975 42c3fc 50584->50975 50586 42c3fc 19 API calls 50585->50586 50591 47ca48 50586->50591 51034 403ba4 21 API calls 50588->51034 50589->50579 50595 47c9f9 50589->50595 50594 47c928 50590->50594 50596 4035c0 18 API calls 50591->50596 50592 47ca69 50985 4035c0 50592->50985 50599 47c93b 50594->50599 51032 453344 18 API calls 50594->51032 51035 403ba4 21 API calls 50595->51035 50601 47ca5a 50596->50601 50598 47c9bf CoTaskMemFree 50598->50437 50604 47c648 22 API calls 50599->50604 51007 47c72c 50601->51007 50603 47ca14 CoTaskMemFree 50603->50437 50606 47c94a 50604->50606 50607 403450 18 API calls 50606->50607 50609 47c957 50607->50609 50609->50577 51033 453344 18 API calls 50609->51033 50610 403400 4 API calls 50611 47ca95 50610->50611 50611->50437 50614 47ccf0 50613->50614 50614->50614 51149 453a24 50614->51149 50867->50419 50869->50416 50870->50414 50871->50413 50872->50426 50873->50430 50874->50430 50954->50536 50957 42d8b9 50956->50957 50957->50541 50959 42d8e5 50958->50959 50959->50545 50961 403400 4 API calls 50960->50961 50962 42d900 GetModuleHandleA GetProcAddress 50961->50962 50963 42d919 50962->50963 50963->50549 51036 42de1c 50964->51036 50966 47c66e 50967 47c694 50966->50967 50968 47c672 50966->50968 50970 403400 4 API calls 50967->50970 51039 42dd4c 50968->51039 50972 47c69b 50970->50972 50972->50565 50973 47c689 RegCloseKey 50973->50972 50974 403400 4 API calls 50974->50973 50976 42c406 50975->50976 50977 42c429 50975->50977 51123 42c97c CharPrevA 50976->51123 50978 403494 4 API calls 50977->50978 50980 42c432 50978->50980 50980->50592 50981 42c40d 50981->50977 50982 42c418 50981->50982 50983 4035c0 18 API calls 50982->50983 50984 42c426 50983->50984 50984->50592 50986 4035c4 50985->50986 50987 40357c 50985->50987 50986->50987 50988 403450 50986->50988 50991 4035e2 50986->50991 50992 4035d4 50986->50992 50987->50988 50994 4035bf 50987->50994 50997 40358a 50987->50997 50989 403464 50988->50989 50993 4034bc 18 API calls 50988->50993 50990 403490 50989->50990 51124 402660 50989->51124 50990->50601 50996 4034bc 18 API calls 50991->50996 50995 403450 18 API calls 50992->50995 50993->50989 50994->50601 50995->50987 51003 4035f5 50996->51003 50998 4035b4 50997->50998 50999 40359d 50997->50999 51002 4038a4 18 API calls 50998->51002 51001 4038a4 18 API calls 50999->51001 51005 4035a2 51001->51005 51002->51005 51004 403450 18 API calls 51003->51004 51006 403621 51004->51006 51005->50601 51006->50601 51008 47c73a 51007->51008 51009 42de1c RegOpenKeyExA 51008->51009 51010 47c762 51009->51010 51011 47c793 51010->51011 51012 42dd4c 20 API calls 51010->51012 51011->50610 51013 47c778 51012->51013 51014 42dd4c 20 API calls 51013->51014 51015 47c78a RegCloseKey 51014->51015 51015->51011 51017 4038a4 18 API calls 51016->51017 51018 42d21b 51017->51018 51019 42d232 GetEnvironmentVariableA 51018->51019 51023 42d245 51018->51023 51129 42dbd0 18 API calls 51018->51129 51019->51018 51020 42d23e 51019->51020 51021 403400 4 API calls 51020->51021 51021->51023 51023->50558 51130 42c674 51024->51130 51027 42c8e0 51029 403400 4 API calls 51027->51029 51028 42c8e9 51133 403778 51028->51133 51031 42c8e7 51029->51031 51031->50564 51032->50599 51033->50577 51034->50598 51035->50603 51037 42de27 51036->51037 51038 42de2d RegOpenKeyExA 51036->51038 51037->51038 51038->50966 51042 42dc00 51039->51042 51043 42dc26 RegQueryValueExA 51042->51043 51048 42dc49 51043->51048 51058 42dc6b 51043->51058 51044 403400 4 API calls 51046 42dd37 51044->51046 51045 42dc63 51047 403400 4 API calls 51045->51047 51046->50973 51046->50974 51047->51058 51048->51045 51048->51058 51059 4034e0 51048->51059 51064 403744 51048->51064 51051 42dca0 RegQueryValueExA 51051->51043 51052 42dcbc 51051->51052 51052->51058 51068 4038a4 51052->51068 51055 42dd10 51056 403450 18 API calls 51055->51056 51056->51058 51057 403744 18 API calls 51057->51055 51058->51044 51077 4034bc 51059->51077 51061 4034f0 51062 403400 4 API calls 51061->51062 51063 403508 51062->51063 51063->51048 51065 40374a 51064->51065 51067 40375b 51064->51067 51066 4034bc 18 API calls 51065->51066 51065->51067 51066->51067 51067->51051 51069 4038b1 51068->51069 51076 4038e1 51068->51076 51070 4038da 51069->51070 51072 4038bd 51069->51072 51073 4034bc 18 API calls 51070->51073 51071 403400 4 API calls 51074 4038cb 51071->51074 51122 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51072->51122 51073->51076 51074->51055 51074->51057 51076->51071 51078 4034c0 51077->51078 51079 4034dc 51077->51079 51082 402648 51078->51082 51079->51061 51081 4034c9 51081->51061 51083 40264c 51082->51083 51085 402656 51082->51085 51088 402088 51083->51088 51084 402652 51084->51085 51099 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51084->51099 51085->51081 51085->51085 51089 40209c 51088->51089 51090 4020a1 51088->51090 51100 4019cc RtlInitializeCriticalSection 51089->51100 51091 4020c6 RtlEnterCriticalSection 51090->51091 51093 4020d0 51090->51093 51096 4020a5 51090->51096 51091->51093 51093->51096 51107 401f94 51093->51107 51096->51084 51097 4021f1 RtlLeaveCriticalSection 51098 4021fb 51097->51098 51098->51084 51099->51085 51101 4019f0 RtlEnterCriticalSection 51100->51101 51102 4019fa 51100->51102 51101->51102 51103 401a18 LocalAlloc 51102->51103 51104 401a32 51103->51104 51105 401a81 51104->51105 51106 401a77 RtlLeaveCriticalSection 51104->51106 51105->51090 51106->51105 51110 401fa4 51107->51110 51108 401fd0 51112 401ff4 51108->51112 51118 401db4 51108->51118 51110->51108 51110->51112 51113 401f0c 51110->51113 51112->51097 51112->51098 51114 40178c LocalAlloc VirtualAlloc VirtualFree VirtualFree VirtualAlloc 51113->51114 51115 401f1c 51114->51115 51116 401e80 9 API calls 51115->51116 51117 401f29 51115->51117 51116->51117 51117->51110 51119 401e02 51118->51119 51120 401dd2 51118->51120 51119->51120 51121 401d1c 9 API calls 51119->51121 51120->51112 51121->51120 51122->51074 51123->50981 51125 402664 51124->51125 51126 40266e 51124->51126 51125->51126 51128 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51125->51128 51126->50990 51126->51126 51128->51126 51129->51018 51140 42c67c 51130->51140 51132 42c67b 51132->51027 51132->51028 51134 4037aa 51133->51134 51135 40377d 51133->51135 51136 403400 4 API calls 51134->51136 51135->51134 51138 403791 51135->51138 51137 4037a0 51136->51137 51137->51031 51139 4034e0 18 API calls 51138->51139 51139->51137 51143 42c68d 51140->51143 51141 42c6f1 51144 42c6ec 51141->51144 51148 42c444 IsDBCSLeadByte 51141->51148 51143->51141 51145 42c6ab 51143->51145 51144->51132 51145->51144 51147 42c444 IsDBCSLeadByte 51145->51147 51147->51145 51148->51144 51156 453a44 51149->51156 51152 453a69 CreateDirectoryA 51153 453ae1 51152->51153 51154 453a73 GetLastError 51152->51154 51155 403494 4 API calls 51153->51155 51154->51156 51157 453aeb 51155->51157 51156->51152 51158 451458 18 API calls 51156->51158 51163 42e8c8 19 API calls 51156->51163 51165 451428 18 API calls 51156->51165 51205 42da18 51156->51205 51228 4537b0 51156->51228 51247 406d68 33 API calls 51156->51247 51248 408c0c 18 API calls 51156->51248 51159 403420 4 API calls 51157->51159 51158->51156 51160 453b05 51159->51160 51162 403420 4 API calls 51160->51162 51164 453b12 51162->51164 51163->51156 51165->51156 51206 42d208 19 API calls 51205->51206 51207 42da3e 51206->51207 51208 42da4a 51207->51208 51258 42cd48 51207->51258 51210 42d208 19 API calls 51208->51210 51212 42da96 51208->51212 51211 42da5a 51210->51211 51214 42cd48 21 API calls 51211->51214 51215 42da66 51211->51215 51249 42c804 51212->51249 51214->51215 51215->51212 51216 42d208 19 API calls 51215->51216 51225 42da8b 51215->51225 51225->51212 51229 4537d0 51228->51229 51230 42c3fc 19 API calls 51229->51230 51231 4537e9 51230->51231 51232 403494 4 API calls 51231->51232 51239 4537f4 51232->51239 51234 42cbc0 20 API calls 51234->51239 51236 451458 18 API calls 51236->51239 51239->51234 51239->51236 51240 453870 51239->51240 51280 45373c 51239->51280 51288 403634 51239->51288 51294 4529f0 51239->51294 51302 408c0c 18 API calls 51239->51302 51241 403494 4 API calls 51240->51241 51247->51156 51248->51156 51261 403738 51249->51261 51263 42cccc 51258->51263 51262 40373c GetFullPathNameA 51261->51262 51269 42cbc0 51263->51269 51270 42c67c IsDBCSLeadByte 51269->51270 51273 42cbd1 51270->51273 51281 403400 4 API calls 51280->51281 51289 40363c 51288->51289 51310 452724 51294->51310 51302->51239 53268 416b42 53269 416bea 53268->53269 53270 416b5a 53268->53270 53287 41531c 18 API calls 53269->53287 53272 416b74 SendMessageA 53270->53272 53273 416b68 53270->53273 53283 416bc8 53272->53283 53274 416b72 CallWindowProcA 53273->53274 53275 416b8e 53273->53275 53274->53283 53284 41a058 GetSysColor 53275->53284 53278 416b99 SetTextColor 53279 416bae 53278->53279 53285 41a058 GetSysColor 53279->53285 53281 416bb3 SetBkColor 53286 41a6e0 GetSysColor CreateBrushIndirect 53281->53286 53284->53278 53285->53281 53286->53283 53287->53283 54067 4358e0 54068 4358f5 54067->54068 54072 43590f 54068->54072 54073 4352c8 54068->54073 54079 435312 54073->54079 54082 4352f8 54073->54082 54074 403400 4 API calls 54075 435717 54074->54075 54075->54072 54086 435728 18 API calls 54075->54086 54076 446da4 18 API calls 54076->54082 54077 403450 18 API calls 54077->54082 54078 402648 18 API calls 54078->54082 54079->54074 54080 431ca0 18 API calls 54080->54082 54082->54076 54082->54077 54082->54078 54082->54079 54082->54080 54083 4038a4 18 API calls 54082->54083 54084 403744 18 API calls 54082->54084 54087 4343b0 54082->54087 54099 434b74 18 API calls 54082->54099 54083->54082 54084->54082 54086->54072 54088 43446d 54087->54088 54089 4343dd 54087->54089 54118 434310 18 API calls 54088->54118 54090 403494 4 API calls 54089->54090 54092 4343eb 54090->54092 54093 403778 18 API calls 54092->54093 54097 43440c 54093->54097 54094 403400 4 API calls 54095 4344bd 54094->54095 54095->54082 54096 43445f 54096->54094 54097->54096 54100 494a98 54097->54100 54099->54082 54101 494b68 54100->54101 54102 494ad0 54100->54102 54119 448930 54101->54119 54103 403494 4 API calls 54102->54103 54107 494adb 54103->54107 54105 494aeb 54106 403400 4 API calls 54105->54106 54108 494b8c 54106->54108 54107->54105 54109 4037b8 18 API calls 54107->54109 54110 403400 4 API calls 54108->54110 54112 494b04 54109->54112 54111 494b94 54110->54111 54111->54097 54112->54105 54113 4037b8 18 API calls 54112->54113 54114 494b27 54113->54114 54115 403778 18 API calls 54114->54115 54116 494b58 54115->54116 54117 403634 18 API calls 54116->54117 54117->54101 54118->54096 54120 448955 54119->54120 54130 448998 54119->54130 54121 403494 4 API calls 54120->54121 54123 448960 54121->54123 54122 4489ac 54125 403400 4 API calls 54122->54125 54127 4037b8 18 API calls 54123->54127 54126 4489df 54125->54126 54126->54105 54128 44897c 54127->54128 54129 4037b8 18 API calls 54128->54129 54129->54130 54130->54122 54131 44852c 54130->54131 54132 403494 4 API calls 54131->54132 54133 448562 54132->54133 54134 4037b8 18 API calls 54133->54134 54135 448574 54134->54135 54136 403778 18 API calls 54135->54136 54137 448595 54136->54137 54138 4037b8 18 API calls 54137->54138 54139 4485ad 54138->54139 54140 403778 18 API calls 54139->54140 54141 4485d8 54140->54141 54142 4037b8 18 API calls 54141->54142 54153 4485f0 54142->54153 54143 448628 54145 403420 4 API calls 54143->54145 54144 4486c3 54149 4486cb GetProcAddress 54144->54149 54146 448708 54145->54146 54146->54122 54147 44864b LoadLibraryExA 54147->54153 54148 44865d LoadLibraryA 54148->54153 54150 4486de 54149->54150 54150->54143 54151 403b80 18 API calls 54151->54153 54152 403450 18 API calls 54152->54153 54153->54143 54153->54144 54153->54147 54153->54148 54153->54151 54153->54152 54155 43da88 18 API calls 54153->54155 54155->54153 53288 491d4c 53289 491d86 53288->53289 53290 491d88 53289->53290 53291 491d92 53289->53291 53488 409098 MessageBeep 53290->53488 53293 491dca 53291->53293 53294 491da1 53291->53294 53299 491dd9 53293->53299 53300 491e02 53293->53300 53296 446ff8 32 API calls 53294->53296 53295 403420 4 API calls 53297 4923de 53295->53297 53298 491dae 53296->53298 53301 403400 4 API calls 53297->53301 53302 406bb0 18 API calls 53298->53302 53303 446ff8 32 API calls 53299->53303 53309 491e3a 53300->53309 53310 491e11 53300->53310 53304 4923e6 53301->53304 53305 491db9 53302->53305 53306 491de6 53303->53306 53489 44734c 19 API calls 53305->53489 53490 406c00 18 API calls 53306->53490 53315 491e49 53309->53315 53316 491e62 53309->53316 53312 446ff8 32 API calls 53310->53312 53311 491df1 53491 44734c 19 API calls 53311->53491 53314 491e1e 53312->53314 53492 406c34 18 API calls 53314->53492 53494 407280 19 API calls 53315->53494 53323 491e71 53316->53323 53324 491e96 53316->53324 53319 491e29 53493 44734c 19 API calls 53319->53493 53320 491e51 53495 44734c 19 API calls 53320->53495 53325 446ff8 32 API calls 53323->53325 53327 491ece 53324->53327 53328 491ea5 53324->53328 53326 491e7e 53325->53326 53496 4072a8 53326->53496 53334 491edd 53327->53334 53335 491f06 53327->53335 53331 446ff8 32 API calls 53328->53331 53330 491e86 53499 4470d0 19 API calls 53330->53499 53333 491eb2 53331->53333 53336 42c804 19 API calls 53333->53336 53337 446ff8 32 API calls 53334->53337 53342 491f52 53335->53342 53343 491f15 53335->53343 53338 491ebd 53336->53338 53339 491eea 53337->53339 53500 44734c 19 API calls 53338->53500 53501 4071f8 22 API calls 53339->53501 53348 491f8a 53342->53348 53349 491f61 53342->53349 53345 446ff8 32 API calls 53343->53345 53344 491ef5 53502 44734c 19 API calls 53344->53502 53347 491f24 53345->53347 53350 446ff8 32 API calls 53347->53350 53355 491f99 53348->53355 53356 491fc2 53348->53356 53351 446ff8 32 API calls 53349->53351 53352 491f35 53350->53352 53353 491f6e 53351->53353 53503 491a50 22 API calls 53352->53503 53505 42c8a4 53353->53505 53359 446ff8 32 API calls 53355->53359 53365 491ffa 53356->53365 53366 491fd1 53356->53366 53357 491f41 53504 44734c 19 API calls 53357->53504 53362 491fa6 53359->53362 53364 42c8cc 19 API calls 53362->53364 53367 491fb1 53364->53367 53371 492009 53365->53371 53372 492032 53365->53372 53368 446ff8 32 API calls 53366->53368 53511 44734c 19 API calls 53367->53511 53370 491fde 53368->53370 53512 42c8fc 19 API calls 53370->53512 53374 446ff8 32 API calls 53371->53374 53379 49206a 53372->53379 53380 492041 53372->53380 53376 492016 53374->53376 53375 491fe9 53513 44734c 19 API calls 53375->53513 53378 42c92c 19 API calls 53376->53378 53381 492021 53378->53381 53386 492079 53379->53386 53387 4920b6 53379->53387 53382 446ff8 32 API calls 53380->53382 53514 44734c 19 API calls 53381->53514 53383 49204e 53382->53383 53385 42c954 19 API calls 53383->53385 53388 492059 53385->53388 53389 446ff8 32 API calls 53386->53389 53392 492108 53387->53392 53393 4920c5 53387->53393 53515 44734c 19 API calls 53388->53515 53391 492088 53389->53391 53394 446ff8 32 API calls 53391->53394 53399 49217b 53392->53399 53400 492117 53392->53400 53395 446ff8 32 API calls 53393->53395 53396 492099 53394->53396 53397 4920d8 53395->53397 53516 42c4f8 19 API calls 53396->53516 53401 446ff8 32 API calls 53397->53401 53408 49218a 53399->53408 53413 4921ba 53399->53413 53476 446ff8 53400->53476 53404 4920e9 53401->53404 53402 4920a5 53517 44734c 19 API calls 53402->53517 53518 491c48 26 API calls 53404->53518 53411 446ff8 32 API calls 53408->53411 53410 4920f7 53519 44734c 19 API calls 53410->53519 53415 492197 53411->53415 53412 492132 53416 49216b 53412->53416 53417 492136 53412->53417 53421 4921f9 53413->53421 53422 4921c9 53413->53422 53522 452908 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 53415->53522 53521 4470d0 19 API calls 53416->53521 53420 446ff8 32 API calls 53417->53420 53418 491d8d 53418->53295 53425 492145 53420->53425 53430 492238 53421->53430 53431 492208 53421->53431 53426 446ff8 32 API calls 53422->53426 53424 4921a4 53523 4470d0 19 API calls 53424->53523 53481 452c80 53425->53481 53429 4921d6 53426->53429 53524 452770 53429->53524 53440 492280 53430->53440 53441 492247 53430->53441 53436 446ff8 32 API calls 53431->53436 53432 4921b5 53432->53418 53433 492155 53520 4470d0 19 API calls 53433->53520 53435 4921e3 53531 4470d0 19 API calls 53435->53531 53439 492215 53436->53439 53532 452e10 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 53439->53532 53448 4922c8 53440->53448 53449 49228f 53440->53449 53443 446ff8 32 API calls 53441->53443 53445 492256 53443->53445 53444 492222 53533 4470d0 19 API calls 53444->53533 53447 446ff8 32 API calls 53445->53447 53450 492267 53447->53450 53453 4922db 53448->53453 53460 492391 53448->53460 53451 446ff8 32 API calls 53449->53451 53534 447278 53450->53534 53452 49229e 53451->53452 53454 446ff8 32 API calls 53452->53454 53457 446ff8 32 API calls 53453->53457 53455 4922af 53454->53455 53461 447278 19 API calls 53455->53461 53458 492308 53457->53458 53459 446ff8 32 API calls 53458->53459 53462 49231f 53459->53462 53460->53418 53543 446f9c 32 API calls 53460->53543 53461->53418 53540 407ddc 21 API calls 53462->53540 53464 4923aa 53465 42e8c8 19 API calls 53464->53465 53466 4923b2 53465->53466 53544 44734c 19 API calls 53466->53544 53469 492341 53470 446ff8 32 API calls 53469->53470 53471 492355 53470->53471 53541 408508 18 API calls 53471->53541 53473 492360 53542 44734c 19 API calls 53473->53542 53475 49236c 53477 447000 53476->53477 53545 436078 53477->53545 53479 44701f 53480 42c608 21 API calls 53479->53480 53480->53412 53482 452724 2 API calls 53481->53482 53484 452c99 53482->53484 53483 452c9d 53483->53433 53484->53483 53485 452cc1 MoveFileA GetLastError 53484->53485 53486 452760 Wow64RevertWow64FsRedirection 53485->53486 53487 452ce7 53486->53487 53487->53433 53488->53418 53489->53418 53490->53311 53491->53418 53492->53319 53493->53418 53494->53320 53495->53418 53497 403738 53496->53497 53498 4072b2 SetCurrentDirectoryA 53497->53498 53498->53330 53499->53418 53500->53418 53501->53344 53502->53418 53503->53357 53504->53418 53506 42c79c IsDBCSLeadByte 53505->53506 53507 42c8b4 53506->53507 53508 403778 18 API calls 53507->53508 53509 42c8c5 53508->53509 53510 44734c 19 API calls 53509->53510 53510->53418 53511->53418 53512->53375 53513->53418 53514->53418 53515->53418 53516->53402 53517->53418 53518->53410 53519->53418 53520->53418 53521->53418 53522->53424 53523->53432 53525 452724 2 API calls 53524->53525 53526 452786 53525->53526 53527 45278a 53526->53527 53528 4527a8 CreateDirectoryA GetLastError 53526->53528 53527->53435 53529 452760 Wow64RevertWow64FsRedirection 53528->53529 53530 4527ce 53529->53530 53530->53435 53531->53418 53532->53444 53533->53418 53535 447280 53534->53535 53568 4363e0 VariantClear 53535->53568 53537 4472a3 53539 4472ba 53537->53539 53569 408c0c 18 API calls 53537->53569 53539->53418 53540->53469 53541->53473 53542->53475 53543->53464 53544->53418 53546 436084 53545->53546 53547 4360a6 53545->53547 53546->53547 53565 408c0c 18 API calls 53546->53565 53548 436129 53547->53548 53550 436111 53547->53550 53551 4360f9 53547->53551 53552 4360ed 53547->53552 53553 43611d 53547->53553 53564 436105 53547->53564 53567 408c0c 18 API calls 53548->53567 53555 403494 4 API calls 53550->53555 53558 403510 18 API calls 53551->53558 53557 403510 18 API calls 53552->53557 53566 4040e8 32 API calls 53553->53566 53559 43611a 53555->53559 53561 4360f6 53557->53561 53563 436102 53558->53563 53559->53479 53560 436126 53560->53479 53561->53479 53562 43613a 53562->53479 53563->53479 53564->53479 53565->53547 53566->53560 53567->53562 53568->53537 53569->53539 53570 416644 53571 416651 53570->53571 53572 4166ab 53570->53572 53577 416550 CreateWindowExA 53571->53577 53573 416658 SetPropA SetPropA 53573->53572 53574 41668b 53573->53574 53575 41669e SetWindowPos 53574->53575 53575->53572 53577->53573 54156 4222e4 54157 4222f3 54156->54157 54162 421274 54157->54162 54160 422313 54163 4212e3 54162->54163 54176 421283 54162->54176 54166 4212f4 54163->54166 54187 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 54163->54187 54165 421322 54169 421395 54165->54169 54174 42133d 54165->54174 54166->54165 54168 4213ba 54166->54168 54167 421393 54170 4213e6 54167->54170 54189 421e2c 25 API calls 54167->54189 54168->54167 54171 4213ce SetMenu 54168->54171 54169->54167 54177 4213a9 54169->54177 54190 4211bc 24 API calls 54170->54190 54171->54167 54174->54167 54180 421360 GetMenu 54174->54180 54175 4213ed 54175->54160 54185 4221e8 10 API calls 54175->54185 54176->54163 54186 408d2c 33 API calls 54176->54186 54179 4213b2 SetMenu 54177->54179 54179->54167 54181 421383 54180->54181 54182 42136a 54180->54182 54188 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 54181->54188 54184 42137d SetMenu 54182->54184 54184->54181 54185->54160 54186->54176 54187->54166 54188->54167 54189->54170 54190->54175 54191 44b4a8 54192 44b4d5 54191->54192 54193 44b4b6 54191->54193 54193->54192 54195 44b38c 54193->54195 54196 44b3bf 54195->54196 54206 414ae8 54196->54206 54198 44b3d2 54199 40357c 18 API calls 54198->54199 54200 44b3ff GetDC 54198->54200 54199->54200 54210 41a1e8 54200->54210 54203 44b430 54218 44b0c0 54203->54218 54205 44b444 ReleaseDC 54205->54192 54207 414af6 54206->54207 54208 4034e0 18 API calls 54207->54208 54209 414b03 54208->54209 54209->54198 54211 41a213 54210->54211 54212 41a2af 54210->54212 54215 403520 18 API calls 54211->54215 54213 403400 4 API calls 54212->54213 54214 41a2c7 SelectObject 54213->54214 54214->54203 54216 41a26b 54215->54216 54217 41a2a3 CreateFontIndirectA 54216->54217 54217->54212 54219 44b0d7 54218->54219 54220 44b16a 54219->54220 54221 44b153 54219->54221 54222 44b0ea 54219->54222 54220->54205 54223 44b163 DrawTextA 54221->54223 54222->54220 54224 402648 18 API calls 54222->54224 54223->54220 54225 44b0fb 54224->54225 54226 44b119 MultiByteToWideChar DrawTextW 54225->54226 54227 402660 4 API calls 54226->54227 54228 44b14b 54227->54228 54228->54205 54229 448728 54230 448756 54229->54230 54231 44875d 54229->54231 54234 403400 4 API calls 54230->54234 54232 448771 54231->54232 54235 44852c 21 API calls 54231->54235 54232->54230 54233 403494 4 API calls 54232->54233 54236 44878a 54233->54236 54237 448907 54234->54237 54235->54232 54238 4037b8 18 API calls 54236->54238 54239 4487a6 54238->54239 54240 4037b8 18 API calls 54239->54240 54241 4487c2 54240->54241 54241->54230 54242 4487d6 54241->54242 54243 4037b8 18 API calls 54242->54243 54244 4487f0 54243->54244 54245 431bd0 18 API calls 54244->54245 54246 448812 54245->54246 54247 431ca0 18 API calls 54246->54247 54253 448832 54246->54253 54247->54246 54248 448888 54261 442334 54248->54261 54251 448870 54251->54248 54273 4435d0 18 API calls 54251->54273 54252 4488bc GetLastError 54274 4484c0 18 API calls 54252->54274 54253->54251 54272 4435d0 18 API calls 54253->54272 54256 4488cb 54275 443610 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54256->54275 54258 4488e0 54276 443620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54258->54276 54260 4488e8 54262 443312 54261->54262 54263 44236d 54261->54263 54265 403400 4 API calls 54262->54265 54264 403400 4 API calls 54263->54264 54266 442375 54264->54266 54267 443327 54265->54267 54268 431bd0 18 API calls 54266->54268 54267->54252 54270 442381 54268->54270 54269 443302 54269->54252 54270->54269 54277 441a0c 18 API calls 54270->54277 54272->54253 54273->54248 54274->54256 54275->54258 54276->54260 54277->54270 54278 4165ec DestroyWindow 54279 42e3ef SetErrorMode 54280 46bb68 54281 46c005 54280->54281 54282 46bb9c 54280->54282 54283 403400 4 API calls 54281->54283 54284 46bbd8 54282->54284 54287 46bc34 54282->54287 54288 46bc12 54282->54288 54289 46bc23 54282->54289 54290 46bbf0 54282->54290 54291 46bc01 54282->54291 54286 46c044 54283->54286 54284->54281 54371 468c90 54284->54371 54292 403400 4 API calls 54286->54292 54607 46baf8 59 API calls 54287->54607 54336 46b728 54288->54336 54606 46b8e8 81 API calls 54289->54606 54604 46b478 61 API calls 54290->54604 54605 46b5e0 56 API calls 54291->54605 54298 46c04c 54292->54298 54299 46bbf6 54299->54281 54299->54284 54300 46bc70 54300->54281 54301 494ef4 32 API calls 54300->54301 54313 46bcb3 54300->54313 54301->54313 54303 414ae8 18 API calls 54303->54313 54304 46bdd6 54608 4836e0 137 API calls 54304->54608 54307 42cbc0 20 API calls 54307->54313 54308 46bdf1 54308->54281 54309 46af84 37 API calls 54309->54313 54310 403450 18 API calls 54310->54313 54313->54281 54313->54303 54313->54304 54313->54307 54313->54309 54313->54310 54314 46be2f 54313->54314 54333 46bef7 54313->54333 54374 468bcc 54313->54374 54382 46acf0 54313->54382 54531 4831d8 54313->54531 54617 46b234 33 API calls 54313->54617 54389 469f38 54314->54389 54315 46af84 37 API calls 54315->54281 54317 46be95 54318 403450 18 API calls 54317->54318 54319 46bea5 54318->54319 54320 46bf01 54319->54320 54321 46beb1 54319->54321 54326 46bfc3 54320->54326 54450 46af84 54320->54450 54322 457f1c 38 API calls 54321->54322 54323 46bed0 54322->54323 54325 457f1c 38 API calls 54323->54325 54325->54333 54327 46bf1b 54328 46bf44 SetActiveWindow 54327->54328 54329 46bf5c 54327->54329 54328->54329 54489 46a2e0 54329->54489 54331 46bf86 54332 46bfa6 54331->54332 54331->54333 54333->54315 54618 46c47c 54336->54618 54339 46b8aa 54341 403420 4 API calls 54339->54341 54340 414ae8 18 API calls 54342 46b776 54340->54342 54343 46b8c4 54341->54343 54370 46b896 54342->54370 54621 455f84 27 API calls 54342->54621 54344 403400 4 API calls 54343->54344 54345 46b8cc 54344->54345 54348 403400 4 API calls 54345->54348 54347 403450 18 API calls 54347->54339 54349 46b8d4 54348->54349 54349->54284 54350 46b7f9 54350->54339 54351 42cd48 21 API calls 54350->54351 54364 46b859 54350->54364 54352 46b832 54351->54352 54357 451458 18 API calls 54352->54357 54352->54364 54353 46b794 54353->54350 54622 466600 54353->54622 54354 42cd48 21 API calls 54356 46b86f 54354->54356 54361 451458 18 API calls 54356->54361 54356->54370 54359 46b849 54357->54359 54627 47f124 56 API calls 54359->54627 54360 466600 33 API calls 54363 46b7d4 54360->54363 54366 46b886 54361->54366 54365 451428 18 API calls 54363->54365 54364->54339 54364->54354 54364->54370 54367 46b7e9 54365->54367 54628 47f124 56 API calls 54366->54628 54626 47f124 56 API calls 54367->54626 54370->54339 54370->54347 54372 468bcc 33 API calls 54371->54372 54373 468c9f 54372->54373 54373->54300 54375 468bfb 54374->54375 54376 4078f4 33 API calls 54375->54376 54379 468c3c 54375->54379 54377 468c34 54376->54377 54756 453344 18 API calls 54377->54756 54380 403400 4 API calls 54379->54380 54381 468c54 54380->54381 54381->54313 54383 46ad01 54382->54383 54384 46acfc 54382->54384 54842 469a9c 60 API calls 54383->54842 54388 46acff 54384->54388 54757 46a75c 54384->54757 54386 46ad09 54386->54313 54388->54313 54390 403400 4 API calls 54389->54390 54391 469f66 54390->54391 54865 47de54 54391->54865 54393 469fc9 54394 469fe6 54393->54394 54395 469fcd 54393->54395 54397 469fd7 54394->54397 54875 494de4 18 API calls 54394->54875 54872 466800 54395->54872 54400 46a105 54397->54400 54401 46a170 54397->54401 54449 46a27a 54397->54449 54399 46a002 54399->54397 54404 46a00a 54399->54404 54405 403494 4 API calls 54400->54405 54406 403494 4 API calls 54401->54406 54402 403420 4 API calls 54403 46a2a4 54402->54403 54403->54317 54407 46af84 37 API calls 54404->54407 54408 46a112 54405->54408 54409 46a17d 54406->54409 54418 46a017 54407->54418 54411 40357c 18 API calls 54408->54411 54410 40357c 18 API calls 54409->54410 54413 46a18a 54410->54413 54412 46a11f 54411->54412 54414 40357c 18 API calls 54412->54414 54415 40357c 18 API calls 54413->54415 54416 46a12c 54414->54416 54417 46a197 54415->54417 54419 40357c 18 API calls 54416->54419 54420 40357c 18 API calls 54417->54420 54423 46a040 SetActiveWindow 54418->54423 54424 46a058 54418->54424 54421 46a139 54419->54421 54422 46a1a4 54420->54422 54425 466800 34 API calls 54421->54425 54426 40357c 18 API calls 54422->54426 54423->54424 54876 42f560 54424->54876 54427 46a147 54425->54427 54428 46a1b2 54426->54428 54430 40357c 18 API calls 54427->54430 54431 414b18 18 API calls 54428->54431 54433 46a150 54430->54433 54440 46a16e 54431->54440 54435 40357c 18 API calls 54433->54435 54437 46a15d 54435->54437 54438 414b18 18 API calls 54437->54438 54438->54440 54439 46a0a9 54441 46ae00 35 API calls 54439->54441 54893 466b38 54440->54893 54442 46a0db 54441->54442 54442->54317 54443 46a1d4 54444 414b18 18 API calls 54443->54444 54443->54449 54445 46a237 54444->54445 54896 495ca4 MulDiv 54445->54896 54447 46a254 54448 414b18 18 API calls 54447->54448 54448->54449 54449->54402 54451 468c90 33 API calls 54450->54451 54452 46afaf 54451->54452 54453 46afd1 54452->54453 54454 4652cc 21 API calls 54452->54454 54982 4652cc 54453->54982 54454->54453 54459 414ae8 18 API calls 54460 46affa 54459->54460 54461 46ae00 35 API calls 54460->54461 54462 46b02f 54461->54462 54463 414b18 18 API calls 54462->54463 54464 46b043 54463->54464 54465 46b04f 54464->54465 54466 46b079 54464->54466 54467 414b18 18 API calls 54465->54467 54469 46b098 54466->54469 54470 46b0c2 54466->54470 54468 46b063 54467->54468 54472 414b18 18 API calls 54468->54472 54473 414b18 18 API calls 54469->54473 54471 414b18 18 API calls 54470->54471 54475 46b0d6 54471->54475 54476 46b077 54472->54476 54474 46b0ac 54473->54474 54477 414b18 18 API calls 54474->54477 54478 414b18 18 API calls 54475->54478 54999 46ad18 54476->54999 54477->54476 54478->54476 54481 468c90 33 API calls 54485 46b174 54481->54485 54483 46b114 54483->54481 54484 46b1d7 54487 403400 4 API calls 54484->54487 54485->54484 55004 494e40 32 API calls 54485->55004 54488 46b20d 54487->54488 54488->54327 54497 46a30c 54489->54497 54490 46a347 54493 46a4bc 54490->54493 54511 46a35b 54490->54511 54492 46a63c 54495 403400 4 API calls 54492->54495 54493->54492 54496 46a4e3 54493->54496 54502 46a4f9 54493->54502 54494 46a499 54498 46a4b4 54494->54498 54506 402660 4 API calls 54494->54506 54499 46a661 54495->54499 54503 414b18 18 API calls 54496->54503 54497->54490 55024 47e15c 54497->55024 54498->54331 54499->54331 54500 402660 4 API calls 54500->54511 54501 402648 18 API calls 54501->54511 54504 414b18 18 API calls 54502->54504 54507 46a4f7 54503->54507 54504->54507 54505 46a465 54508 457f1c 38 API calls 54505->54508 54506->54498 55040 495ca4 MulDiv 54507->55040 54508->54494 54511->54500 54511->54501 54515 46a3ce 54511->54515 54512 46a51a 54513 457f1c 38 API calls 54513->54515 54515->54494 54515->54505 54515->54513 54517 40357c 18 API calls 54515->54517 55039 403ba4 21 API calls 54515->55039 54517->54515 54532 46c47c 62 API calls 54531->54532 54533 48321b 54532->54533 54534 483224 54533->54534 55269 408be0 19 API calls 54533->55269 54536 414ae8 18 API calls 54534->54536 54537 483234 54536->54537 54538 403450 18 API calls 54537->54538 54539 483241 54538->54539 55071 46c7d4 54539->55071 54542 483251 54544 414ae8 18 API calls 54542->54544 54545 483261 54544->54545 54546 403450 18 API calls 54545->54546 54547 48326e 54546->54547 54548 469884 SendMessageA 54547->54548 54549 483287 54548->54549 54550 4832d8 54549->54550 55271 479f6c 37 API calls 54549->55271 55100 4241dc IsIconic 54550->55100 54554 483308 55108 482608 54554->55108 54555 4832f3 SetActiveWindow 54555->54554 54604->54299 54605->54284 54606->54284 54607->54284 54608->54308 54617->54313 54629 46c514 54618->54629 54621->54353 54623 46661a 54622->54623 54624 4078f4 33 API calls 54623->54624 54625 466655 54624->54625 54625->54360 54626->54350 54627->54364 54628->54370 54630 414ae8 18 API calls 54629->54630 54631 46c548 54630->54631 54690 466898 54631->54690 54635 46c55a 54636 46c569 54635->54636 54639 46c582 54635->54639 54724 47f124 56 API calls 54636->54724 54638 46c57d 54640 403420 4 API calls 54638->54640 54641 46c5c9 54639->54641 54643 46c5b0 54639->54643 54642 46b75a 54640->54642 54644 46c62e 54641->54644 54657 46c5cd 54641->54657 54642->54339 54642->54340 54725 47f124 56 API calls 54643->54725 54727 42cb4c CharNextA 54644->54727 54647 46c63d 54648 46c641 54647->54648 54652 46c65a 54647->54652 54728 47f124 56 API calls 54648->54728 54650 46c615 54726 47f124 56 API calls 54650->54726 54653 46c67e 54652->54653 54704 466a08 54652->54704 54729 47f124 56 API calls 54653->54729 54657->54650 54657->54652 54660 46c697 54661 403778 18 API calls 54660->54661 54662 46c6ad 54661->54662 54712 42c99c 54662->54712 54665 46c6be 54730 466a94 18 API calls 54665->54730 54666 46c6ef 54667 42c8cc 19 API calls 54666->54667 54669 46c6fa 54667->54669 54671 42c3fc 19 API calls 54669->54671 54670 46c6d1 54672 451458 18 API calls 54670->54672 54674 46c705 54671->54674 54673 46c6de 54672->54673 54731 47f124 56 API calls 54673->54731 54676 42cbc0 20 API calls 54674->54676 54677 46c710 54676->54677 54716 46c4a8 54677->54716 54679 46c718 54680 42cd48 21 API calls 54679->54680 54681 46c720 54680->54681 54682 46c724 54681->54682 54683 46c73a 54681->54683 54732 47f124 56 API calls 54682->54732 54683->54638 54685 46c744 54683->54685 54686 46c74c GetDriveTypeA 54685->54686 54686->54638 54687 46c757 54686->54687 54733 47f124 56 API calls 54687->54733 54689 46c76b 54689->54638 54695 4668b2 54690->54695 54691 406bb0 18 API calls 54691->54695 54693 42cbc0 20 API calls 54693->54695 54694 403450 18 API calls 54694->54695 54695->54691 54695->54693 54695->54694 54696 4668fb 54695->54696 54734 42caac 54695->54734 54697 403420 4 API calls 54696->54697 54698 466915 54697->54698 54699 414b18 54698->54699 54700 414ae8 18 API calls 54699->54700 54701 414b3c 54700->54701 54702 403400 4 API calls 54701->54702 54703 414b6d 54702->54703 54703->54635 54706 466a12 54704->54706 54705 466a25 54705->54653 54708 466a38 54705->54708 54706->54705 54745 42cb3c CharNextA 54706->54745 54709 466a42 54708->54709 54710 466a6f 54709->54710 54746 42cb3c CharNextA 54709->54746 54710->54653 54710->54660 54713 42c9b2 54712->54713 54714 42c9f5 54712->54714 54713->54714 54747 42cb3c CharNextA 54713->54747 54714->54665 54714->54666 54717 46c50d 54716->54717 54718 46c4bb 54716->54718 54717->54679 54718->54717 54748 41eea4 GetCurrentThreadId EnumThreadWindows 54718->54748 54720 46c4cb 54721 46c4e5 SHPathPrepareForWriteA 54720->54721 54750 41ef58 54721->54750 54724->54638 54725->54638 54726->54638 54727->54647 54728->54638 54729->54638 54730->54670 54731->54638 54732->54638 54733->54689 54735 403494 4 API calls 54734->54735 54736 42cabc 54735->54736 54738 403744 18 API calls 54736->54738 54739 42caf2 54736->54739 54743 42c444 IsDBCSLeadByte 54736->54743 54738->54736 54740 42cb36 54739->54740 54742 4037b8 18 API calls 54739->54742 54744 42c444 IsDBCSLeadByte 54739->54744 54740->54695 54742->54739 54743->54736 54744->54739 54745->54706 54746->54709 54747->54713 54749 41ef29 54748->54749 54749->54720 54751 41ef60 IsWindow 54750->54751 54752 41ef8c 54750->54752 54753 41ef7a 54751->54753 54754 41ef6f EnableWindow 54751->54754 54752->54679 54753->54751 54753->54752 54755 402660 4 API calls 54753->54755 54754->54753 54755->54753 54756->54379 54759 46a7a3 54757->54759 54758 46ac1b 54761 46ac36 54758->54761 54762 46ac67 54758->54762 54759->54758 54760 46a85e 54759->54760 54765 403494 4 API calls 54759->54765 54764 46a87f 54760->54764 54768 46a8c0 54760->54768 54766 403494 4 API calls 54761->54766 54763 403494 4 API calls 54762->54763 54767 46ac75 54763->54767 54769 403494 4 API calls 54764->54769 54770 46a7e2 54765->54770 54771 46ac44 54766->54771 54861 469178 26 API calls 54767->54861 54772 403400 4 API calls 54768->54772 54774 46a88d 54769->54774 54775 414ae8 18 API calls 54770->54775 54860 469178 26 API calls 54771->54860 54777 46a8be 54772->54777 54778 414ae8 18 API calls 54774->54778 54779 46a803 54775->54779 54800 46a9a4 54777->54800 54843 469884 54777->54843 54782 46a8ae 54778->54782 54783 403634 18 API calls 54779->54783 54780 46ac52 54781 403400 4 API calls 54780->54781 54785 46ac98 54781->54785 54787 403634 18 API calls 54782->54787 54788 46a813 54783->54788 54792 403400 4 API calls 54785->54792 54786 46aa2c 54790 403400 4 API calls 54786->54790 54787->54777 54789 414ae8 18 API calls 54788->54789 54793 46a827 54789->54793 54794 46aa2a 54790->54794 54791 46a8e0 54795 46a8e6 54791->54795 54796 46a91e 54791->54796 54797 46aca0 54792->54797 54793->54760 54802 414ae8 18 API calls 54793->54802 54855 469cc0 57 API calls 54794->54855 54798 403494 4 API calls 54795->54798 54801 403400 4 API calls 54796->54801 54799 403420 4 API calls 54797->54799 54803 46a8f4 54798->54803 54804 46acad 54799->54804 54800->54786 54805 46a9eb 54800->54805 54806 46a91c 54801->54806 54807 46a84e 54802->54807 54809 47c3c0 57 API calls 54803->54809 54804->54388 54810 403494 4 API calls 54805->54810 54849 469b78 54806->54849 54811 403634 18 API calls 54807->54811 54813 46a90c 54809->54813 54814 46a9f9 54810->54814 54811->54760 54812 46aa55 54821 46aab6 54812->54821 54822 46aa60 54812->54822 54816 403634 18 API calls 54813->54816 54817 414ae8 18 API calls 54814->54817 54816->54806 54818 46aa1a 54817->54818 54820 403634 18 API calls 54818->54820 54819 46a945 54825 46a9a6 54819->54825 54826 46a950 54819->54826 54820->54794 54823 403400 4 API calls 54821->54823 54824 403494 4 API calls 54822->54824 54827 46aabe 54823->54827 54831 46aa6e 54824->54831 54828 403400 4 API calls 54825->54828 54829 403494 4 API calls 54826->54829 54830 46aab4 54827->54830 54841 46ab67 54827->54841 54828->54800 54834 46a95e 54829->54834 54830->54827 54856 494de4 18 API calls 54830->54856 54831->54827 54831->54830 54836 403634 18 API calls 54831->54836 54833 46aae1 54833->54841 54857 495090 32 API calls 54833->54857 54834->54800 54837 403634 18 API calls 54834->54837 54836->54831 54837->54834 54839 46ac08 54859 429144 SendMessageA SendMessageA 54839->54859 54858 4290f4 SendMessageA 54841->54858 54842->54386 54862 42a040 SendMessageA 54843->54862 54845 469893 54846 4698b3 54845->54846 54863 42a040 SendMessageA 54845->54863 54846->54791 54848 4698a3 54848->54791 54852 469ba5 54849->54852 54850 469c07 54851 403400 4 API calls 54850->54851 54853 469c1c 54851->54853 54852->54850 54864 469afc 57 API calls 54852->54864 54853->54819 54855->54812 54856->54833 54857->54841 54858->54839 54859->54758 54860->54780 54861->54780 54862->54845 54863->54848 54864->54852 54866 47de6d 54865->54866 54869 47deaa 54865->54869 54897 455d0c 54866->54897 54869->54393 54871 47dec1 54871->54393 54952 466714 54872->54952 54875->54399 54877 42f56c 54876->54877 54878 42f58f GetActiveWindow GetFocus 54877->54878 54879 41eea4 2 API calls 54878->54879 54880 42f5a6 54879->54880 54881 42f5c3 54880->54881 54882 42f5b3 RegisterClassA 54880->54882 54883 42f652 SetFocus 54881->54883 54884 42f5d1 CreateWindowExA 54881->54884 54882->54881 54885 403400 4 API calls 54883->54885 54884->54883 54886 42f604 54884->54886 54887 42f66e 54885->54887 54973 42427c 54886->54973 54892 495090 32 API calls 54887->54892 54889 42f62c 54890 42f634 CreateWindowExA 54889->54890 54890->54883 54891 42f64a ShowWindow 54890->54891 54891->54883 54892->54439 54979 44b514 54893->54979 54895 466b3f 54895->54443 54896->54447 54898 455d1d 54897->54898 54899 455d21 54898->54899 54900 455d2a 54898->54900 54923 455a10 54899->54923 54931 455af0 43 API calls 54900->54931 54903 455d27 54903->54869 54904 47dac4 54903->54904 54906 47dbc0 54904->54906 54916 47db04 54904->54916 54905 403420 4 API calls 54907 47dca3 54905->54907 54908 479784 33 API calls 54906->54908 54914 47dc11 54906->54914 54919 47db63 54906->54919 54907->54871 54908->54906 54910 479a28 18 API calls 54910->54916 54911 47c3c0 57 API calls 54911->54914 54912 454100 34 API calls 54912->54914 54913 47c3c0 57 API calls 54913->54916 54914->54906 54914->54911 54914->54912 54917 47dbad 54914->54917 54915 47c3c0 57 API calls 54921 47db6c 54915->54921 54916->54906 54916->54910 54916->54913 54916->54919 54916->54921 54940 4798c4 54916->54940 54917->54919 54918 42c92c 19 API calls 54918->54921 54919->54905 54920 42c954 19 API calls 54920->54921 54921->54915 54921->54916 54921->54917 54921->54918 54921->54920 54951 47d7d0 66 API calls 54921->54951 54924 42de1c RegOpenKeyExA 54923->54924 54925 455a2d 54924->54925 54926 455a7b 54925->54926 54932 455944 54925->54932 54926->54903 54929 455944 20 API calls 54930 455a5c RegCloseKey 54929->54930 54930->54903 54931->54903 54937 42dd58 54932->54937 54934 403420 4 API calls 54935 4559f6 54934->54935 54935->54929 54936 45596c 54936->54934 54938 42dc00 20 API calls 54937->54938 54939 42dd61 54938->54939 54939->54936 54941 4798d6 54940->54941 54942 4798da 54940->54942 54941->54916 54943 403450 18 API calls 54942->54943 54944 4798e7 54943->54944 54945 479907 54944->54945 54946 4798ed 54944->54946 54948 479784 33 API calls 54945->54948 54947 479784 33 API calls 54946->54947 54949 479903 54947->54949 54948->54949 54950 403400 4 API calls 54949->54950 54950->54941 54951->54921 54953 403494 4 API calls 54952->54953 54954 466742 54953->54954 54955 42dbc8 19 API calls 54954->54955 54956 466754 54955->54956 54957 42dbc8 19 API calls 54956->54957 54958 466766 54957->54958 54959 466600 33 API calls 54958->54959 54960 466770 54959->54960 54961 42dbc8 19 API calls 54960->54961 54962 46677f 54961->54962 54969 466678 54962->54969 54965 42dbc8 19 API calls 54966 466798 54965->54966 54967 403400 4 API calls 54966->54967 54968 4667ad 54967->54968 54968->54397 54970 466698 54969->54970 54971 4078f4 33 API calls 54970->54971 54972 4666e2 54971->54972 54972->54965 54974 4242ae 54973->54974 54975 42428e GetWindowTextA 54973->54975 54977 403494 4 API calls 54974->54977 54976 4034e0 18 API calls 54975->54976 54978 4242ac 54976->54978 54977->54978 54978->54889 54980 44b38c 25 API calls 54979->54980 54981 44b527 54980->54981 54981->54895 54984 4652d7 54982->54984 54983 4653b2 54993 46708c 54983->54993 54984->54983 54988 465327 54984->54988 55005 421a1c 54984->55005 54985 46536a 54985->54983 55011 4185b8 21 API calls 54985->55011 54988->54985 54989 465361 54988->54989 54990 46536c 54988->54990 54992 421a1c 21 API calls 54989->54992 54991 421a1c 21 API calls 54990->54991 54991->54985 54992->54985 54994 4670bc 54993->54994 54995 46709d 54993->54995 54994->54459 54996 414b18 18 API calls 54995->54996 54997 4670ab 54996->54997 54998 414b18 18 API calls 54997->54998 54998->54994 55001 46ad25 54999->55001 55000 421a1c 21 API calls 55002 46adb0 55000->55002 55001->55000 55002->54483 55003 466b60 32 API calls 55002->55003 55003->54483 55004->54484 55006 421a74 55005->55006 55010 421a2a 55005->55010 55006->54988 55007 421a59 55007->55006 55020 421d28 SetFocus GetFocus 55007->55020 55010->55007 55012 408cbc 55010->55012 55011->54983 55013 408cc8 55012->55013 55021 406dec LoadStringA 55013->55021 55016 403450 18 API calls 55017 408cf9 55016->55017 55018 403400 4 API calls 55017->55018 55019 408d0e 55018->55019 55019->55007 55020->55006 55022 4034e0 18 API calls 55021->55022 55023 406e19 55022->55023 55023->55016 55025 402648 18 API calls 55024->55025 55026 47e180 55025->55026 55027 47dac4 75 API calls 55026->55027 55028 47e1a3 55027->55028 55029 47e1b0 55028->55029 55030 47e238 55028->55030 55067 494e40 32 API calls 55029->55067 55032 47e24c 55030->55032 55044 47deec 55030->55044 55039->54515 55040->54512 55072 46c7fd 55071->55072 55073 414ae8 18 API calls 55072->55073 55093 46c84a 55072->55093 55074 46c813 55073->55074 55278 466924 20 API calls 55074->55278 55075 403420 4 API calls 55077 46c8f4 55075->55077 55077->54542 55270 408be0 19 API calls 55077->55270 55078 46c81b 55079 414b18 18 API calls 55078->55079 55080 46c829 55079->55080 55081 46c836 55080->55081 55084 46c84f 55080->55084 55279 47f124 56 API calls 55081->55279 55083 46c867 55280 47f124 56 API calls 55083->55280 55084->55083 55085 466a08 CharNextA 55084->55085 55087 46c863 55085->55087 55087->55083 55088 46c87d 55087->55088 55089 46c883 55088->55089 55090 46c899 55088->55090 55281 47f124 56 API calls 55089->55281 55092 42c99c CharNextA 55090->55092 55094 46c8a6 55092->55094 55093->55075 55094->55093 55282 466a94 18 API calls 55094->55282 55096 46c8bd 55097 451458 18 API calls 55096->55097 55098 46c8ca 55097->55098 55283 47f124 56 API calls 55098->55283 55101 424223 55100->55101 55102 4241ed SetActiveWindow 55100->55102 55101->54554 55101->54555 55284 42364c 55102->55284 55106 42420a 55106->55101 55107 42421d SetFocus 55106->55107 55107->55101 55109 482659 55108->55109 55110 48262b 55108->55110 55112 475d24 55109->55112 55297 494e40 32 API calls 55110->55297 55113 457d10 38 API calls 55112->55113 55114 475d70 55113->55114 55115 4072a8 SetCurrentDirectoryA 55114->55115 55116 475d7a 55115->55116 55298 46e360 55116->55298 55120 475d8a 55306 45a148 55120->55306 55123 47c3c0 57 API calls 55124 475de1 55123->55124 55127 475df1 55124->55127 55737 453344 18 API calls 55124->55737 55126 475e13 55310 478f78 55126->55310 55127->55126 55738 453344 18 API calls 55127->55738 55133 403450 18 API calls 55134 475e45 55133->55134 55271->54550 55278->55078 55279->55093 55280->55093 55281->55093 55282->55096 55283->55093 55293 4235f8 SystemParametersInfoA 55284->55293 55286 423665 ShowWindow 55288 423670 55286->55288 55289 423677 55286->55289 55296 423628 SystemParametersInfoA 55288->55296 55292 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 55289->55292 55292->55106 55294 423616 55293->55294 55294->55286 55295 423628 SystemParametersInfoA 55294->55295 55295->55286 55296->55289 55297->55109 55299 46e3d3 55298->55299 55301 46e37d 55298->55301 55302 46e3d8 55299->55302 55300 4798c4 33 API calls 55300->55301 55301->55299 55301->55300 55303 46e3fe 55302->55303 55746 44fb1c 55303->55746 55305 46e45a 55305->55120 55307 45a14e 55306->55307 55308 45a430 4 API calls 55307->55308 55309 45a16a 55308->55309 55309->55123 55311 403494 4 API calls 55310->55311 55312 478f8a 55311->55312 55313 475e1e 55312->55313 55314 403744 18 API calls 55312->55314 55319 479614 55313->55319 55315 478fb2 55314->55315 55749 450e88 55315->55749 55318 407908 33 API calls 55318->55313 55320 479621 55319->55320 55321 475e26 55320->55321 55322 4794bc 33 API calls 55320->55322 55321->55133 55322->55321 55737->55127 55738->55126 55747 44fb30 2 API calls 55746->55747 55748 44fb2d 55747->55748 55748->55305 55752 450e34 55749->55752 55753 450e57 55752->55753 55754 450e46 55752->55754 55753->55318 55755 450e4b InterlockedExchange 55754->55755 55755->55753 53578 441394 53579 44139d 53578->53579 53580 4413ab WriteFile 53578->53580 53579->53580 53581 4413b6 53580->53581 53582 46e614 53583 46e61f 53582->53583 53586 46e46c 53583->53586 53587 46e495 53586->53587 53588 46e4b2 53587->53588 53599 44fb30 53587->53599 53596 46e1c4 53588->53596 53593 46e4f7 53595 46e541 53593->53595 53606 494e40 32 API calls 53593->53606 53607 46e13c 53596->53607 53600 44fb41 53599->53600 53601 44fb9c 53600->53601 53602 44fb6b MulDiv 53600->53602 53601->53588 53611 4181e0 53602->53611 53604 44fb96 SendMessageA 53604->53601 53605 494de4 18 API calls 53605->53593 53606->53595 53608 46e146 GetVersion 53607->53608 53610 46e16b 53607->53610 53609 46e153 CoCreateInstance 53608->53609 53608->53610 53609->53610 53610->53595 53610->53605 53612 4181ea 53611->53612 53612->53604 56796 40cc34 56799 406f10 WriteFile 56796->56799 56800 406f2d 56799->56800 53613 49299c 53614 4929d0 53613->53614 53615 4929d2 53614->53615 53616 4929e6 53614->53616 53749 446f9c 32 API calls 53615->53749 53619 492a22 53616->53619 53620 4929f5 53616->53620 53618 4929db Sleep 53721 492a1d 53618->53721 53625 492a5e 53619->53625 53626 492a31 53619->53626 53622 446ff8 32 API calls 53620->53622 53621 403420 4 API calls 53623 492e90 53621->53623 53624 492a04 53622->53624 53627 492a0c FindWindowA 53624->53627 53631 492a6d 53625->53631 53632 492ab4 53625->53632 53628 446ff8 32 API calls 53626->53628 53629 447278 19 API calls 53627->53629 53630 492a3e 53628->53630 53629->53721 53634 492a46 FindWindowA 53630->53634 53750 446f9c 32 API calls 53631->53750 53638 492b10 53632->53638 53639 492ac3 53632->53639 53636 447278 19 API calls 53634->53636 53635 492a79 53751 446f9c 32 API calls 53635->53751 53733 492a59 53636->53733 53646 492b6c 53638->53646 53647 492b1f 53638->53647 53754 446f9c 32 API calls 53639->53754 53641 492a86 53752 446f9c 32 API calls 53641->53752 53642 492acf 53755 446f9c 32 API calls 53642->53755 53645 492a93 53753 446f9c 32 API calls 53645->53753 53657 492b7b 53646->53657 53658 492ba6 53646->53658 53759 446f9c 32 API calls 53647->53759 53648 492adc 53756 446f9c 32 API calls 53648->53756 53652 492a9e SendMessageA 53656 447278 19 API calls 53652->53656 53653 492b2b 53760 446f9c 32 API calls 53653->53760 53655 492ae9 53757 446f9c 32 API calls 53655->53757 53656->53733 53661 446ff8 32 API calls 53657->53661 53666 492bb5 53658->53666 53667 492bf4 53658->53667 53659 492b38 53761 446f9c 32 API calls 53659->53761 53664 492b88 53661->53664 53663 492af4 PostMessageA 53758 4470d0 19 API calls 53663->53758 53671 492b90 RegisterClipboardFormatA 53664->53671 53665 492b45 53762 446f9c 32 API calls 53665->53762 53764 446f9c 32 API calls 53666->53764 53675 492c48 53667->53675 53676 492c03 53667->53676 53672 447278 19 API calls 53671->53672 53672->53721 53673 492b50 SendNotifyMessageA 53763 4470d0 19 API calls 53673->53763 53674 492bc1 53765 446f9c 32 API calls 53674->53765 53685 492c9c 53675->53685 53686 492c57 53675->53686 53767 446f9c 32 API calls 53676->53767 53680 492bce 53766 446f9c 32 API calls 53680->53766 53681 492c0f 53768 446f9c 32 API calls 53681->53768 53684 492bd9 SendMessageA 53688 447278 19 API calls 53684->53688 53694 492cab 53685->53694 53695 492cfe 53685->53695 53771 446f9c 32 API calls 53686->53771 53687 492c1c 53769 446f9c 32 API calls 53687->53769 53688->53733 53691 492c63 53772 446f9c 32 API calls 53691->53772 53693 492c27 PostMessageA 53770 4470d0 19 API calls 53693->53770 53698 446ff8 32 API calls 53694->53698 53702 492d0d 53695->53702 53703 492d85 53695->53703 53696 492c70 53773 446f9c 32 API calls 53696->53773 53700 492cb8 53698->53700 53704 42e394 2 API calls 53700->53704 53701 492c7b SendNotifyMessageA 53774 4470d0 19 API calls 53701->53774 53706 446ff8 32 API calls 53702->53706 53711 492d94 53703->53711 53718 492dba 53703->53718 53707 492cc5 53704->53707 53708 492d1c 53706->53708 53709 492cdb GetLastError 53707->53709 53710 492ccb 53707->53710 53775 446f9c 32 API calls 53708->53775 53712 447278 19 API calls 53709->53712 53713 447278 19 API calls 53710->53713 53780 446f9c 32 API calls 53711->53780 53714 492cd9 53712->53714 53713->53714 53717 447278 19 API calls 53714->53717 53716 492d9e FreeLibrary 53781 4470d0 19 API calls 53716->53781 53717->53721 53722 492dc9 53718->53722 53723 492dec 53718->53723 53721->53621 53727 446ff8 32 API calls 53722->53727 53731 492dfb 53723->53731 53738 492e2f 53723->53738 53724 492d2f GetProcAddress 53725 492d3b 53724->53725 53726 492d75 53724->53726 53776 446f9c 32 API calls 53725->53776 53779 4470d0 19 API calls 53726->53779 53729 492dd5 53727->53729 53736 492ddd CreateMutexA 53729->53736 53782 48ce1c 32 API calls 53731->53782 53732 492d47 53777 446f9c 32 API calls 53732->53777 53733->53721 53736->53721 53737 492d54 53741 447278 19 API calls 53737->53741 53738->53721 53784 48ce1c 32 API calls 53738->53784 53740 492e07 53742 492e18 OemToCharBuffA 53740->53742 53743 492d65 53741->53743 53783 48ce34 19 API calls 53742->53783 53778 4470d0 19 API calls 53743->53778 53746 492e4a 53747 492e5b CharToOemBuffA 53746->53747 53785 48ce34 19 API calls 53747->53785 53749->53618 53750->53635 53751->53641 53752->53645 53753->53652 53754->53642 53755->53648 53756->53655 53757->53663 53758->53733 53759->53653 53760->53659 53761->53665 53762->53673 53763->53721 53764->53674 53765->53680 53766->53684 53767->53681 53768->53687 53769->53693 53770->53733 53771->53691 53772->53696 53773->53701 53774->53721 53775->53724 53776->53732 53777->53737 53778->53733 53779->53733 53780->53716 53781->53721 53782->53740 53783->53721 53784->53746 53785->53721 53786 41ee54 53787 41ee63 IsWindowVisible 53786->53787 53788 41ee99 53786->53788 53787->53788 53789 41ee6d IsWindowEnabled 53787->53789 53789->53788 53790 41ee77 53789->53790 53791 402648 18 API calls 53790->53791 53792 41ee81 EnableWindow 53791->53792 53792->53788 56801 498cfc 56859 403344 56801->56859 56803 498d0a 56862 4056a0 56803->56862 56805 498d0f 56865 40631c GetModuleHandleA GetProcAddress 56805->56865 56809 498d19 56873 40994c 56809->56873 57140 4032fc 56859->57140 56861 403349 GetModuleHandleA GetCommandLineA 56861->56803 56864 4056db 56862->56864 57141 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56862->57141 56864->56805 56866 406338 56865->56866 56867 40633f GetProcAddress 56865->56867 56866->56867 56868 406355 GetProcAddress 56867->56868 56869 40634e 56867->56869 56870 406364 SetProcessDEPPolicy 56868->56870 56871 406368 56868->56871 56869->56868 56870->56871 56872 4063c4 6F571CD0 56871->56872 56872->56809 57142 409024 56873->57142 57140->56861 57141->56864 57143 408cbc 19 API calls 57142->57143 57144 409035 57143->57144 57145 4085dc GetSystemDefaultLCID 57144->57145 57149 408612 57145->57149 57146 408568 19 API calls 57146->57149 57147 403450 18 API calls 57147->57149 57148 406dec 19 API calls 57148->57149 57149->57146 57149->57147 57149->57148 57150 408674 57149->57150 57151 403450 18 API calls 57150->57151 57152 406dec 19 API calls 57150->57152 57153 408568 19 API calls 57150->57153 57154 4086f7 57150->57154 57151->57150 57152->57150 57153->57150 57155 403420 4 API calls 57154->57155 57156 408711 57155->57156 57157 408720 GetSystemDefaultLCID 57156->57157 57214 408568 GetLocaleInfoA 57157->57214 57160 403450 18 API calls 57161 408760 57160->57161 57162 408568 19 API calls 57161->57162 57163 408775 57162->57163 57164 408568 19 API calls 57163->57164 57165 408799 57164->57165 57220 4085b4 GetLocaleInfoA 57165->57220 57168 4085b4 GetLocaleInfoA 57169 4087c9 57168->57169 57170 408568 19 API calls 57169->57170 57171 4087e3 57170->57171 57172 4085b4 GetLocaleInfoA 57171->57172 57173 408800 57172->57173 57174 408568 19 API calls 57173->57174 57175 40881a 57174->57175 57176 403450 18 API calls 57175->57176 57177 408827 57176->57177 57178 408568 19 API calls 57177->57178 57179 40883c 57178->57179 57180 403450 18 API calls 57179->57180 57181 408849 57180->57181 57182 4085b4 GetLocaleInfoA 57181->57182 57183 408857 57182->57183 57184 408568 19 API calls 57183->57184 57185 408871 57184->57185 57186 403450 18 API calls 57185->57186 57187 40887e 57186->57187 57188 408568 19 API calls 57187->57188 57189 408893 57188->57189 57190 403450 18 API calls 57189->57190 57191 4088a0 57190->57191 57192 408568 19 API calls 57191->57192 57193 4088b5 57192->57193 57194 4088d2 57193->57194 57195 4088c3 57193->57195 57197 403494 4 API calls 57194->57197 57196 403494 4 API calls 57195->57196 57215 4085a1 57214->57215 57216 40858f 57214->57216 57218 403494 4 API calls 57215->57218 57217 4034e0 18 API calls 57216->57217 57219 40859f 57217->57219 57218->57219 57219->57160 57221 4085d0 57220->57221 57221->57168 53793 41fb58 53794 41fb61 53793->53794 53797 41fdfc 53794->53797 53796 41fb6e 53798 41feee 53797->53798 53799 41fe13 53797->53799 53798->53796 53799->53798 53818 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 53799->53818 53801 41fe49 53802 41fe73 53801->53802 53803 41fe4d 53801->53803 53828 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 53802->53828 53819 41fb9c 53803->53819 53807 41fe81 53809 41fe85 53807->53809 53810 41feab 53807->53810 53808 41fb9c 10 API calls 53812 41fe71 53808->53812 53813 41fb9c 10 API calls 53809->53813 53811 41fb9c 10 API calls 53810->53811 53814 41febd 53811->53814 53812->53796 53815 41fe97 53813->53815 53817 41fb9c 10 API calls 53814->53817 53816 41fb9c 10 API calls 53815->53816 53816->53812 53817->53812 53818->53801 53820 41fbb7 53819->53820 53821 41f93c 4 API calls 53820->53821 53822 41fbcd 53820->53822 53821->53822 53829 41f93c 53822->53829 53824 41fc15 53825 41fc38 SetScrollInfo 53824->53825 53837 41fa9c 53825->53837 53828->53807 53830 4181e0 53829->53830 53831 41f959 GetWindowLongA 53830->53831 53832 41f996 53831->53832 53833 41f976 53831->53833 53849 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 53832->53849 53848 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 53833->53848 53836 41f982 53836->53824 53838 41faaa 53837->53838 53839 41fab2 53837->53839 53838->53808 53840 41faf1 53839->53840 53841 41fae1 53839->53841 53845 41faef 53839->53845 53851 417e48 IsWindowVisible ScrollWindow SetWindowPos 53840->53851 53850 417e48 IsWindowVisible ScrollWindow SetWindowPos 53841->53850 53842 41fb31 GetScrollPos 53842->53838 53846 41fb3c 53842->53846 53845->53842 53847 41fb4b SetScrollPos 53846->53847 53847->53838 53848->53836 53849->53836 53850->53845 53851->53845 58582 480ab1 58583 451004 19 API calls 58582->58583 58584 480ac5 58583->58584 58585 47fb60 35 API calls 58584->58585 58586 480ae9 58585->58586 53852 420598 53853 4205ab 53852->53853 53873 415b30 53853->53873 53855 4205e6 53856 4206f2 53855->53856 53858 420651 53855->53858 53866 420642 MulDiv 53855->53866 53857 420709 53856->53857 53880 4146d4 KiUserCallbackDispatcher 53856->53880 53862 420720 53857->53862 53881 414718 KiUserCallbackDispatcher 53857->53881 53878 420848 34 API calls 53858->53878 53863 420742 53862->53863 53882 420060 12 API calls 53862->53882 53864 42066a 53864->53856 53879 420060 12 API calls 53864->53879 53877 41a304 19 API calls 53866->53877 53869 420687 53870 4206a3 MulDiv 53869->53870 53871 4206c6 53869->53871 53870->53871 53871->53856 53872 4206cf MulDiv 53871->53872 53872->53856 53874 415b42 53873->53874 53883 414470 53874->53883 53876 415b5a 53876->53855 53877->53858 53878->53864 53879->53869 53880->53857 53881->53862 53882->53863 53884 41448a 53883->53884 53887 410458 53884->53887 53886 4144a0 53886->53876 53890 40dca4 53887->53890 53889 41045e 53889->53886 53891 40dd06 53890->53891 53892 40dcb7 53890->53892 53897 40dd14 53891->53897 53895 40dd14 33 API calls 53892->53895 53896 40dce1 53895->53896 53896->53889 53898 40dd24 53897->53898 53900 40dd3a 53898->53900 53909 40e09c 53898->53909 53925 40d5e0 53898->53925 53928 40df4c 53900->53928 53903 40d5e0 19 API calls 53904 40dd42 53903->53904 53904->53903 53905 40ddae 53904->53905 53931 40db60 53904->53931 53906 40df4c 19 API calls 53905->53906 53908 40dd10 53906->53908 53908->53889 53945 40e96c 53909->53945 53911 403778 18 API calls 53913 40e0d7 53911->53913 53912 40e18d 53914 40e1b7 53912->53914 53915 40e1a8 53912->53915 53913->53911 53913->53912 54008 40d774 19 API calls 53913->54008 54009 40e080 19 API calls 53913->54009 54005 40ba24 53914->54005 53954 40e3c0 53915->53954 53918 40e1b5 53922 403400 4 API calls 53918->53922 53923 40e25c 53922->53923 53923->53898 53926 40ea08 19 API calls 53925->53926 53927 40d5ea 53926->53927 53927->53898 54042 40d4bc 53928->54042 54051 40df54 53931->54051 53934 40e96c 19 API calls 53935 40db9e 53934->53935 53936 40e96c 19 API calls 53935->53936 53937 40dba9 53936->53937 53938 40dbc4 53937->53938 53939 40dbbb 53937->53939 53944 40dbc1 53937->53944 54058 40d9d8 53938->54058 54061 40dac8 33 API calls 53939->54061 53942 403420 4 API calls 53943 40dc8f 53942->53943 53943->53904 53944->53942 54011 40d780 53945->54011 53948 4034e0 18 API calls 53949 40e98f 53948->53949 53950 403744 18 API calls 53949->53950 53951 40e996 53950->53951 53952 40d780 19 API calls 53951->53952 53953 40e9a4 53952->53953 53953->53913 53955 40e3f6 53954->53955 53956 40e3ec 53954->53956 53958 40e511 53955->53958 53959 40e495 53955->53959 53960 40e4f6 53955->53960 53961 40e576 53955->53961 53962 40e438 53955->53962 53963 40e4d9 53955->53963 53964 40e47a 53955->53964 53965 40e4bb 53955->53965 53996 40e45c 53955->53996 54016 40d440 19 API calls 53956->54016 53966 40d764 19 API calls 53958->53966 54024 40de24 19 API calls 53959->54024 54029 40e890 19 API calls 53960->54029 53970 40d764 19 API calls 53961->53970 54017 40d764 53962->54017 54027 40e9a8 19 API calls 53963->54027 54023 40d818 19 API calls 53964->54023 54026 40dde4 19 API calls 53965->54026 53975 40e519 53966->53975 53969 403400 4 API calls 53976 40e5eb 53969->53976 53977 40e57e 53970->53977 53981 40e523 53975->53981 53982 40e51d 53975->53982 53976->53918 53983 40e582 53977->53983 53984 40e59b 53977->53984 53978 40e4e4 54028 409d38 18 API calls 53978->54028 53980 40e4a0 54025 40d470 19 API calls 53980->54025 54030 40ea08 53981->54030 53991 40e521 53982->53991 53992 40e53c 53982->53992 53994 40ea08 19 API calls 53983->53994 54036 40de24 19 API calls 53984->54036 53986 40e461 54022 40ded8 19 API calls 53986->54022 53987 40e444 54020 40de24 19 API calls 53987->54020 54034 40de24 19 API calls 53991->54034 53997 40ea08 19 API calls 53992->53997 53994->53996 53996->53969 54000 40e544 53997->54000 53998 40e44f 54021 40e26c 19 API calls 53998->54021 54033 40d8a0 19 API calls 54000->54033 54002 40e566 54035 40e2d4 18 API calls 54002->54035 54037 40b9d0 54005->54037 54008->53913 54009->53913 54010 40d774 19 API calls 54010->53918 54014 40d78b 54011->54014 54012 40d7c5 54012->53948 54014->54012 54015 40d7cc 19 API calls 54014->54015 54015->54014 54016->53955 54018 40ea08 19 API calls 54017->54018 54019 40d76e 54018->54019 54019->53986 54019->53987 54020->53998 54021->53996 54022->53996 54023->53996 54024->53980 54025->53996 54026->53996 54027->53978 54028->53996 54029->53996 54031 40d780 19 API calls 54030->54031 54032 40ea15 54031->54032 54032->53996 54033->53996 54034->54002 54035->53996 54036->53996 54038 40b9e2 54037->54038 54040 40ba07 54037->54040 54038->54040 54041 40ba84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54038->54041 54040->53918 54040->54010 54041->54040 54043 40ea08 19 API calls 54042->54043 54044 40d4c9 54043->54044 54045 40d4dc 54044->54045 54049 40eb0c 19 API calls 54044->54049 54045->53904 54047 40d4d7 54050 40d458 19 API calls 54047->54050 54049->54047 54050->54045 54052 40d764 19 API calls 54051->54052 54053 40df6b 54052->54053 54054 40ea08 19 API calls 54053->54054 54057 40db93 54053->54057 54055 40df78 54054->54055 54055->54057 54062 40ded8 19 API calls 54055->54062 54057->53934 54063 40ab7c 33 API calls 54058->54063 54060 40da00 54060->53944 54061->53944 54062->54057 54063->54060 58587 40ce7c 58588 40ce84 58587->58588 58589 40ceae 58588->58589 58590 40ceb2 58588->58590 58591 40cea7 58588->58591 58592 40ceb6 58590->58592 58593 40cec8 58590->58593 58601 406288 GlobalHandle GlobalUnlock GlobalFree 58591->58601 58602 40625c GlobalAlloc GlobalLock 58592->58602 58600 40626c GlobalHandle GlobalUnlock GlobalReAlloc GlobalLock 58593->58600 58597 40cec4 58598 40ced8 58597->58598 58598->58589 58599 408cbc 19 API calls 58598->58599 58599->58589 58600->58598 58601->58589 58602->58597 58603 41363c SetWindowLongA GetWindowLongA 58604 413699 SetPropA SetPropA 58603->58604 58605 41367b GetWindowLongA 58603->58605 58610 41f39c 58604->58610 58605->58604 58606 41368a SetWindowLongA 58605->58606 58606->58604 58615 415270 58610->58615 58622 423c0c 58610->58622 58716 423a84 58610->58716 58611 4136e9 58618 41527d 58615->58618 58616 4152e3 58723 424b8c 13 API calls 58616->58723 58617 4152d8 58621 4152e1 58617->58621 58724 41505c 60 API calls 58617->58724 58618->58616 58618->58617 58618->58621 58621->58611 58625 423c42 58622->58625 58640 423c63 58625->58640 58725 423b68 58625->58725 58626 423cec 58628 423cf3 58626->58628 58629 423d27 58626->58629 58627 423c8d 58630 423c93 58627->58630 58631 423d50 58627->58631 58634 423fb1 58628->58634 58635 423cf9 58628->58635 58638 423d32 58629->58638 58639 42409a IsIconic 58629->58639 58636 423cc5 58630->58636 58637 423c98 58630->58637 58632 423d62 58631->58632 58633 423d6b 58631->58633 58641 423d78 58632->58641 58642 423d69 58632->58642 58732 424194 11 API calls 58633->58732 58634->58640 58691 423fd7 IsWindowEnabled 58634->58691 58644 423f13 SendMessageA 58635->58644 58645 423d07 58635->58645 58636->58640 58665 423cde 58636->58665 58666 423e3f 58636->58666 58647 423df6 58637->58647 58648 423c9e 58637->58648 58649 4240d6 58638->58649 58650 423d3b 58638->58650 58639->58640 58646 4240ae GetFocus 58639->58646 58640->58611 58652 4241dc 11 API calls 58641->58652 58733 423b84 NtdllDefWindowProc_A 58642->58733 58644->58640 58645->58640 58674 423cc0 58645->58674 58689 423f56 58645->58689 58646->58640 58653 4240bf 58646->58653 58737 423b84 NtdllDefWindowProc_A 58647->58737 58654 423ca7 58648->58654 58655 423e1e PostMessageA 58648->58655 58746 424850 WinHelpA PostMessageA 58649->58746 58651 4240ed 58650->58651 58650->58674 58663 4240f6 58651->58663 58664 42410b 58651->58664 58652->58640 58745 41eff4 GetCurrentThreadId EnumThreadWindows 58653->58745 58661 423cb0 58654->58661 58662 423ea5 58654->58662 58738 423b84 NtdllDefWindowProc_A 58655->58738 58669 423cb9 58661->58669 58670 423dce IsIconic 58661->58670 58671 423eae 58662->58671 58672 423edf 58662->58672 58673 4244d4 19 API calls 58663->58673 58747 42452c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 58664->58747 58665->58674 58675 423e0b 58665->58675 58729 423b84 NtdllDefWindowProc_A 58666->58729 58668 4240c6 58668->58640 58679 4240ce SetFocus 58668->58679 58669->58674 58680 423d91 58669->58680 58683 423dea 58670->58683 58684 423dde 58670->58684 58740 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 58671->58740 58730 423b84 NtdllDefWindowProc_A 58672->58730 58673->58640 58674->58640 58731 423b84 NtdllDefWindowProc_A 58674->58731 58677 424178 26 API calls 58675->58677 58677->58640 58678 423e45 58687 423e83 58678->58687 58688 423e61 58678->58688 58679->58640 58680->58640 58734 422c4c ShowWindow PostMessageA PostQuitMessage 58680->58734 58682 423e39 58682->58640 58736 423b84 NtdllDefWindowProc_A 58683->58736 58735 423bc0 29 API calls 58684->58735 58696 423a84 6 API calls 58687->58696 58739 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 58688->58739 58689->58640 58703 423f78 IsWindowEnabled 58689->58703 58690 423eb6 58698 423ec8 58690->58698 58705 41ef58 6 API calls 58690->58705 58691->58640 58699 423fe5 58691->58699 58694 423ee5 58700 423efd 58694->58700 58707 41eea4 2 API calls 58694->58707 58704 423e8b PostMessageA 58696->58704 58741 423b84 NtdllDefWindowProc_A 58698->58741 58709 423fec IsWindowVisible 58699->58709 58701 423a84 6 API calls 58700->58701 58701->58640 58702 423e69 PostMessageA 58702->58640 58703->58640 58708 423f86 58703->58708 58704->58640 58705->58698 58707->58700 58742 412310 21 API calls 58708->58742 58709->58640 58711 423ffa GetFocus 58709->58711 58712 4181e0 58711->58712 58713 42400f SetFocus 58712->58713 58743 415240 58713->58743 58717 423b0d 58716->58717 58718 423a94 58716->58718 58717->58611 58718->58717 58719 423a9a EnumWindows 58718->58719 58719->58717 58720 423ab6 GetWindow GetWindowLongA 58719->58720 58748 423a1c GetWindow 58719->58748 58721 423ad5 58720->58721 58721->58717 58722 423b01 SetWindowPos 58721->58722 58722->58717 58722->58721 58723->58621 58724->58621 58726 423b72 58725->58726 58727 423b7d 58725->58727 58726->58727 58728 408720 21 API calls 58726->58728 58727->58626 58727->58627 58728->58727 58729->58678 58730->58694 58731->58640 58732->58640 58733->58640 58734->58640 58735->58640 58736->58640 58737->58640 58738->58682 58739->58702 58740->58690 58741->58640 58742->58640 58744 41525b SetFocus 58743->58744 58744->58640 58745->58668 58746->58682 58747->58682 58749 423a3d GetWindowLongA 58748->58749 58750 423a49 58748->58750 58749->58750
                                                    Strings
                                                    • Same version. Skipping., xrefs: 00470E35
                                                    • @, xrefs: 00470900
                                                    • Couldn't read time stamp. Skipping., xrefs: 00470E85
                                                    • Time stamp of existing file: (failed to read), xrefs: 00470B87
                                                    • Version of our file: %u.%u.%u.%u, xrefs: 00470C40
                                                    • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470E20
                                                    • Existing file is a newer version. Skipping., xrefs: 00470D52
                                                    • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 00470FE6
                                                    • Version of existing file: (none), xrefs: 00470E4A
                                                    • Failed to strip read-only attribute., xrefs: 00471023
                                                    • Will register the file (a type library) later., xrefs: 00471663
                                                    • Stripped read-only attribute., xrefs: 00471017
                                                    • Time stamp of our file: %s, xrefs: 00470AEB
                                                    • Installing the file., xrefs: 00471059
                                                    • Skipping due to "onlyifdoesntexist" flag., xrefs: 00470B1E
                                                    • Version of our file: (none), xrefs: 00470C4C
                                                    • Non-default bitness: 32-bit, xrefs: 00470A0B
                                                    • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470E14
                                                    • Time stamp of existing file: %s, xrefs: 00470B7B
                                                    • , xrefs: 00470D1F, 00470EF0, 00470F6E
                                                    • Incrementing shared file count (32-bit)., xrefs: 004716F5
                                                    • Will register the file (a DLL/OCX) later., xrefs: 0047166F
                                                    • Dest file exists., xrefs: 00470B0B
                                                    • Skipping due to "onlyifdestfileexists" flag., xrefs: 0047104A
                                                    • Same time stamp. Skipping., xrefs: 00470EA5
                                                    • InUn, xrefs: 004712AF
                                                    • Version of existing file: %u.%u.%u.%u, xrefs: 00470CCC
                                                    • Time stamp of our file: (failed to read), xrefs: 00470AF7
                                                    • Incrementing shared file count (64-bit)., xrefs: 004716DC
                                                    • Non-default bitness: 64-bit, xrefs: 004709FF
                                                    • User opted not to overwrite the existing file. Skipping., xrefs: 00470F9D
                                                    • Existing file has a later time stamp. Skipping., xrefs: 00470F1F
                                                    • Existing file is protected by Windows File Protection. Skipping., xrefs: 00470F3C
                                                    • .tmp, xrefs: 00471107
                                                    • Dest file is protected by Windows File Protection., xrefs: 00470A3D
                                                    • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470E05
                                                    • Installing into GAC, xrefs: 00471864
                                                    • -- File entry --, xrefs: 0047084B
                                                    • Uninstaller requires administrator: %s, xrefs: 004712DF
                                                    • Dest filename: %s, xrefs: 004709E4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                    • API String ID: 0-4021121268
                                                    • Opcode ID: b7c2b54034891d9a0af56454c45f4974a721bcd5ea4d13fabdce3f6e5da70021
                                                    • Instruction ID: 0fe32287a693f12f7c2661215c890409d16b812d695f5d9f05be84b50b2e4112
                                                    • Opcode Fuzzy Hash: b7c2b54034891d9a0af56454c45f4974a721bcd5ea4d13fabdce3f6e5da70021
                                                    • Instruction Fuzzy Hash: 16927474A04288DFDB11DFA9C445BDDBBB5AF05304F1480ABE848BB392C7789E49CB59

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1578 42e09c-42e0ad 1579 42e0b8-42e0dd AllocateAndInitializeSid 1578->1579 1580 42e0af-42e0b3 1578->1580 1581 42e287-42e28f 1579->1581 1582 42e0e3-42e100 GetVersion 1579->1582 1580->1581 1583 42e102-42e117 GetModuleHandleA GetProcAddress 1582->1583 1584 42e119-42e11b 1582->1584 1583->1584 1585 42e142-42e15c GetCurrentThread OpenThreadToken 1584->1585 1586 42e11d-42e12b CheckTokenMembership 1584->1586 1589 42e193-42e1bb GetTokenInformation 1585->1589 1590 42e15e-42e168 GetLastError 1585->1590 1587 42e131-42e13d 1586->1587 1588 42e269-42e27f FreeSid 1586->1588 1587->1588 1591 42e1d6-42e1fa call 402648 GetTokenInformation 1589->1591 1592 42e1bd-42e1c5 GetLastError 1589->1592 1593 42e174-42e187 GetCurrentProcess OpenProcessToken 1590->1593 1594 42e16a-42e16f call 4031bc 1590->1594 1605 42e208-42e210 1591->1605 1606 42e1fc-42e206 call 4031bc * 2 1591->1606 1592->1591 1595 42e1c7-42e1d1 call 4031bc * 2 1592->1595 1593->1589 1598 42e189-42e18e call 4031bc 1593->1598 1594->1581 1595->1581 1598->1581 1607 42e212-42e213 1605->1607 1608 42e243-42e261 call 402660 CloseHandle 1605->1608 1606->1581 1611 42e215-42e228 EqualSid 1607->1611 1615 42e22a-42e237 1611->1615 1616 42e23f-42e241 1611->1616 1615->1616 1620 42e239-42e23d 1615->1620 1616->1608 1616->1611 1620->1608
                                                    APIs
                                                    • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0D6
                                                    • GetVersion.KERNEL32(00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0F3
                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E10C
                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E112
                                                    • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E127
                                                    • FreeSid.ADVAPI32(00000000,0042E287,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E27A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                    • String ID: CheckTokenMembership$advapi32.dll
                                                    • API String ID: 2252812187-1888249752
                                                    • Opcode ID: e85b50142d6fb8dfa018e27ce328f4228a324c83d29f55767421a1d4cb2019c7
                                                    • Instruction ID: e5677345bf142a8b1d9111380f95962c8bb8cf61ba8e960ca5c3fd0f127139eb
                                                    • Opcode Fuzzy Hash: e85b50142d6fb8dfa018e27ce328f4228a324c83d29f55767421a1d4cb2019c7
                                                    • Instruction Fuzzy Hash: E351A271B44215EEEB10EAE69C42BBF77ACEB09704F9404BBB901F7281D57C99018B79

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1642 4502c0-4502cd 1643 4502d3-4502e0 GetVersion 1642->1643 1644 45037c-450386 1642->1644 1643->1644 1645 4502e6-4502fc LoadLibraryA 1643->1645 1645->1644 1646 4502fe-450377 GetProcAddress * 6 1645->1646 1646->1644
                                                    APIs
                                                    • GetVersion.KERNEL32(00480CA6), ref: 004502D3
                                                    • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480CA6), ref: 004502EB
                                                    • GetProcAddress.KERNEL32(6FAC0000,RmStartSession), ref: 00450309
                                                    • GetProcAddress.KERNEL32(6FAC0000,RmRegisterResources), ref: 0045031E
                                                    • GetProcAddress.KERNEL32(6FAC0000,RmGetList), ref: 00450333
                                                    • GetProcAddress.KERNEL32(6FAC0000,RmShutdown), ref: 00450348
                                                    • GetProcAddress.KERNEL32(6FAC0000,RmRestart), ref: 0045035D
                                                    • GetProcAddress.KERNEL32(6FAC0000,RmEndSession), ref: 00450372
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoadVersion
                                                    • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                    • API String ID: 1968650500-3419246398
                                                    • Opcode ID: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
                                                    • Instruction ID: c77cef2ad5653e61b65a4477cbb73d0d56cf7b8a9d174f96be3e9b6947252677
                                                    • Opcode Fuzzy Hash: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
                                                    • Instruction Fuzzy Hash: B211F7B4510301DBD710FB61BF45A2E36E9E728315B08063FE804961A2CB7C4844CF8C

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1790 423c0c-423c40 1791 423c42-423c43 1790->1791 1792 423c74-423c8b call 423b68 1790->1792 1794 423c45-423c61 call 40b24c 1791->1794 1798 423cec-423cf1 1792->1798 1799 423c8d 1792->1799 1817 423c63-423c6b 1794->1817 1818 423c70-423c72 1794->1818 1800 423cf3 1798->1800 1801 423d27-423d2c 1798->1801 1802 423c93-423c96 1799->1802 1803 423d50-423d60 1799->1803 1807 423fb1-423fb9 1800->1807 1808 423cf9-423d01 1800->1808 1811 423d32-423d35 1801->1811 1812 42409a-4240a8 IsIconic 1801->1812 1809 423cc5-423cc8 1802->1809 1810 423c98 1802->1810 1805 423d62-423d67 1803->1805 1806 423d6b-423d73 call 424194 1803->1806 1819 423d78-423d80 call 4241dc 1805->1819 1820 423d69-423d8c call 423b84 1805->1820 1813 424152-42415a 1806->1813 1807->1813 1814 423fbf-423fca call 4181e0 1807->1814 1822 423f13-423f3a SendMessageA 1808->1822 1823 423d07-423d0c 1808->1823 1815 423da9-423db0 1809->1815 1816 423cce-423ccf 1809->1816 1825 423df6-423e06 call 423b84 1810->1825 1826 423c9e-423ca1 1810->1826 1827 4240d6-4240eb call 424850 1811->1827 1828 423d3b-423d3c 1811->1828 1812->1813 1824 4240ae-4240b9 GetFocus 1812->1824 1831 424171-424177 1813->1831 1814->1813 1878 423fd0-423fdf call 4181e0 IsWindowEnabled 1814->1878 1815->1813 1840 423db6-423dbd 1815->1840 1841 423cd5-423cd8 1816->1841 1842 423f3f-423f46 1816->1842 1817->1831 1818->1792 1818->1794 1819->1813 1820->1813 1822->1813 1843 423d12-423d13 1823->1843 1844 42404a-424055 1823->1844 1824->1813 1835 4240bf-4240c8 call 41eff4 1824->1835 1825->1813 1836 423ca7-423caa 1826->1836 1837 423e1e-423e3a PostMessageA call 423b84 1826->1837 1827->1813 1829 423d42-423d45 1828->1829 1830 4240ed-4240f4 1828->1830 1847 424120-424127 1829->1847 1848 423d4b 1829->1848 1858 4240f6-424109 call 4244d4 1830->1858 1859 42410b-42411e call 42452c 1830->1859 1835->1813 1891 4240ce-4240d4 SetFocus 1835->1891 1855 423cb0-423cb3 1836->1855 1856 423ea5-423eac 1836->1856 1837->1813 1840->1813 1861 423dc3-423dc9 1840->1861 1862 423cde-423ce1 1841->1862 1863 423e3f-423e5f call 423b84 1841->1863 1842->1813 1851 423f4c-423f51 call 404e54 1842->1851 1864 424072-42407d 1843->1864 1865 423d19-423d1c 1843->1865 1844->1813 1849 42405b-42406d 1844->1849 1882 42413a-424149 1847->1882 1883 424129-424138 1847->1883 1866 42414b-42414c call 423b84 1848->1866 1849->1813 1851->1813 1873 423cb9-423cba 1855->1873 1874 423dce-423ddc IsIconic 1855->1874 1875 423eae-423ec1 call 423b14 1856->1875 1876 423edf-423ef0 call 423b84 1856->1876 1858->1813 1859->1813 1861->1813 1879 423ce7 1862->1879 1880 423e0b-423e19 call 424178 1862->1880 1905 423e83-423ea0 call 423a84 PostMessageA 1863->1905 1906 423e61-423e7e call 423b14 PostMessageA 1863->1906 1864->1813 1867 424083-424095 1864->1867 1884 423d22 1865->1884 1885 423f56-423f5e 1865->1885 1914 424151 1866->1914 1867->1813 1892 423cc0 1873->1892 1893 423d91-423d99 1873->1893 1899 423dea-423df1 call 423b84 1874->1899 1900 423dde-423de5 call 423bc0 1874->1900 1919 423ed3-423eda call 423b84 1875->1919 1920 423ec3-423ecd call 41ef58 1875->1920 1924 423ef2-423ef8 call 41eea4 1876->1924 1925 423f06-423f0e call 423a84 1876->1925 1878->1813 1921 423fe5-423ff4 call 4181e0 IsWindowVisible 1878->1921 1879->1866 1880->1813 1882->1813 1883->1813 1884->1866 1885->1813 1890 423f64-423f6b 1885->1890 1890->1813 1907 423f71-423f80 call 4181e0 IsWindowEnabled 1890->1907 1891->1813 1892->1866 1893->1813 1908 423d9f-423da4 call 422c4c 1893->1908 1899->1813 1900->1813 1905->1813 1906->1813 1907->1813 1936 423f86-423f9c call 412310 1907->1936 1908->1813 1914->1813 1919->1813 1920->1919 1921->1813 1942 423ffa-424045 GetFocus call 4181e0 SetFocus call 415240 SetFocus 1921->1942 1940 423efd-423f00 1924->1940 1925->1813 1936->1813 1945 423fa2-423fac 1936->1945 1940->1925 1942->1813 1945->1813
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 702cdc7a7447dbec475746a4497e094c90e9972b1c44fc000768d2c872bd6b20
                                                    • Instruction ID: afb4f91cf4018cf9acc1c9974f14325182323c15c0e0405bd0f9b005e596376e
                                                    • Opcode Fuzzy Hash: 702cdc7a7447dbec475746a4497e094c90e9972b1c44fc000768d2c872bd6b20
                                                    • Instruction Fuzzy Hash: 03E1AE31700124EFDB04DF69E989AADB7B5FB54300FA440AAE5559B352C73CEE81DB09
                                                    APIs
                                                      • Part of subcall function 00495A20: GetWindowRect.USER32(00000000), ref: 00495A36
                                                    • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467773
                                                      • Part of subcall function 0041D6B0: GetObjectA.GDI32(?,00000018,0046778D), ref: 0041D6DB
                                                      • Part of subcall function 00467180: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
                                                      • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
                                                      • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
                                                      • Part of subcall function 00466B40: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
                                                      • Part of subcall function 00495CA4: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00495CAE
                                                      • Part of subcall function 0042ED38: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
                                                      • Part of subcall function 0042ED38: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
                                                      • Part of subcall function 00495970: GetDC.USER32(00000000), ref: 00495992
                                                      • Part of subcall function 00495970: SelectObject.GDI32(?,00000000), ref: 004959B8
                                                      • Part of subcall function 00495970: ReleaseDC.USER32(00000000,?), ref: 00495A09
                                                      • Part of subcall function 00495C94: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00495C9E
                                                    • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,021EF3E0,021F10E4,?,?,021F1114,?,?,021F1164,?), ref: 00468417
                                                    • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00468428
                                                    • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468440
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Menu$AppendExtractIconObject$AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadProcRectReleaseSelectSystemUserWindow
                                                    • String ID: $(Default)$7'H$STOPIMAGE
                                                    • API String ID: 616467991-1294339269
                                                    • Opcode ID: 60bcec1c3087136259898b5a14ea117ae8417471c57c305dbbbc5834814a158b
                                                    • Instruction ID: 768618ac8668afe930811dafe5a27f49510752cc8f9b80db6c1a8a93991d8459
                                                    • Opcode Fuzzy Hash: 60bcec1c3087136259898b5a14ea117ae8417471c57c305dbbbc5834814a158b
                                                    • Instruction Fuzzy Hash: 01F2C7346005248FCB00EB69D9D9F9973F1BF49304F1582BAE5049B36ADB74EC46CB9A
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00475246,?,?,0049C1E0,00000000), ref: 00475135
                                                    • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,00475246,?,?,0049C1E0,00000000), ref: 00475212
                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,00475246,?,?,0049C1E0,00000000), ref: 00475220
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNext
                                                    • String ID: unins$unins???.*
                                                    • API String ID: 3541575487-1009660736
                                                    • Opcode ID: c66306f3851ec3c0618930f5621158d0c703df0dd44125d7d59c9e4f18c8bd76
                                                    • Instruction ID: cf60276092285450f10be4537e106a6163e2757c0d6b173d8f9caaf7a3c79000
                                                    • Opcode Fuzzy Hash: c66306f3851ec3c0618930f5621158d0c703df0dd44125d7d59c9e4f18c8bd76
                                                    • Instruction Fuzzy Hash: B6315070600508ABCB50EB65C891ADEB7A9DF45304F51C4F6E80CAB2A3DB789F418F58
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452A9D
                                                    • GetLastError.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452AA5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileFindFirstLast
                                                    • String ID:
                                                    • API String ID: 873889042-0
                                                    • Opcode ID: 9c675a8f1f28b386d0fa8c71b8ecb41695e84785a8bb79b0d9bc0322d07a8b6a
                                                    • Instruction ID: 3e58272229af866f17ac5928e9872a720c3be2d4903e778e839a846eb7d55d53
                                                    • Opcode Fuzzy Hash: 9c675a8f1f28b386d0fa8c71b8ecb41695e84785a8bb79b0d9bc0322d07a8b6a
                                                    • Instruction Fuzzy Hash: 94F0F971A04604AB8B10EF669D4149EF7ACEB8672571046BBFC14E3282DAB84E0485A8
                                                    APIs
                                                    • GetVersion.KERNEL32(00000368,0046E1D2), ref: 0046E146
                                                    • CoCreateInstance.OLE32(00499B98,00000000,00000001,00499BA8,?,00000368,0046E1D2), ref: 0046E162
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateInstanceVersion
                                                    • String ID:
                                                    • API String ID: 1462612201-0
                                                    • Opcode ID: 9bb5de2fa102b7af1061e61d6880e4dfe18eceacc4124a01f11506536e7e3a36
                                                    • Instruction ID: afc9cbf82d8b208ebb9117b311ac361b6e37cc3e36b84439544a803dd14dcaad
                                                    • Opcode Fuzzy Hash: 9bb5de2fa102b7af1061e61d6880e4dfe18eceacc4124a01f11506536e7e3a36
                                                    • Instruction Fuzzy Hash: 7AF0A035283200AEEB20A7AADC86B8B37C47B22314F14007BF044C7291E2BD9881865F
                                                    APIs
                                                    • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
                                                    • Instruction ID: 8daab3ef8e56b0da8b8c23f45c5b5388ad46b50bd825570c2d348c61856efc62
                                                    • Opcode Fuzzy Hash: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
                                                    • Instruction Fuzzy Hash: BFE0223170021466C311AA2A9C86AEAB34C9758310F00427FB904E73C2EDB89E4042A8
                                                    APIs
                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424151,?,00000000,0042415C), ref: 00423BAE
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: 03c86555d74cd6010afd77b9e61a524e96c156e733cd5bd8e2feacc4387cef90
                                                    • Instruction ID: a748582893d7571d6ac8bdbe819d0a8fbf5f36db2d3505b6f19a51c7a0bbae16
                                                    • Opcode Fuzzy Hash: 03c86555d74cd6010afd77b9e61a524e96c156e733cd5bd8e2feacc4387cef90
                                                    • Instruction Fuzzy Hash: 47F0B979205608AF8B40DF99C588D4ABBE8AB4C260B058195B988CB321C234ED808F90
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
                                                    • Instruction ID: 9f318ec9847dd9a6abcb639c8bc611599857aea0b867fcad4bfaeec6bdb042bf
                                                    • Opcode Fuzzy Hash: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
                                                    • Instruction Fuzzy Hash: 8FD0C27230470473CB00AA689C825AA35CD8B84305F00483E3CC5DA2C3FABDDA485756
                                                    APIs
                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F53C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: 9e43cbcd657a147b44e82c26281af1c584f356d37a2e763e4ec43db1fd6d4cd6
                                                    • Instruction ID: 7ca9c19e24a5def9c493c34941f9da96f9ca037215ec7a65a90973bf7a04e639
                                                    • Opcode Fuzzy Hash: 9e43cbcd657a147b44e82c26281af1c584f356d37a2e763e4ec43db1fd6d4cd6
                                                    • Instruction Fuzzy Hash: FCD09E7120011D7B9B00DE99E840D6B33AD9B88710B909925F945D7642D634ED9197A5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 844 46f1a8-46f1da 845 46f1f7 844->845 846 46f1dc-46f1e3 844->846 849 46f1fe-46f236 call 403634 call 403738 call 42dec0 845->849 847 46f1e5-46f1ec 846->847 848 46f1ee-46f1f5 846->848 847->845 847->848 848->849 856 46f251-46f27a call 403738 call 42dde4 849->856 857 46f238-46f24c call 403738 call 42dec0 849->857 865 46f27c-46f285 call 46ee78 856->865 866 46f28a-46f2b3 call 46ef94 856->866 857->856 865->866 870 46f2c5-46f2c8 call 403400 866->870 871 46f2b5-46f2c3 call 403494 866->871 875 46f2cd-46f318 call 46ef94 call 42c3fc call 46efdc call 46ef94 870->875 871->875 884 46f32e-46f34f call 45559c call 46ef94 875->884 885 46f31a-46f32d call 46f004 875->885 892 46f3a5-46f3ac 884->892 893 46f351-46f3a4 call 46ef94 call 431404 call 46ef94 call 431404 call 46ef94 884->893 885->884 894 46f3ae-46f3eb call 431404 call 46ef94 call 431404 call 46ef94 892->894 895 46f3ec-46f3f3 892->895 893->892 894->895 899 46f434-46f459 call 40b24c call 46ef94 895->899 900 46f3f5-46f433 call 46ef94 * 3 895->900 919 46f45b-46f466 call 47c3c0 899->919 920 46f468-46f471 call 403494 899->920 900->899 930 46f476-46f481 call 478f58 919->930 920->930 934 46f483-46f488 930->934 935 46f48a 930->935 936 46f48f-46f659 call 403778 call 46ef94 call 47c3c0 call 46efdc call 403494 call 40357c * 2 call 46ef94 call 403494 call 40357c * 2 call 46ef94 call 47c3c0 call 46efdc call 47c3c0 call 46efdc call 47c3c0 call 46efdc call 47c3c0 call 46efdc call 47c3c0 call 46efdc call 47c3c0 call 46efdc call 47c3c0 call 46efdc call 47c3c0 call 46efdc call 47c3c0 call 46efdc call 47c3c0 934->936 935->936 999 46f66f-46f67d call 46f004 936->999 1000 46f65b-46f66d call 46ef94 936->1000 1004 46f682 999->1004 1005 46f683-46f6cc call 46f004 call 46f038 call 46ef94 call 47c3c0 call 46f09c 1000->1005 1004->1005 1016 46f6f2-46f6ff 1005->1016 1017 46f6ce-46f6f1 call 46f004 * 2 1005->1017 1019 46f705-46f70c 1016->1019 1020 46f7ce-46f7d5 1016->1020 1017->1016 1024 46f70e-46f715 1019->1024 1025 46f779-46f788 1019->1025 1021 46f7d7-46f80d call 494e40 1020->1021 1022 46f82f-46f845 RegCloseKey 1020->1022 1021->1022 1024->1025 1029 46f717-46f73b call 430bcc 1024->1029 1028 46f78b-46f798 1025->1028 1032 46f7af-46f7c8 call 430c08 call 46f004 1028->1032 1033 46f79a-46f7a7 1028->1033 1029->1028 1039 46f73d-46f73e 1029->1039 1042 46f7cd 1032->1042 1033->1032 1035 46f7a9-46f7ad 1033->1035 1035->1020 1035->1032 1041 46f740-46f766 call 40b24c call 479784 1039->1041 1047 46f773-46f775 1041->1047 1048 46f768-46f76e call 430bcc 1041->1048 1042->1020 1047->1041 1050 46f777 1047->1050 1048->1047 1050->1028
                                                    APIs
                                                      • Part of subcall function 0046EF94: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,bcG,?,0049C1E0,?,0046F2AB,?,00000000,0046F846,?,_is1), ref: 0046EFB7
                                                      • Part of subcall function 0046F004: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F682,?,?,00000000,0046F846,?,_is1,?), ref: 0046F017
                                                    • RegCloseKey.ADVAPI32(?,0046F84D,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F898,?,?,0049C1E0,00000000), ref: 0046F840
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Value$Close
                                                    • String ID: " /SILENT$5.5.4 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                    • API String ID: 3391052094-621072260
                                                    • Opcode ID: 7d8aaf585a1a8528c3b1dca96beb349396973f8f7a8fc2ffd36ba8840ffd608c
                                                    • Instruction ID: be14fade0605ec114b4d0d1d650b8932ae4f201090507f794a86511dd891168a
                                                    • Opcode Fuzzy Hash: 7d8aaf585a1a8528c3b1dca96beb349396973f8f7a8fc2ffd36ba8840ffd608c
                                                    • Instruction Fuzzy Hash: 33126535A00108AFCB04DB55E891ADE77F5EB48304F20817BE854AB395EB78BD49CB5E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1051 49299c-4929d0 call 403684 1054 4929d2-4929e1 call 446f9c Sleep 1051->1054 1055 4929e6-4929f3 call 403684 1051->1055 1060 492e76-492e90 call 403420 1054->1060 1061 492a22-492a2f call 403684 1055->1061 1062 4929f5-492a18 call 446ff8 call 403738 FindWindowA call 447278 1055->1062 1070 492a5e-492a6b call 403684 1061->1070 1071 492a31-492a59 call 446ff8 call 403738 FindWindowA call 447278 1061->1071 1080 492a1d 1062->1080 1078 492a6d-492aaf call 446f9c * 4 SendMessageA call 447278 1070->1078 1079 492ab4-492ac1 call 403684 1070->1079 1071->1060 1078->1060 1090 492b10-492b1d call 403684 1079->1090 1091 492ac3-492b0b call 446f9c * 4 PostMessageA call 4470d0 1079->1091 1080->1060 1100 492b6c-492b79 call 403684 1090->1100 1101 492b1f-492b67 call 446f9c * 4 SendNotifyMessageA call 4470d0 1090->1101 1091->1060 1113 492b7b-492ba1 call 446ff8 call 403738 RegisterClipboardFormatA call 447278 1100->1113 1114 492ba6-492bb3 call 403684 1100->1114 1101->1060 1113->1060 1125 492bb5-492bef call 446f9c * 3 SendMessageA call 447278 1114->1125 1126 492bf4-492c01 call 403684 1114->1126 1125->1060 1138 492c48-492c55 call 403684 1126->1138 1139 492c03-492c43 call 446f9c * 3 PostMessageA call 4470d0 1126->1139 1152 492c9c-492ca9 call 403684 1138->1152 1153 492c57-492c97 call 446f9c * 3 SendNotifyMessageA call 4470d0 1138->1153 1139->1060 1164 492cab-492cc9 call 446ff8 call 42e394 1152->1164 1165 492cfe-492d0b call 403684 1152->1165 1153->1060 1185 492cdb-492ce9 GetLastError call 447278 1164->1185 1186 492ccb-492cd9 call 447278 1164->1186 1175 492d0d-492d39 call 446ff8 call 403738 call 446f9c GetProcAddress 1165->1175 1176 492d85-492d92 call 403684 1165->1176 1206 492d3b-492d70 call 446f9c * 2 call 447278 call 4470d0 1175->1206 1207 492d75-492d80 call 4470d0 1175->1207 1187 492dba-492dc7 call 403684 1176->1187 1188 492d94-492db5 call 446f9c FreeLibrary call 4470d0 1176->1188 1194 492cee-492cf9 call 447278 1185->1194 1186->1194 1203 492dc9-492de7 call 446ff8 call 403738 CreateMutexA 1187->1203 1204 492dec-492df9 call 403684 1187->1204 1188->1060 1194->1060 1203->1060 1215 492dfb-492e2d call 48ce1c call 403574 call 403738 OemToCharBuffA call 48ce34 1204->1215 1216 492e2f-492e3c call 403684 1204->1216 1206->1060 1207->1060 1215->1060 1228 492e3e-492e70 call 48ce1c call 403574 call 403738 CharToOemBuffA call 48ce34 1216->1228 1229 492e72 1216->1229 1228->1060 1229->1060
                                                    APIs
                                                    • Sleep.KERNEL32(00000000,00000000,00492E91,?,?,?,?,00000000,00000000,00000000), ref: 004929DC
                                                    • FindWindowA.USER32(00000000,00000000), ref: 00492A0D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FindSleepWindow
                                                    • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                    • API String ID: 3078808852-3310373309
                                                    • Opcode ID: 5908f651f00787cd3938b67c28d969e1aab584b55e94cb0f906aa363745cb638
                                                    • Instruction ID: 5f8be1574c3b3f4eb1afaa98e9133663000fa7909c855a3d01459e5326e3d08b
                                                    • Opcode Fuzzy Hash: 5908f651f00787cd3938b67c28d969e1aab584b55e94cb0f906aa363745cb638
                                                    • Instruction Fuzzy Hash: 03C151A0B042007BDF14BF3E9D8151F69A99B98708711C93FB446EB78ADE7DEC0A4359

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1621 483bd0-483bf5 GetModuleHandleA GetProcAddress 1622 483c5c-483c61 GetSystemInfo 1621->1622 1623 483bf7-483c0d GetNativeSystemInfo GetProcAddress 1621->1623 1624 483c66-483c6f 1622->1624 1623->1624 1625 483c0f-483c1a GetCurrentProcess 1623->1625 1626 483c7f-483c86 1624->1626 1627 483c71-483c75 1624->1627 1625->1624 1634 483c1c-483c20 1625->1634 1630 483ca1-483ca6 1626->1630 1628 483c88-483c8f 1627->1628 1629 483c77-483c7b 1627->1629 1628->1630 1632 483c7d-483c9a 1629->1632 1633 483c91-483c98 1629->1633 1632->1630 1633->1630 1634->1624 1636 483c22-483c29 call 45271c 1634->1636 1636->1624 1639 483c2b-483c38 GetProcAddress 1636->1639 1639->1624 1640 483c3a-483c51 GetModuleHandleA GetProcAddress 1639->1640 1640->1624 1641 483c53-483c5a 1640->1641 1641->1624
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483BE1
                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483BEE
                                                    • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483BFC
                                                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483C04
                                                    • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483C10
                                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483C31
                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483C44
                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483C4A
                                                    • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483C61
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                    • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                    • API String ID: 2230631259-2623177817
                                                    • Opcode ID: a311a58dc0b22675e7e86ca92d85f25d3be489529d4b8b240a7db9eef1e9506c
                                                    • Instruction ID: c23e499935606680a634b78f85b31a5c02031c9ae900f5863f5a8e85172ee719
                                                    • Opcode Fuzzy Hash: a311a58dc0b22675e7e86ca92d85f25d3be489529d4b8b240a7db9eef1e9506c
                                                    • Instruction Fuzzy Hash: 25118193508341A4D611BB7A8D89B6F39888B50F1BF140C3FB88175282EA7CCF91976E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1647 468da4-468ddc call 47c3c0 1650 468de2-468df2 call 478f78 1647->1650 1651 468fbe-468fd8 call 403420 1647->1651 1656 468df7-468e3c call 4078f4 call 403738 call 42de1c 1650->1656 1662 468e41-468e43 1656->1662 1663 468fb4-468fb8 1662->1663 1664 468e49-468e5e 1662->1664 1663->1651 1663->1656 1665 468e73-468e7a 1664->1665 1666 468e60-468e6e call 42dd4c 1664->1666 1668 468ea7-468eae 1665->1668 1669 468e7c-468e9e call 42dd4c call 42dd64 1665->1669 1666->1665 1671 468f07-468f0e 1668->1671 1672 468eb0-468ed5 call 42dd4c * 2 1668->1672 1669->1668 1688 468ea0 1669->1688 1674 468f54-468f5b 1671->1674 1675 468f10-468f22 call 42dd4c 1671->1675 1692 468ed7-468ee0 call 4314f8 1672->1692 1693 468ee5-468ef7 call 42dd4c 1672->1693 1677 468f96-468fac RegCloseKey 1674->1677 1678 468f5d-468f91 call 42dd4c * 3 1674->1678 1689 468f24-468f2d call 4314f8 1675->1689 1690 468f32-468f44 call 42dd4c 1675->1690 1678->1677 1688->1668 1689->1690 1690->1674 1700 468f46-468f4f call 4314f8 1690->1700 1692->1693 1693->1671 1704 468ef9-468f02 call 4314f8 1693->1704 1700->1674 1704->1671
                                                    APIs
                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    • RegCloseKey.ADVAPI32(?,00468FBE,?,?,00000001,00000000,00000000,00468FD9,?,00000000,00000000,?), ref: 00468FA7
                                                    Strings
                                                    • Inno Setup: Deselected Components, xrefs: 00468EE8
                                                    • %s\%s_is1, xrefs: 00468E21
                                                    • Inno Setup: Selected Components, xrefs: 00468EC6
                                                    • Inno Setup: Setup Type, xrefs: 00468EB6
                                                    • Inno Setup: App Path, xrefs: 00468E66
                                                    • Inno Setup: No Icons, xrefs: 00468E8F
                                                    • Inno Setup: User Info: Organization, xrefs: 00468F76
                                                    • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00468E03
                                                    • Inno Setup: User Info: Name, xrefs: 00468F63
                                                    • Inno Setup: Icon Group, xrefs: 00468E82
                                                    • Inno Setup: Deselected Tasks, xrefs: 00468F35
                                                    • Inno Setup: Selected Tasks, xrefs: 00468F13
                                                    • Inno Setup: User Info: Serial, xrefs: 00468F89
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                    • API String ID: 47109696-1093091907
                                                    • Opcode ID: fde9ee5abc6c01fbe688cd4d3ec7159dcf364b2820bfcbd498076d28d431ab38
                                                    • Instruction ID: 6af39cf76e1ccd837e63b859e10114477d762f6d52a860f1d75786b360c257a1
                                                    • Opcode Fuzzy Hash: fde9ee5abc6c01fbe688cd4d3ec7159dcf364b2820bfcbd498076d28d431ab38
                                                    • Instruction Fuzzy Hash: 5751C530A006449FCB14DB65C841BDEB7F5EF49304F90856EE850AB391EB79AF05CB59

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 0042D898: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00453DB4,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004984F9), ref: 0042D8AB
                                                      • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                      • Part of subcall function 0042D8F0: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
                                                      • Part of subcall function 0042D8F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
                                                    • SHGetKnownFolderPath.SHELL32(00499D30,00008000,00000000,?,00000000,0047CA96), ref: 0047C99A
                                                    • CoTaskMemFree.OLE32(?,0047C9DF), ref: 0047C9D2
                                                      • Part of subcall function 0042D208: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DA3E,00000000,0042DAD0,?,?,?,0049B628,00000000,00000000), ref: 0042D233
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Directory$AddressEnvironmentFolderFreeHandleKnownModulePathProcSystemTaskVariableWindows
                                                    • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                    • API String ID: 3771764029-544719455
                                                    • Opcode ID: 272f5911ab80d373d8198f2efc2b21498035736a35ecdd76e57bdb5619ca1549
                                                    • Instruction ID: b924e4b60ded602779cc440e284e79ce0f6caeb553111a158bf30b35ca9c842c
                                                    • Opcode Fuzzy Hash: 272f5911ab80d373d8198f2efc2b21498035736a35ecdd76e57bdb5619ca1549
                                                    • Instruction Fuzzy Hash: 68619F34A00208AFDB10EBA5D8D269E7B69EB44319F90C57BE404A7396D73C9A44CF5D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1949 423874-42387e 1950 4239a7-4239ab 1949->1950 1951 423884-4238a6 call 41f3c4 GetClassInfoA 1949->1951 1954 4238d7-4238e0 GetSystemMetrics 1951->1954 1955 4238a8-4238bf RegisterClassA 1951->1955 1957 4238e2 1954->1957 1958 4238e5-4238ef GetSystemMetrics 1954->1958 1955->1954 1956 4238c1-4238d2 call 408cbc call 40311c 1955->1956 1956->1954 1957->1958 1960 4238f1 1958->1960 1961 4238f4-423950 call 403738 call 4062e8 call 403400 call 42364c SetWindowLongA 1958->1961 1960->1961 1972 423952-423965 call 424178 SendMessageA 1961->1972 1973 42396a-423998 GetSystemMenu DeleteMenu * 2 1961->1973 1972->1973 1973->1950 1975 42399a-4239a2 DeleteMenu 1973->1975 1975->1950
                                                    APIs
                                                      • Part of subcall function 0041F3C4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
                                                    • GetClassInfoA.USER32(00400000,0042367C), ref: 0042389F
                                                    • RegisterClassA.USER32(00499630), ref: 004238B7
                                                    • GetSystemMetrics.USER32(00000000), ref: 004238D9
                                                    • GetSystemMetrics.USER32(00000001), ref: 004238E8
                                                    • SetWindowLongA.USER32(00410460,000000FC,0042368C), ref: 00423944
                                                    • SendMessageA.USER32(00410460,00000080,00000001,00000000), ref: 00423965
                                                    • GetSystemMenu.USER32(00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 00423970
                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 0042397F
                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042398C
                                                    • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239A2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                    • String ID: |6B
                                                    • API String ID: 183575631-3009739247
                                                    • Opcode ID: 4cae07da4ecbd82a5ef2c5022e230c145e19d211ee6ce0cd027d67cd6f27acc7
                                                    • Instruction ID: 5979ac727d64f3fe5c9a0a43452729076f54e0f9e4c251b9a4c28f9d6bed272f
                                                    • Opcode Fuzzy Hash: 4cae07da4ecbd82a5ef2c5022e230c145e19d211ee6ce0cd027d67cd6f27acc7
                                                    • Instruction Fuzzy Hash: E63152B17402006AEB10AF69DC82F6A37989B14709F60017BFA44EF2D7C6BDED40876D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1977 47cfcc-47d022 call 42c3fc call 4035c0 call 47cc90 call 4525d8 1986 47d024-47d029 call 453344 1977->1986 1987 47d02e-47d03d call 4525d8 1977->1987 1986->1987 1991 47d057-47d05d 1987->1991 1992 47d03f-47d045 1987->1992 1993 47d074-47d09c call 42e394 * 2 1991->1993 1994 47d05f-47d065 1991->1994 1995 47d067-47d06f call 403494 1992->1995 1996 47d047-47d04d 1992->1996 2003 47d0c3-47d0dd GetProcAddress 1993->2003 2004 47d09e-47d0be call 4078f4 call 453344 1993->2004 1994->1993 1994->1995 1995->1993 1996->1991 1999 47d04f-47d055 1996->1999 1999->1991 1999->1995 2006 47d0df-47d0e4 call 453344 2003->2006 2007 47d0e9-47d106 call 403400 * 2 2003->2007 2004->2003 2006->2007
                                                    APIs
                                                    • GetProcAddress.KERNEL32(74650000,SHGetFolderPathA), ref: 0047D0CE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc
                                                    • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$TzI$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                    • API String ID: 190572456-1519160592
                                                    • Opcode ID: 1fd838a5c8d0f0c60bfc011ee29d113a57fcb6d281f52a9ce02b093d15eba0c1
                                                    • Instruction ID: 8dc5c02c4c59231172697892f32b76fcc86af9606396bb7f924e00ef17ab3dc7
                                                    • Opcode Fuzzy Hash: 1fd838a5c8d0f0c60bfc011ee29d113a57fcb6d281f52a9ce02b093d15eba0c1
                                                    • Instruction Fuzzy Hash: A7311930E101499BCB00EF95D9829EEB7B5EF45318FA08477E808A7241D738AE05CB6D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2126 40631c-406336 GetModuleHandleA GetProcAddress 2127 406338 2126->2127 2128 40633f-40634c GetProcAddress 2126->2128 2127->2128 2129 406355-406362 GetProcAddress 2128->2129 2130 40634e 2128->2130 2131 406364-406366 SetProcessDEPPolicy 2129->2131 2132 406368-406369 2129->2132 2130->2129 2131->2132
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498D14), ref: 00406322
                                                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                                                    • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                                                    • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                                                    • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498D14), ref: 00406366
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModulePolicyProcess
                                                    • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                    • API String ID: 3256987805-3653653586
                                                    • Opcode ID: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
                                                    • Instruction ID: 935c6a5f7b98c90e27654dc67135d8c1f882d2ad5d8c1b9d0efaf55941893a49
                                                    • Opcode Fuzzy Hash: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
                                                    • Instruction Fuzzy Hash: 97E02D90380702ACEA1032B20D82F3B144C9B54B69B26543B7D56B51C7D9BDDD7059BD
                                                    APIs
                                                    • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
                                                    • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
                                                    • GetWindowLongA.USER32(?,000000F4), ref: 00413681
                                                    • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: LongWindow$Prop
                                                    • String ID: 3A$yA
                                                    • API String ID: 3887896539-3278460822
                                                    • Opcode ID: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
                                                    • Instruction ID: bcb4e109f9bb3244d1d15a250a8b19338fc20a7c4ef9bfc7c396c8b3ff51cb63
                                                    • Opcode Fuzzy Hash: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
                                                    • Instruction Fuzzy Hash: 8C22D06508E3C05FE31B9B74896A5D57FA0EE13325B1D45DFC4C28B1A3D21E8A8BC71A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2898 467180-46722a call 41461c call 41463c call 41461c call 41463c SHGetFileInfo 2907 46725f-46726a call 478f58 2898->2907 2908 46722c-467233 2898->2908 2913 46726c-4672b1 call 42c3fc call 40357c call 403738 ExtractIconA call 4670c0 2907->2913 2914 4672bb-4672ce call 47d490 2907->2914 2908->2907 2910 467235-46725a ExtractIconA call 4670c0 2908->2910 2910->2907 2936 4672b6 2913->2936 2920 4672d0-4672da call 47d490 2914->2920 2921 4672df-4672e3 2914->2921 2920->2921 2922 4672e5-467308 call 403738 SHGetFileInfo 2921->2922 2923 46733d-467371 call 403400 * 2 2921->2923 2922->2923 2932 46730a-467311 2922->2932 2932->2923 2935 467313-467338 ExtractIconA call 4670c0 2932->2935 2935->2923 2936->2923
                                                    APIs
                                                    • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
                                                    • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
                                                      • Part of subcall function 004670C0: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00467158
                                                      • Part of subcall function 004670C0: DestroyCursor.USER32(00000000), ref: 0046716E
                                                    • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
                                                    • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00467301
                                                    • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467327
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                    • String ID: 7'H$c:\directory$shell32.dll
                                                    • API String ID: 3376378930-4026409842
                                                    • Opcode ID: 34e897cfbc9d6d8d1eaa2c31df2d5736500c04f4812761ebb7c094cfbafe8545
                                                    • Instruction ID: 0b8afd69f163d8b9d9d889d7e9eb9a811d721945cce2190482b1e157f12369e0
                                                    • Opcode Fuzzy Hash: 34e897cfbc9d6d8d1eaa2c31df2d5736500c04f4812761ebb7c094cfbafe8545
                                                    • Instruction Fuzzy Hash: 5E516070604244AFD710DF65CD8AFDFB7A8EB48308F1081A6F80897351D678AE81DA59

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2940 42f560-42f56a 2941 42f574-42f5b1 call 402b30 GetActiveWindow GetFocus call 41eea4 2940->2941 2942 42f56c-42f56f call 402d30 2940->2942 2948 42f5c3-42f5cb 2941->2948 2949 42f5b3-42f5bd RegisterClassA 2941->2949 2942->2941 2950 42f652-42f66e SetFocus call 403400 2948->2950 2951 42f5d1-42f602 CreateWindowExA 2948->2951 2949->2948 2951->2950 2953 42f604-42f648 call 42427c call 403738 CreateWindowExA 2951->2953 2953->2950 2959 42f64a-42f64d ShowWindow 2953->2959 2959->2950
                                                    APIs
                                                    • GetActiveWindow.USER32 ref: 0042F58F
                                                    • GetFocus.USER32 ref: 0042F597
                                                    • RegisterClassA.USER32(004997AC), ref: 0042F5B8
                                                    • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F68C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F5F6
                                                    • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F63C
                                                    • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F64D
                                                    • SetFocus.USER32(00000000,00000000,0042F66F,?,?,?,00000001,00000000,?,00458352,00000000,0049B628), ref: 0042F654
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                    • String ID: TWindowDisabler-Window
                                                    • API String ID: 3167913817-1824977358
                                                    • Opcode ID: 9ae50f672aeae7fdf0d93ca70b7cb6a5bc87d97a2cc6f7de0887f324f563fc93
                                                    • Instruction ID: c3989f54cd535b42bfd745bd8d6279a550c1ea008e6f4be51b2d228796931bcd
                                                    • Opcode Fuzzy Hash: 9ae50f672aeae7fdf0d93ca70b7cb6a5bc87d97a2cc6f7de0887f324f563fc93
                                                    • Instruction Fuzzy Hash: B021A170740710BAE310EF66AD43F1A76B8EB04B44F91853BF604AB2E1D7B86D0586AD
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498D5A), ref: 00453210
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498D5A), ref: 0045322A
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                    • API String ID: 1646373207-2130885113
                                                    • Opcode ID: 4f92f4c9f6f27f3a3f76e00b922ed5d1cb650651a04457bf672543b1dcc52eac
                                                    • Instruction ID: a781b9bdaab79611976bfea65fa4e072d6e85bd62b4b6e26dfe65079d72397a7
                                                    • Opcode Fuzzy Hash: 4f92f4c9f6f27f3a3f76e00b922ed5d1cb650651a04457bf672543b1dcc52eac
                                                    • Instruction Fuzzy Hash: EA01D470240B00FED301AF63AD12F663A58D7557ABF6044BBFC14965C2C77C4A088E6D
                                                    APIs
                                                    • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430948
                                                    • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430957
                                                    • GetCurrentThreadId.KERNEL32 ref: 00430971
                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00430992
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                    • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                    • API String ID: 4130936913-2943970505
                                                    • Opcode ID: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
                                                    • Instruction ID: 0bd92e6c8c1c5a5b8444157758b44b4e11dae02c37acc47d2edddbd1fb793b69
                                                    • Opcode Fuzzy Hash: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
                                                    • Instruction Fuzzy Hash: 22F012B0458340DEE300EB65994271E7BD0EF58718F50467FF498A6392D7795904CB5F
                                                    APIs
                                                    • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C,00000000), ref: 004551BA
                                                    • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C), ref: 004551C7
                                                      • Part of subcall function 00454F7C: WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
                                                      • Part of subcall function 00454F7C: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
                                                      • Part of subcall function 00454F7C: GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
                                                      • Part of subcall function 00454F7C: CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                    • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                    • API String ID: 854858120-615399546
                                                    • Opcode ID: 65da3d818069a88fcda17d540e81f58463ddc1a9988927e619ea8caa526f1c94
                                                    • Instruction ID: 058baa7e90e176347c833b132b7c272bf8058e823d6e061bdbf2f6311869cd9e
                                                    • Opcode Fuzzy Hash: 65da3d818069a88fcda17d540e81f58463ddc1a9988927e619ea8caa526f1c94
                                                    • Instruction Fuzzy Hash: 41516D34B0074DABCF10EFA5D852BDEBBB9AF44305F50447BB804B7292D7789A098B59
                                                    APIs
                                                    • LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
                                                    • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
                                                    • OemToCharA.USER32(?,?), ref: 0042375C
                                                    • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Char$FileIconLoadLowerModuleName
                                                    • String ID: 2$MAINICON
                                                    • API String ID: 3935243913-3181700818
                                                    • Opcode ID: a0d1a492a3e1df344d79b5ede7937f80cf878dadafa44837ceada302c6d607ca
                                                    • Instruction ID: 339a64ebbf2375270c19ef2cfa2d714624ee8dcb7e06b01b5ae6522dc3b50067
                                                    • Opcode Fuzzy Hash: a0d1a492a3e1df344d79b5ede7937f80cf878dadafa44837ceada302c6d607ca
                                                    • Instruction Fuzzy Hash: 243181B0A042549ADF10EF29D8C57C67BA8AF14308F4441BAE844DB393D7BED988CB59
                                                    APIs
                                                    • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F3D
                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F5E
                                                    • GetCurrentThreadId.KERNEL32 ref: 00418F79
                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F9A
                                                      • Part of subcall function 004230C8: GetDC.USER32(00000000), ref: 0042311E
                                                      • Part of subcall function 004230C8: EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
                                                      • Part of subcall function 004230C8: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
                                                      • Part of subcall function 004230C8: ReleaseDC.USER32(00000000,00000000), ref: 00423144
                                                      • Part of subcall function 0042368C: LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
                                                      • Part of subcall function 0042368C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
                                                      • Part of subcall function 0042368C: OemToCharA.USER32(?,?), ref: 0042375C
                                                      • Part of subcall function 0042368C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
                                                      • Part of subcall function 0041F118: GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
                                                      • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
                                                      • Part of subcall function 0041F118: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
                                                      • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
                                                    • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                    • API String ID: 316262546-2767913252
                                                    • Opcode ID: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
                                                    • Instruction ID: d883a59e21ed3b4d0722d018b4a025de81f9e45e1fd093e44b5ebaba0e30331f
                                                    • Opcode Fuzzy Hash: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
                                                    • Instruction Fuzzy Hash: AC115E706142419AD740FF76A94235A7BE1DF64308F40943FF448A7391DB3DA9448B5F
                                                    APIs
                                                    • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
                                                    • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
                                                    • GetWindowLongA.USER32(?,000000F4), ref: 00413681
                                                    • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: LongWindow$Prop
                                                    • String ID:
                                                    • API String ID: 3887896539-0
                                                    • Opcode ID: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
                                                    • Instruction ID: 06abc153636d574f2b9d5b42ed2ef1d3d1989bf2b09c04f5b7aa0ee96fd2bcf7
                                                    • Opcode Fuzzy Hash: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
                                                    • Instruction Fuzzy Hash: 1011C975100244BFEF00DF9DDC84EDA37E8EB19364F144666B958DB2A2D738DD908B68
                                                    APIs
                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045586F,?,00000000,004558AF), ref: 004557B5
                                                    Strings
                                                    • WININIT.INI, xrefs: 004557E4
                                                    • PendingFileRenameOperations, xrefs: 00455754
                                                    • PendingFileRenameOperations2, xrefs: 00455784
                                                    • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455738
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                    • API String ID: 47109696-2199428270
                                                    • Opcode ID: 07f23c5f10a1777d8adb94cf70f77fe4357eef37dad5df2571c0597457338bde
                                                    • Instruction ID: 0fa1da25f67206326559771d92c7e47b52ca8d856d575cc5f046ac455f5bab2a
                                                    • Opcode Fuzzy Hash: 07f23c5f10a1777d8adb94cf70f77fe4357eef37dad5df2571c0597457338bde
                                                    • Instruction Fuzzy Hash: FF51A974E006089FDB10EF61DC51AEEB7B9EF44305F50857BEC04A7292DB78AE49CA58
                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047CE3E,?,?,00000000,0049B628,00000000,00000000,?,0049868D,00000000,00498836,?,00000000), ref: 0047CD7B
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,0047CE3E,?,?,00000000,0049B628,00000000,00000000,?,0049868D,00000000,00498836,?,00000000), ref: 0047CD84
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                                                    • API String ID: 1375471231-2952887711
                                                    • Opcode ID: d538ba2c3039bdb73ec4ac39b791302eb37db7338bb5f4deaad37bf1b457093d
                                                    • Instruction ID: ba11e132f7a22b1083de8cbc7a6ad8360160fe80fd77cc9a2081c3b92c19bc15
                                                    • Opcode Fuzzy Hash: d538ba2c3039bdb73ec4ac39b791302eb37db7338bb5f4deaad37bf1b457093d
                                                    • Instruction Fuzzy Hash: 0D41F774A001099BDB01EFA5D881ADEB7B9EF45309F50843BE81577392DB38AE05CF68
                                                    APIs
                                                    • 74D41520.VERSION(00000000,?,?,?,TzI), ref: 00452530
                                                    • 74D41500.VERSION(00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,TzI), ref: 0045255D
                                                    • 74D41540.VERSION(?,004525D4,?,?,00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,TzI), ref: 00452577
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: D41500D41520D41540
                                                    • String ID: TzI$%E
                                                    • API String ID: 2153611984-1977612415
                                                    • Opcode ID: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
                                                    • Instruction ID: f5dca5bfdad9659449235e2d7a4f424f1fde127461be4d93bb02e754cc996b3f
                                                    • Opcode Fuzzy Hash: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
                                                    • Instruction Fuzzy Hash: D2218331A00608BFDB01DAA989519AFB7FCEB4A300F554477F800E7242E6B9AE04C765
                                                    APIs
                                                    • EnumWindows.USER32(00423A1C), ref: 00423AA8
                                                    • GetWindow.USER32(?,00000003), ref: 00423ABD
                                                    • GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
                                                    • SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$EnumLongWindows
                                                    • String ID: \AB
                                                    • API String ID: 4191631535-3948367934
                                                    • Opcode ID: a6b95732ad36c4ed598cf8ad5f6fc2ce1ec39a79a418c32ffec9d409914f2416
                                                    • Instruction ID: 3ad81c14f5822e14e615a382c86082b2427cd388a5bf15486a3129e996868218
                                                    • Opcode Fuzzy Hash: a6b95732ad36c4ed598cf8ad5f6fc2ce1ec39a79a418c32ffec9d409914f2416
                                                    • Instruction Fuzzy Hash: D6115E70700610ABDB109F28E885F5677E8EB08715F10026AF994AB2E3C378ED41CB59
                                                    APIs
                                                    • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE50
                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFEB,00000000,0042E003,?,?,?,?,00000006,?,00000000,004979B1), ref: 0042DE6B
                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE71
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressDeleteHandleModuleProc
                                                    • String ID: RegDeleteKeyExA$advapi32.dll
                                                    • API String ID: 588496660-1846899949
                                                    • Opcode ID: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
                                                    • Instruction ID: e7246de0df94fba710dd2820c0ca51643d5dd29c3ac0bea476bad59fd0e01b91
                                                    • Opcode Fuzzy Hash: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
                                                    • Instruction Fuzzy Hash: 73E06DF1B41B30AAD72022657C8ABA33729DB75365F658437F105AD19183FC2C50CE9D
                                                    Strings
                                                    • PrepareToInstall failed: %s, xrefs: 0046BEC6
                                                    • NextButtonClick, xrefs: 0046BCA4
                                                    • Need to restart Windows? %s, xrefs: 0046BEED
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                    • API String ID: 0-2329492092
                                                    • Opcode ID: cec394d975fdaf2aee331579bf55cbea07fd447a64a53f75d63bb7014959e4c3
                                                    • Instruction ID: fbba2809a5460a7fd71097577f893fe4d6ee66660c8782d6f0f4b0379b44b166
                                                    • Opcode Fuzzy Hash: cec394d975fdaf2aee331579bf55cbea07fd447a64a53f75d63bb7014959e4c3
                                                    • Instruction Fuzzy Hash: DED12034A04108DFCB01EF99D985AEE77F5EF49304F5444BAE404AB352E778AE41CB9A
                                                    APIs
                                                    • SetActiveWindow.USER32(?,?,00000000,00483529), ref: 004832FC
                                                    • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 0048339A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ActiveChangeNotifyWindow
                                                    • String ID: $Need to restart Windows? %s
                                                    • API String ID: 1160245247-4200181552
                                                    • Opcode ID: 3e14b90cf77258232b3bc6bc3a04d9e10f68e6a0881c96ff5f1ee50cac7fd4ea
                                                    • Instruction ID: 92842bbd307381aaa16d6cba9b9fa796c36226c839d179a1896a4d9cb2d435b6
                                                    • Opcode Fuzzy Hash: 3e14b90cf77258232b3bc6bc3a04d9e10f68e6a0881c96ff5f1ee50cac7fd4ea
                                                    • Instruction Fuzzy Hash: 6191A1346002449FDB11FF69D885B9D77E4AF45708F5084BBE8009B362DB78AE05CB5E
                                                    APIs
                                                      • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                    • GetLastError.KERNEL32(00000000,0046FE29,?,?,0049C1E0,00000000), ref: 0046FD06
                                                    • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FD80
                                                    • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FDA5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ChangeNotify$ErrorFullLastNamePath
                                                    • String ID: Creating directory: %s
                                                    • API String ID: 2451617938-483064649
                                                    • Opcode ID: 7ff65050c96da74eae7d5982d64e5de5eb591d7ea390f163716231f3c76be30b
                                                    • Instruction ID: a2ec2d5d6bca6b198f0ada81e931439429e38c77c5705a19141df8aa82e52df2
                                                    • Opcode Fuzzy Hash: 7ff65050c96da74eae7d5982d64e5de5eb591d7ea390f163716231f3c76be30b
                                                    • Instruction Fuzzy Hash: FF514474E00248ABDB01DFA5D982BDEBBF5AF49304F50857AE841B7382D7785E08CB59
                                                    APIs
                                                    • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E82
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F48), ref: 00454EEC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressByteCharMultiProcWide
                                                    • String ID: SfcIsFileProtected$sfc.dll
                                                    • API String ID: 2508298434-591603554
                                                    • Opcode ID: ed3065bf52c30a4d03bda7ac99d5f8835c2ab724dd4793bfe352a7c8e95c6105
                                                    • Instruction ID: 709c5f55a6f5f8285c9c61fd8393730e8027effee09c5548c71846991cac34f0
                                                    • Opcode Fuzzy Hash: ed3065bf52c30a4d03bda7ac99d5f8835c2ab724dd4793bfe352a7c8e95c6105
                                                    • Instruction Fuzzy Hash: E8419671A04318DBEB20EF59DC85B9DB7B8AB4430DF5041B7A908A7293D7785F88CA1C
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0044B401
                                                    • SelectObject.GDI32(?,00000000), ref: 0044B424
                                                    • ReleaseDC.USER32(00000000,?), ref: 0044B457
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ObjectReleaseSelect
                                                    • String ID: 7'H
                                                    • API String ID: 1831053106-2091340224
                                                    • Opcode ID: 487d3c328bf9daab4408d2fb3c28955f20af11772ddb9247b3fc17e25dcd1d52
                                                    • Instruction ID: 242bcfed98594cbdcf51f2854abe94a1ec69c13560e3a72339b9f4254961cc58
                                                    • Opcode Fuzzy Hash: 487d3c328bf9daab4408d2fb3c28955f20af11772ddb9247b3fc17e25dcd1d52
                                                    • Instruction Fuzzy Hash: 62216570A04248AFEB15DFA6C841B9F7BB9DB49304F11806AF904A7682D778D940CB59
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B14C,?,7'H,?,?), ref: 0044B11E
                                                    • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B131
                                                    • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B165
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: DrawText$ByteCharMultiWide
                                                    • String ID: 7'H
                                                    • API String ID: 65125430-2091340224
                                                    • Opcode ID: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
                                                    • Instruction ID: fec6fabf6d030a51aab30bc406273ff78954f96defe81b00f374268ef7e1f253
                                                    • Opcode Fuzzy Hash: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
                                                    • Instruction Fuzzy Hash: 2A11CBB27046047FEB00DB6A9C91D6F77ECDB49750F10817BF504D72D0D6399E018669
                                                    APIs
                                                    • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
                                                      • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                      • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                      • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                    • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                    • String ID: SHAutoComplete$shlwapi.dll
                                                    • API String ID: 395431579-1506664499
                                                    • Opcode ID: 83276469c0ebec70e551d16da0c88d397ebf3ed8c5bc0ddd4294dd331ce0628a
                                                    • Instruction ID: e807f919b0f5f47641bb36d66eaae5ab4e0d2818c3cb02d7dc2bc8906116ae4e
                                                    • Opcode Fuzzy Hash: 83276469c0ebec70e551d16da0c88d397ebf3ed8c5bc0ddd4294dd331ce0628a
                                                    • Instruction Fuzzy Hash: 3311A330B00319BBD711EB62FD85B8E7BA8DB55704F90447BF40066291DBB8AE05C65D
                                                    APIs
                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    • RegCloseKey.ADVAPI32(?,00455A7B,?,00000001,00000000), ref: 00455A6E
                                                    Strings
                                                    • PendingFileRenameOperations2, xrefs: 00455A4F
                                                    • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A1C
                                                    • PendingFileRenameOperations, xrefs: 00455A40
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                    • API String ID: 47109696-2115312317
                                                    • Opcode ID: b9bc30b321d5ea972d04e739933cf1a4410063a59a252987ccafdd7077dee70d
                                                    • Instruction ID: e9356c19d9a7d2c1b22529064790e486fb2be540b5bf165494b3782c633fa2c0
                                                    • Opcode Fuzzy Hash: b9bc30b321d5ea972d04e739933cf1a4410063a59a252987ccafdd7077dee70d
                                                    • Instruction Fuzzy Hash: A3F0F671304A08BFDB04D661DC62A3B739CE744725FB08167F800CB682EA7CBD04915C
                                                    APIs
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00472479,?,00000000,?,0049C1E0,00000000,00472669,?,00000000,?,00000000,?,00472835), ref: 00472455
                                                    • FindClose.KERNEL32(000000FF,00472480,00472479,?,00000000,?,0049C1E0,00000000,00472669,?,00000000,?,00000000,?,00472835,?), ref: 00472473
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0047259B,?,00000000,?,0049C1E0,00000000,00472669,?,00000000,?,00000000,?,00472835), ref: 00472577
                                                    • FindClose.KERNEL32(000000FF,004725A2,0047259B,?,00000000,?,0049C1E0,00000000,00472669,?,00000000,?,00000000,?,00472835,?), ref: 00472595
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Find$CloseFileNext
                                                    • String ID:
                                                    • API String ID: 2066263336-0
                                                    • Opcode ID: d42b92e2e371597014fc9176261d33cd25b6888f3ae98faeb871729603b0318c
                                                    • Instruction ID: eb1c0c8886eca7f1ffe1f26b35c3cbd1f6627144faaa20e59740d12f8e8e3a3d
                                                    • Opcode Fuzzy Hash: d42b92e2e371597014fc9176261d33cd25b6888f3ae98faeb871729603b0318c
                                                    • Instruction Fuzzy Hash: 59C13D3490425DAFCF11DFA5C981ADEBBB9FF48304F5081AAE848B3291D7789A46CF54
                                                    APIs
                                                    • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,00480045,?,00000000,00000000,?,?,0048129B,?,?,00000000), ref: 0047FEF2
                                                    • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,00480045,?,00000000,00000000,?,?,0048129B,?,?), ref: 0047FEFF
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00480018,?,?,?,?,00000000,00480045,?,00000000,00000000,?,?,0048129B), ref: 0047FFF4
                                                    • FindClose.KERNEL32(000000FF,0048001F,00480018,?,?,?,?,00000000,00480045,?,00000000,00000000,?,?,0048129B,?), ref: 00480012
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Find$CloseFileNext
                                                    • String ID:
                                                    • API String ID: 2066263336-0
                                                    • Opcode ID: 10871b9626d13ca5387960458781b90e7f9b5a09777a555f3771ff302c9b2176
                                                    • Instruction ID: ac2e2540d44b616bb1cc33a8e973d6b4270a6d57f7847fbf1b53735ed5558067
                                                    • Opcode Fuzzy Hash: 10871b9626d13ca5387960458781b90e7f9b5a09777a555f3771ff302c9b2176
                                                    • Instruction Fuzzy Hash: D6516C31A006489FCB60EF65CC45ADEB7B8EB49319F1084BAA418E7351DB389F89CF54
                                                    APIs
                                                    • GetMenu.USER32(00000000), ref: 00421361
                                                    • SetMenu.USER32(00000000,00000000), ref: 0042137E
                                                    • SetMenu.USER32(00000000,00000000), ref: 004213B3
                                                    • SetMenu.USER32(00000000,00000000), ref: 004213CF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Menu
                                                    • String ID:
                                                    • API String ID: 3711407533-0
                                                    • Opcode ID: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
                                                    • Instruction ID: 68e231870b0c3442489bede8fdcf2aa1db34e154331db007d9f14f65c1163b63
                                                    • Opcode Fuzzy Hash: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
                                                    • Instruction Fuzzy Hash: 4641AE3070425447EB20EA3AA9857AB36925B20308F4841BFFC40DF7A3CA7CDD45839D
                                                    APIs
                                                    • SendMessageA.USER32(?,?,?,?), ref: 00416B84
                                                    • SetTextColor.GDI32(?,00000000), ref: 00416B9E
                                                    • SetBkColor.GDI32(?,00000000), ref: 00416BB8
                                                    • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BE0
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Color$CallMessageProcSendTextWindow
                                                    • String ID:
                                                    • API String ID: 601730667-0
                                                    • Opcode ID: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                    • Instruction ID: 4ea48ea5c9b96bae81565ca4ce64eb356f32bd46963e120bc97d04dec40f2685
                                                    • Opcode Fuzzy Hash: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                    • Instruction Fuzzy Hash: BC115171705604AFD710EE6ECC84E8777ECEF49310715887EB959CB612C638F8418B69
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0042311E
                                                    • EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00423144
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CapsDeviceEnumFontsRelease
                                                    • String ID:
                                                    • API String ID: 2698912916-0
                                                    • Opcode ID: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
                                                    • Instruction ID: a9d24610abdaa6694e735d00c6d38f20457f2ac5f1468c421a1b182fb2ef8db9
                                                    • Opcode Fuzzy Hash: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
                                                    • Instruction Fuzzy Hash: 8D01CC716042102AE700BF6A5C82B9B3AA49F01319F40027BF808AA3C6DA7E980547AE
                                                    APIs
                                                    • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02239F08,00001C1C,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                    • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02239F08,00001C1C,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                    • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02239F08,00001C1C,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                    • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02239F08,00001C1C,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                    • String ID:
                                                    • API String ID: 730355536-0
                                                    • Opcode ID: 46a689739c098c0829933ff4921327776432a14e69d4c62b65241a59cfc7f4a2
                                                    • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                                                    • Opcode Fuzzy Hash: 46a689739c098c0829933ff4921327776432a14e69d4c62b65241a59cfc7f4a2
                                                    • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                                                    APIs
                                                    • GlobalHandle.KERNEL32 ref: 0040626F
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00406276
                                                    • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040627B
                                                    • GlobalLock.KERNEL32(00000000), ref: 00406281
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocHandleLockUnlock
                                                    • String ID:
                                                    • API String ID: 2167344118-0
                                                    • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                    • Instruction ID: 5df08fd8dc2b017785a639aa93036e57be915985ffe03f20f856cac12e18577c
                                                    • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                    • Instruction Fuzzy Hash: 0BB009C4810A01BEEC0473B24C0BE3F245CD88172C3904A6F3448BA183987C9C405A3A
                                                    APIs
                                                      • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                    • FlushFileBuffers.KERNEL32(?), ref: 0045C499
                                                    Strings
                                                    • NumRecs range exceeded, xrefs: 0045C396
                                                    • EndOffset range exceeded, xrefs: 0045C3CD
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: File$BuffersFlush
                                                    • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                    • API String ID: 3593489403-659731555
                                                    • Opcode ID: 98591a619d7ee0d7439f396e87f7c1d5401f80e1c636742f2232de9d7c590d3d
                                                    • Instruction ID: 69b4fe9c868b7cadc716880164946defc5db249b4b2908964217ac1dcc813941
                                                    • Opcode Fuzzy Hash: 98591a619d7ee0d7439f396e87f7c1d5401f80e1c636742f2232de9d7c590d3d
                                                    • Instruction Fuzzy Hash: 4F617334A002588FDB25DF25C891AD9B7B5AF49305F0084DAED88AB353D674AEC8CF54
                                                    APIs
                                                      • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498D0A), ref: 0040334B
                                                      • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498D0A), ref: 00403356
                                                      • Part of subcall function 0040631C: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498D14), ref: 00406322
                                                      • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                                                      • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                                                      • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                                                      • Part of subcall function 0040631C: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498D14), ref: 00406366
                                                      • Part of subcall function 004063C4: 6F571CD0.COMCTL32(00498D19), ref: 004063C4
                                                      • Part of subcall function 00410764: GetCurrentThreadId.KERNEL32 ref: 004107B2
                                                      • Part of subcall function 00419040: GetVersion.KERNEL32(00498D32), ref: 00419040
                                                      • Part of subcall function 0044F744: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498D46), ref: 0044F77F
                                                      • Part of subcall function 0044F744: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
                                                      • Part of subcall function 0044FC10: GetVersionExA.KERNEL32(0049B790,00498D4B), ref: 0044FC1F
                                                      • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498D5A), ref: 00453210
                                                      • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
                                                      • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498D5A), ref: 0045322A
                                                      • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
                                                      • Part of subcall function 004570B4: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
                                                      • Part of subcall function 004645F4: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498D6E), ref: 00464603
                                                      • Part of subcall function 004645F4: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
                                                      • Part of subcall function 0046CE48: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE5D
                                                      • Part of subcall function 00478D74: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498D78), ref: 00478D7A
                                                      • Part of subcall function 00478D74: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478D87
                                                      • Part of subcall function 00478D74: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478D97
                                                      • Part of subcall function 004840DC: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 004841CB
                                                      • Part of subcall function 00495D08: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00495D21
                                                    • SetErrorMode.KERNEL32(00000001,00000000,00498DC0), ref: 00498D92
                                                      • Part of subcall function 00498ABC: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498D9C,00000001,00000000,00498DC0), ref: 00498AC6
                                                      • Part of subcall function 00498ABC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498ACC
                                                      • Part of subcall function 004244D4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 004244F3
                                                      • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                    • ShowWindow.USER32(?,00000005,00000000,00498DC0), ref: 00498DF3
                                                      • Part of subcall function 0048271C: SetActiveWindow.USER32(?), ref: 004827CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF571FormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                    • String ID: Setup
                                                    • API String ID: 3527831634-3839654196
                                                    • Opcode ID: 6d2aa48d0117c001fc25c1922946b02541ad54c9e92066502987b31b47ea5c24
                                                    • Instruction ID: 318b3e5e85ef0be54a1a1da069a78cc2bc151e84a7b2911c39910b17bc3e1ed5
                                                    • Opcode Fuzzy Hash: 6d2aa48d0117c001fc25c1922946b02541ad54c9e92066502987b31b47ea5c24
                                                    • Instruction Fuzzy Hash: BB31DA712445009ED6017BBBFC23A2D3B94EF8A718B61443FF800D6593DE3D58508A7E
                                                    APIs
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DC3C
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DCAC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID: x>H
                                                    • API String ID: 3660427363-2623615525
                                                    • Opcode ID: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
                                                    • Instruction ID: 5bd1c55a509b6dee259ffcee94d68868fe84ce326e73fb4cf6662c4527ef549e
                                                    • Opcode Fuzzy Hash: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
                                                    • Instruction Fuzzy Hash: 9D414171E00529ABDB11DF95D881BAFB7B8EB04704F918466E810F7241D778AE00CBA5
                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A6A
                                                    • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A73
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID: .tmp
                                                    • API String ID: 1375471231-2986845003
                                                    • Opcode ID: c13a0321bafd95638ebcc9d7358687d1d9e4986dcb43e5f2f1a856607b01db90
                                                    • Instruction ID: 2c169793aa1d4e8b0ae54453200dd0eeecd34c8d921a2c5b894f13e1de3ec917
                                                    • Opcode Fuzzy Hash: c13a0321bafd95638ebcc9d7358687d1d9e4986dcb43e5f2f1a856607b01db90
                                                    • Instruction Fuzzy Hash: BD213575A002089BDB01EFA5C8429DEB7B8EF49305F50457BE801B7343DA3CAF058B69
                                                    APIs
                                                      • Part of subcall function 00483BD0: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483BE1
                                                      • Part of subcall function 00483BD0: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483BEE
                                                      • Part of subcall function 00483BD0: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483BFC
                                                      • Part of subcall function 00483BD0: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483C04
                                                      • Part of subcall function 00483BD0: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483C10
                                                      • Part of subcall function 00483BD0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483C31
                                                      • Part of subcall function 00483BD0: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483C44
                                                      • Part of subcall function 00483BD0: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483C4A
                                                      • Part of subcall function 00483EFC: GetVersionExA.KERNEL32(?,0048410E,00000000,004841E3,?,?,?,?,?,00498D7D), ref: 00483F0A
                                                      • Part of subcall function 00483EFC: GetVersionExA.KERNEL32(0000009C,?,0048410E,00000000,004841E3,?,?,?,?,?,00498D7D), ref: 00483F5C
                                                      • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                      • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                    • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 004841CB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModuleVersion$CurrentErrorInfoLibraryLoadModeNativeProcessSystem
                                                    • String ID: SHGetKnownFolderPath$shell32.dll
                                                    • API String ID: 3869789854-2936008475
                                                    • Opcode ID: 120743d62397d7dd8f565f65e933059d155473ad0266f649b894e8535e474c20
                                                    • Instruction ID: 8f141226009d12819f39ffdf3d8d8dfb3901e8aec82ab5bf6b1281045b99753f
                                                    • Opcode Fuzzy Hash: 120743d62397d7dd8f565f65e933059d155473ad0266f649b894e8535e474c20
                                                    • Instruction Fuzzy Hash: 2E21F4B06103515AC700BF6E599611A3BA5EBA470C3C0853BF804DB3D1D77E641557AE
                                                    APIs
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047CA80,00000000,0047CA96), ref: 0047C78E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID: RegisteredOrganization$RegisteredOwner
                                                    • API String ID: 3535843008-1113070880
                                                    • Opcode ID: ef0a55dbdd5111b28c91ef96b119f1f00a00055abc9f027fd3389a3e3d73c389
                                                    • Instruction ID: 9cb25581828c7dc4112ddabd514b1e440ba6ea72c9c862f9779223ba634b1a41
                                                    • Opcode Fuzzy Hash: ef0a55dbdd5111b28c91ef96b119f1f00a00055abc9f027fd3389a3e3d73c389
                                                    • Instruction Fuzzy Hash: 9CF0B434704104AFEB08D6A8DDD2BAB33A9D781304F60843FA1049B342CB799E019B5C
                                                    APIs
                                                    • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,bcG,?,0049C1E0,?,0046F2AB,?,00000000,0046F846,?,_is1), ref: 0046EFB7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID: Inno Setup: Setup Version$bcG
                                                    • API String ID: 3702945584-3795201806
                                                    • Opcode ID: 01fe3b2d5d6cbd09ffaaa45717ddb91502938b8e731c7b2786fa022487e36440
                                                    • Instruction ID: c391946ca8a1dfb9bd2a8f8d535a4e5f0653d7f158c17c03f22a663429f2d6a6
                                                    • Opcode Fuzzy Hash: 01fe3b2d5d6cbd09ffaaa45717ddb91502938b8e731c7b2786fa022487e36440
                                                    • Instruction Fuzzy Hash: 27E06D753012043FD710AA2B9C85F6BBADCDF98365F10403AB908DB392D578DD0182A9
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004755D7), ref: 004753C5
                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004755D7), ref: 004753DC
                                                      • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004984F9,00000000), ref: 0045349F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateErrorFileHandleLast
                                                    • String ID: CreateFile
                                                    • API String ID: 2528220319-823142352
                                                    • Opcode ID: 1a55a1e4c1fb49d9bc54d9a8d3d53753370932944cdaf0802b6a1dcfba90570a
                                                    • Instruction ID: 23bbe5cabe4c789aefdcb14511ce8337273e95aa1034df333e2216031f6918ef
                                                    • Opcode Fuzzy Hash: 1a55a1e4c1fb49d9bc54d9a8d3d53753370932944cdaf0802b6a1dcfba90570a
                                                    • Instruction Fuzzy Hash: 42E06D302407047BEA10EA69CCC6F4A77989B04768F10C152FA58AF3E2C5F9EC808618
                                                    APIs
                                                    • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID: 7=H$System\CurrentControlSet\Control\Windows
                                                    • API String ID: 71445658-1645423573
                                                    • Opcode ID: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
                                                    • Instruction ID: 60e43675bb36a9eef4a15598a1848ca3f705ecc445ee8c9fe52fc6b05f1352bb
                                                    • Opcode Fuzzy Hash: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
                                                    • Instruction Fuzzy Hash: 29D09E72950128BB9B009A89DC41DFB775DDB15760F45441BF9049B141C5B4AC5197E4
                                                    APIs
                                                      • Part of subcall function 00457044: CoInitialize.OLE32(00000000), ref: 0045704A
                                                      • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                      • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                    • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                    • String ID: SHCreateItemFromParsingName$shell32.dll
                                                    • API String ID: 2906209438-2320870614
                                                    • Opcode ID: 473d3a9bafce561ecf491a32b6dbba517f8cfc0a4c735404f8b45e5d580fac4e
                                                    • Instruction ID: 7fba65882f7194314ab185764ebfac318737a269d5660949bdaf7135ffc1064c
                                                    • Opcode Fuzzy Hash: 473d3a9bafce561ecf491a32b6dbba517f8cfc0a4c735404f8b45e5d580fac4e
                                                    • Instruction Fuzzy Hash: ECC08CA074860093CB40B3FA344320E1841AB8071FB10C07F7A04A66C7DE3C88088B2E
                                                    APIs
                                                      • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                      • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                    • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE5D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressErrorLibraryLoadModeProc
                                                    • String ID: SHPathPrepareForWriteA$shell32.dll
                                                    • API String ID: 2492108670-2683653824
                                                    • Opcode ID: 5f959238bf810490ef77b594ea6e22c2ad502a4a3f549b0f4d35f8d6b66128fa
                                                    • Instruction ID: 43d92021416e1b68685a59965f85dcd86356bf1ee9338f795bd6a3e27ba16cc9
                                                    • Opcode Fuzzy Hash: 5f959238bf810490ef77b594ea6e22c2ad502a4a3f549b0f4d35f8d6b66128fa
                                                    • Instruction Fuzzy Hash: 68B092A170170086CB50B7B698D262A28259781B19F60843B7488AB695EB3E88048B5F
                                                    APIs
                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448709), ref: 0044864C
                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004486CD
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID:
                                                    • API String ID: 2574300362-0
                                                    • Opcode ID: 6a9e94a6261787b515d0168f2a43a37c3b880b1d2338cb15d4c8216b47f8c1f6
                                                    • Instruction ID: 2eaa58f6359003fef9dee836e3db1fa56ae38c906bc4f4c4d93ca6671f7cd4fb
                                                    • Opcode Fuzzy Hash: 6a9e94a6261787b515d0168f2a43a37c3b880b1d2338cb15d4c8216b47f8c1f6
                                                    • Instruction Fuzzy Hash: 14515470E00105AFDB40EF95C491AAEBBF9EB45319F11817FE414BB391DA389E05CB99
                                                    APIs
                                                    • GetSystemMenu.USER32(00000000,00000000,00000000,00481F08), ref: 00481EA0
                                                    • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00481EB1
                                                    • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00481EC9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Menu$Append$System
                                                    • String ID:
                                                    • API String ID: 1489644407-0
                                                    • Opcode ID: e217fba4266f0993d7d0a0094466960b2dc688203817318a9ec5bc7fde81f065
                                                    • Instruction ID: 4586c9f402ca04f05dea15a590e2c5cb78c1f0882a9cca067d17480793b28e7a
                                                    • Opcode Fuzzy Hash: e217fba4266f0993d7d0a0094466960b2dc688203817318a9ec5bc7fde81f065
                                                    • Instruction Fuzzy Hash: 8C31A4307043445AD711FB799C82B6E3A989B15318F54583FF900972E3CB7C9D49879D
                                                    APIs
                                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424412
                                                    • TranslateMessage.USER32(?), ref: 0042448F
                                                    • DispatchMessageA.USER32(?), ref: 00424499
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Message$DispatchPeekTranslate
                                                    • String ID:
                                                    • API String ID: 4217535847-0
                                                    • Opcode ID: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                    • Instruction ID: 8eae6dca0d2455523dd27ca57e4683f6da326f6f2f90499d04ddbfd693f83f9d
                                                    • Opcode Fuzzy Hash: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                    • Instruction Fuzzy Hash: E3116D303043205AEB20FA24A941B9F73D4DFC5758F80481EFC99972C2D77D9D49879A
                                                    APIs
                                                    • SetPropA.USER32(00000000,00000000), ref: 0041666A
                                                    • SetPropA.USER32(00000000,00000000), ref: 0041667F
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166A6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Prop$Window
                                                    • String ID:
                                                    • API String ID: 3363284559-0
                                                    • Opcode ID: 2bfc4182cfb98504df538322f106c63385c341cbf25331a0d530951e70e975e0
                                                    • Instruction ID: 6913c5f2d07602d921388148e43cadd8ab2d6729f30613f48e4cae6714e3bc13
                                                    • Opcode Fuzzy Hash: 2bfc4182cfb98504df538322f106c63385c341cbf25331a0d530951e70e975e0
                                                    • Instruction Fuzzy Hash: ACF01271701210ABDB10AB599C85FA732DCAB09714F16057AB905EF286C778DC40C7A8
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 0041EE64
                                                    • IsWindowEnabled.USER32(?), ref: 0041EE6E
                                                    • EnableWindow.USER32(?,00000000), ref: 0041EE94
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$EnableEnabledVisible
                                                    • String ID:
                                                    • API String ID: 3234591441-0
                                                    • Opcode ID: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
                                                    • Instruction ID: 3b4cb379701a2ac24b7d0c87bf9454d2e26b3d0fb89a85d5a5a22e513a73856b
                                                    • Opcode Fuzzy Hash: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
                                                    • Instruction Fuzzy Hash: EAE06DB5100301AAE301AB2BDC81B5B7A9CAB54350F05843BA9089B292D63ADC408B7C
                                                    APIs
                                                    • SetActiveWindow.USER32(?), ref: 0046A049
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ActiveWindow
                                                    • String ID: PrepareToInstall
                                                    • API String ID: 2558294473-1101760603
                                                    • Opcode ID: bd0dcbe1c8258478baffa71df21744fc3a9b143a8d249b74e1da8b76978560ea
                                                    • Instruction ID: 8915bcbaa0d52b1afd1835bfec642bdf08a7ea5e9e60c9e550189f724141fab8
                                                    • Opcode Fuzzy Hash: bd0dcbe1c8258478baffa71df21744fc3a9b143a8d249b74e1da8b76978560ea
                                                    • Instruction Fuzzy Hash: CAA10A34A00105DFD700EFA9D986E9EB7F5AF48304F5540B6E404AB362D738AE45DF99
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: /:*?"<>|
                                                    • API String ID: 0-4078764451
                                                    • Opcode ID: 4c775d0ea5a845e0b4de9e304c4ca43b4cffb32271fbead08ed1ce1755dbde2c
                                                    • Instruction ID: 65bc80ad12a2aa4f3f6d441b7c53c95629e39c8c6e563b6d48aa8df0192a7f01
                                                    • Opcode Fuzzy Hash: 4c775d0ea5a845e0b4de9e304c4ca43b4cffb32271fbead08ed1ce1755dbde2c
                                                    • Instruction Fuzzy Hash: A871C530B40205ABDB10EBA5DDD2BEE77E19F41308F108077F540AB292E779AD458B5E
                                                    APIs
                                                    • SetActiveWindow.USER32(?), ref: 004827CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ActiveWindow
                                                    • String ID: InitializeWizard
                                                    • API String ID: 2558294473-2356795471
                                                    • Opcode ID: 83eb30a76955a2ec7f542fd3a9db00907a5635408034bf43da7c2e0550a20a0f
                                                    • Instruction ID: 6d8b2770f68c58fdc674587b2b9ef887fd6a608625072ab126c4d08664cf3e66
                                                    • Opcode Fuzzy Hash: 83eb30a76955a2ec7f542fd3a9db00907a5635408034bf43da7c2e0550a20a0f
                                                    • Instruction Fuzzy Hash: 3F11A330204240AFD700EB6AEED6B2A7BE4E758328F50047BF404C73A1EA796C45C75E
                                                    APIs
                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C894,00000000,0047CA96), ref: 0047C68D
                                                    Strings
                                                    • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C65D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: Software\Microsoft\Windows\CurrentVersion
                                                    • API String ID: 47109696-1019749484
                                                    • Opcode ID: 8d2e17762bf3f8fe1b82dfd6b6cc8fb9e50960fdf5ef388afb354b2c3f1fa3ab
                                                    • Instruction ID: 5ed55a2c420faf331f0a15b14921b19ee1e4d574cc0a1c906525e3cbcd805e1c
                                                    • Opcode Fuzzy Hash: 8d2e17762bf3f8fe1b82dfd6b6cc8fb9e50960fdf5ef388afb354b2c3f1fa3ab
                                                    • Instruction Fuzzy Hash: D0F0827170051467DA10A69A6DC2BAEA7DD8B94718F20503FF508DB242D9B99E0242AC
                                                    APIs
                                                    • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F682,?,?,00000000,0046F846,?,_is1,?), ref: 0046F017
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID: NoModify
                                                    • API String ID: 3702945584-1699962838
                                                    • Opcode ID: 888046907a30d434677c86598fbe01595b923495ae31536c65224a9459d5b981
                                                    • Instruction ID: 36b047244b8a46f46e2a66ab8a4e2d38b38e826dd2d039d91b27308d321ef38c
                                                    • Opcode Fuzzy Hash: 888046907a30d434677c86598fbe01595b923495ae31536c65224a9459d5b981
                                                    • Instruction Fuzzy Hash: 65E0DFB4200308BFEB04DB51CC0AF2B73ECDB08310F104019BA049B280E670EE00C668
                                                    APIs
                                                    • GetACP.KERNEL32(?,?,00000001,00000000,0047E8A7,?,-0000001A,0048075D,-00000010,?,00000004,0000001B,00000000,00480AAA,?,0045DB68), ref: 0047E63E
                                                      • Part of subcall function 0042E31C: GetDC.USER32(00000000), ref: 0042E32B
                                                      • Part of subcall function 0042E31C: EnumFontsA.GDI32(?,00000000,0042E308,00000000,00000000,0042E374,?,00000000,00000000,00480B11,?,?,00000001,00000000,00000002,00000000), ref: 0042E356
                                                      • Part of subcall function 0042E31C: ReleaseDC.USER32(00000000,?), ref: 0042E36E
                                                    • SendNotifyMessageA.USER32(00020428,00000496,00002711,-00000001), ref: 0047E80E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: EnumFontsMessageNotifyReleaseSend
                                                    • String ID:
                                                    • API String ID: 2649214853-0
                                                    • Opcode ID: 714c93e773a22a1a3526f904907efb4cbd7609580959c7eceb431b519664cc5d
                                                    • Instruction ID: cc85682d5dba2755b56ba2a8d54c5826bc190f55610e9ecd0554557d3073ca29
                                                    • Opcode Fuzzy Hash: 714c93e773a22a1a3526f904907efb4cbd7609580959c7eceb431b519664cc5d
                                                    • Instruction Fuzzy Hash: 7D5145746001108BC710FF67E98169B77E9EB58309B90C67BA8055B3A7CB3CED468B9D
                                                    APIs
                                                    • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,004021FC), ref: 004020CB
                                                      • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02239F08,00001C1C,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                      • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02239F08,00001C1C,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                      • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02239F08,00001C1C,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                      • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02239F08,00001C1C,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                    • String ID:
                                                    • API String ID: 296031713-0
                                                    • Opcode ID: ab3545b22e3440e815b1719652ff5d854977479bd1b850cbba673e5eb4522dee
                                                    • Instruction ID: 30adadd309813d1a6846ca6b4958dbaac508113c784b73a5bb8d11bfdb372a30
                                                    • Opcode Fuzzy Hash: ab3545b22e3440e815b1719652ff5d854977479bd1b850cbba673e5eb4522dee
                                                    • Instruction Fuzzy Hash: 3941E3B2E00304DFDB10CF69EE8521A77A4F7A8324B15417FD854A77E2D3789801DB88
                                                    APIs
                                                    • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DF6C
                                                    • RegCloseKey.ADVAPI32(?,0042DFDD,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DFD0
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseEnum
                                                    • String ID:
                                                    • API String ID: 2818636725-0
                                                    • Opcode ID: 5544c4b9bbec9bcd0b3571a2bc1c3e91d7920f18483733b44f41fdf125e35dfd
                                                    • Instruction ID: d62689c7b7995b9893119ef97773413105dd68debc8ff02f2d4f9d8a28cc91ff
                                                    • Opcode Fuzzy Hash: 5544c4b9bbec9bcd0b3571a2bc1c3e91d7920f18483733b44f41fdf125e35dfd
                                                    • Instruction Fuzzy Hash: DD31B270F04258AEDB11DFA6DD42BAEBBB9EB49304F91407BE501E6280D6785E01CA2D
                                                    APIs
                                                    • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 0045283C
                                                    • GetLastError.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 00452844
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateErrorLastProcess
                                                    • String ID:
                                                    • API String ID: 2919029540-0
                                                    • Opcode ID: 32d7980bd8ec2bee900e92c865b72ef71cfaa45d55aa0c85c0401d49ed696f28
                                                    • Instruction ID: fcc055d8c1a696a2a0db1e32a085008d871673fec5534948229a16d4440eefa6
                                                    • Opcode Fuzzy Hash: 32d7980bd8ec2bee900e92c865b72ef71cfaa45d55aa0c85c0401d49ed696f28
                                                    • Instruction Fuzzy Hash: A2113C72600208AF8B40DEA9DD41D9F77ECEB4E310B114567FD18D3241D678EE148B68
                                                    APIs
                                                    • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040ADF2
                                                    • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040AF4F,00000000,0040AF67,?,?,?,00000000), ref: 0040AE03
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindFree
                                                    • String ID:
                                                    • API String ID: 4097029671-0
                                                    • Opcode ID: a68fa58b17f1c81db0874c2ae071f5ac340239a3ac25d7cbfb0d1b1353a7ba86
                                                    • Instruction ID: 3d7a77417cef7b3885e8747e4544195f2de945da78ee84bb1155330bb8f828e3
                                                    • Opcode Fuzzy Hash: a68fa58b17f1c81db0874c2ae071f5ac340239a3ac25d7cbfb0d1b1353a7ba86
                                                    • Instruction Fuzzy Hash: 0301F771300700AFD700FF69EC52E1B77EDDB46714710807AF500AB3D1D639AC10966A
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                    • EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Thread$CurrentEnumWindows
                                                    • String ID:
                                                    • API String ID: 2396873506-0
                                                    • Opcode ID: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
                                                    • Instruction ID: bcaa23655132f8f2785c0a842f21b48ac99b37e3223c43442b01e3940dbd0cdf
                                                    • Opcode Fuzzy Hash: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
                                                    • Instruction Fuzzy Hash: 31015B76A04604BFD706CF6BEC1199ABBE8E789720B22887BEC04D3690E7355C10DF18
                                                    APIs
                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CC2
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00452CE8), ref: 00452CCA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastMove
                                                    • String ID:
                                                    • API String ID: 55378915-0
                                                    • Opcode ID: 92f277caa9c3c56662d1ce6f28aaa0531c95695199337b3952b9b7b9e7465d28
                                                    • Instruction ID: 1f9035ddd188b097fe3d15476f32cd7793c58c8f4df07880d9fc6ba60e4ff235
                                                    • Opcode Fuzzy Hash: 92f277caa9c3c56662d1ce6f28aaa0531c95695199337b3952b9b7b9e7465d28
                                                    • Instruction Fuzzy Hash: 9401D671A04208AB8712EB799D4149EB7ECEB8A32575045BBFC04E3243EA785E048558
                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527A9
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527B1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID:
                                                    • API String ID: 1375471231-0
                                                    • Opcode ID: 855e2e178366579e8cdbc9f044a0346376c594dce53ca60ac40061c8de66a150
                                                    • Instruction ID: e3b373b60118a844676bb749001e6832c3b26a50706decb61b3ae2e0e224b701
                                                    • Opcode Fuzzy Hash: 855e2e178366579e8cdbc9f044a0346376c594dce53ca60ac40061c8de66a150
                                                    • Instruction Fuzzy Hash: 40F02871A00308BBCB01EF759D4259EB7E8EB4E311B2045B7FC04E3642E6B94E04859C
                                                    APIs
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 00423249
                                                    • LoadCursorA.USER32(00000000,00000000), ref: 00423273
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CursorLoad
                                                    • String ID:
                                                    • API String ID: 3238433803-0
                                                    • Opcode ID: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
                                                    • Instruction ID: 5e34cf6406f075c2c63d733b1f02ef4b9a88184ee1572dc0f3c8875cc615d59b
                                                    • Opcode Fuzzy Hash: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
                                                    • Instruction Fuzzy Hash: 9EF0A711B04254AADA109E7E6CC0D6B72A8DF82735B61037BFA3EC72D1C62E1D414569
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                    • LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLibraryLoadMode
                                                    • String ID:
                                                    • API String ID: 2987862817-0
                                                    • Opcode ID: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
                                                    • Instruction ID: 14c2566281f292fbf4bc3f3871eddb8f7eb4f11f4d1149329263d7d1c8790498
                                                    • Opcode Fuzzy Hash: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
                                                    • Instruction Fuzzy Hash: 02F08970B147447FDB119F779CA241BBBECDB49B1175249B6F800A3591E53C4910C928
                                                    APIs
                                                    • SHGetKnownFolderPath.SHELL32(00499D40,00008000,00000000,?), ref: 0047C9EF
                                                    • CoTaskMemFree.OLE32(?,0047CA32), ref: 0047CA25
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FolderFreeKnownPathTask
                                                    • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                    • API String ID: 969438705-544719455
                                                    • Opcode ID: 6f62c5d526fa3e52070c971c4d90ca7efe6ec5503e4c2dd16381b90e1fafe213
                                                    • Instruction ID: 0fdb8721f79df2bee4e437b17213045c774cf20a9a88c38e08792e16eca79eb1
                                                    • Opcode Fuzzy Hash: 6f62c5d526fa3e52070c971c4d90ca7efe6ec5503e4c2dd16381b90e1fafe213
                                                    • Instruction Fuzzy Hash: DAE09230340704BFEB11DB61DDA2F6977A8EB88B00BA1847BF404E2681E67CAD00CA5C
                                                    APIs
                                                    • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,00470299,?,00000000), ref: 0045090E
                                                    • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,00470299,?,00000000), ref: 00450916
                                                      • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497F80,00000001,00000000,00000002,00000000,004980E1,?,?,00000005,00000000,00498115), ref: 004506B7
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$FilePointer
                                                    • String ID:
                                                    • API String ID: 1156039329-0
                                                    • Opcode ID: ec46a7bc9e5a7a34518fa7989fb6988307d7ef9dfce9dbcd61575ad1106d4b51
                                                    • Instruction ID: 32d43412562f4d6ab64aa8be608e77008e370c57458e4df53f7444e76f76d0cb
                                                    • Opcode Fuzzy Hash: ec46a7bc9e5a7a34518fa7989fb6988307d7ef9dfce9dbcd61575ad1106d4b51
                                                    • Instruction Fuzzy Hash: 0EE012E93042015BF700EA6599C1B2F22DCDB44315F00446ABD44CA28BE678CC048B29
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Virtual$AllocFree
                                                    • String ID:
                                                    • API String ID: 2087232378-0
                                                    • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                    • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                                                    • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                    • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                                                    APIs
                                                    • GetSystemDefaultLCID.KERNEL32(00000000,00408712), ref: 004085FB
                                                      • Part of subcall function 00406DEC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E09
                                                      • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: DefaultInfoLoadLocaleStringSystem
                                                    • String ID:
                                                    • API String ID: 1658689577-0
                                                    • Opcode ID: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
                                                    • Instruction ID: 9026c6f0acc6bf601755118861b832b1e3c4c92574a9a05948c89544872af2a3
                                                    • Opcode Fuzzy Hash: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
                                                    • Instruction Fuzzy Hash: 47314E35E00109ABCB00EB55CC819EEB779EF84314F558577E815BB286EB38AA018B98
                                                    APIs
                                                    • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC39
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: InfoScroll
                                                    • String ID:
                                                    • API String ID: 629608716-0
                                                    • Opcode ID: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                    • Instruction ID: 6365c2cd079840e4170b7c9ce409c3d873e807bce8729d2e10e5c00059922083
                                                    • Opcode Fuzzy Hash: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                    • Instruction Fuzzy Hash: D8214FB1608746AFC351DF3984407A6BBE4BB48344F14893EE498C3741E778E99ACBD6
                                                    APIs
                                                      • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                      • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                    • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C506,?,00000000,?,?,0046C718,?,00000000,0046C78C), ref: 0046C4EA
                                                      • Part of subcall function 0041EF58: IsWindow.USER32(?), ref: 0041EF66
                                                      • Part of subcall function 0041EF58: EnableWindow.USER32(?,00000001), ref: 0041EF75
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ThreadWindow$CurrentEnableEnumPathPrepareWindowsWrite
                                                    • String ID:
                                                    • API String ID: 3319771486-0
                                                    • Opcode ID: ca2b32cf36fd6d1bfb4db848016c2ffe178ba4032e1ec94fcd42fcf02c3c5d51
                                                    • Instruction ID: 2cbcebf7f6bf29dc36283f7fbbf9f5266ce5ce35ab0e612daed41d822df73df9
                                                    • Opcode Fuzzy Hash: ca2b32cf36fd6d1bfb4db848016c2ffe178ba4032e1ec94fcd42fcf02c3c5d51
                                                    • Instruction Fuzzy Hash: 8CF0B470344300BFEB159F62AC96B2576D8D744714FA1043BF409C6590E5796844891E
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                    • Instruction ID: 51b66c86ab1fb2ed9abdb0db83839a26410808368eb32e0cb4295e2ee82716ff
                                                    • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                    • Instruction Fuzzy Hash: 09F04970608109EBBB1CCF58D0618AF7BA0EB48300F2080AFE907C7BA0D634AA80D658
                                                    APIs
                                                    • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416585
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                    • Instruction ID: 158b8484bb218b41c698b3aa21f26e2dd86497bc01e640ef524e7c8f4c0ee3c6
                                                    • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                    • Instruction Fuzzy Hash: 4BF019B2200510AFDB84DE9CD9C0F9773ECEB0C210B0481A6FA08CB21AD220EC108BB0
                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149EF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                    • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                    • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                    • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450804
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
                                                    • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                                                    • Opcode Fuzzy Hash: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
                                                    • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD14,?,00000001,?,?,00000000,?,0042CD66,00000000,00452A25,00000000,00452A46,?,00000000), ref: 0042CCF7
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 2e3447488e8940f063bbcfc4a9008e9bc81ad59ac090e4e62a8f5aa92ecca264
                                                    • Instruction ID: d3c11148bbbe1678040d416a6bc301cfea82702c80b798926358c5e84281cc0e
                                                    • Opcode Fuzzy Hash: 2e3447488e8940f063bbcfc4a9008e9bc81ad59ac090e4e62a8f5aa92ecca264
                                                    • Instruction Fuzzy Hash: 80E065B1304304BFD701EB66EC92A5EBAACDB49754BA14876B50097592D5B86E008468
                                                    APIs
                                                    • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FormatMessage
                                                    • String ID:
                                                    • API String ID: 1306739567-0
                                                    • Opcode ID: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
                                                    • Instruction ID: fbc307da5c1359fbfbc351051067b699ae1438aedf6613c80dda169529e76e7e
                                                    • Opcode Fuzzy Hash: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
                                                    • Instruction Fuzzy Hash: BCE0206278431116F2353416AC47B77150E43C0708F944027BB90DF3D3D6AF9945D25E
                                                    APIs
                                                    • CreateWindowExA.USER32(00000000,0042367C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00406311
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                    • Instruction ID: 53e57476791a39574122dfc8a3f58f2f78c4a621b5a82e38d1c80b15216a1e52
                                                    • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                    • Instruction Fuzzy Hash: EEE0FEB2214209BBDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972428275AC608B71
                                                    APIs
                                                    • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
                                                    • Instruction ID: 68673b5cf84413dff1d7ecec16939cb2303f89f305828e6cd22260af4b89741b
                                                    • Opcode Fuzzy Hash: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
                                                    • Instruction Fuzzy Hash: EDE07EB2610119AF9B40DE8CDC81EEB37ADAB1D350F404016FA08E7200C2B4EC519BB4
                                                    APIs
                                                    • FindClose.KERNEL32(00000000,000000FF,00470ABC,00000000,004718D2,?,00000000,0047191D,?,00000000,00471A56,?,00000000,?,00000000), ref: 00454C0E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseFind
                                                    • String ID:
                                                    • API String ID: 1863332320-0
                                                    • Opcode ID: ac301419a6d0fb17fa373ecfd028f21bc1cd0f096799c322b405f417487ab63f
                                                    • Instruction ID: 5c2dbd3a099336849a47a332199978da45cb785deb8a29a76394180ab3bc5383
                                                    • Opcode Fuzzy Hash: ac301419a6d0fb17fa373ecfd028f21bc1cd0f096799c322b405f417487ab63f
                                                    • Instruction Fuzzy Hash: A1E09BB09097004BC715DF39858031A76D19FC9325F05C96AEC99CF3D7E77D84454617
                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(00495B3A,?,00495B5C,?,?,00000000,00495B3A,?,?), ref: 0041469B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                    • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                    • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                    • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                    APIs
                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F24
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
                                                    • Instruction ID: adeaf4ebd0e6cd94d64be6b3cb299443ba394f13a0b1cd3d8337db6b6af80796
                                                    • Opcode Fuzzy Hash: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
                                                    • Instruction Fuzzy Hash: 53D012722091506AD220965A6C44EAB6BDCCBC5770F11063AB558C2181D7209C01C675
                                                    APIs
                                                      • Part of subcall function 004235F8: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042360D
                                                    • ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                      • Part of subcall function 00423628: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423644
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: InfoParametersSystem$ShowWindow
                                                    • String ID:
                                                    • API String ID: 3202724764-0
                                                    • Opcode ID: f9d193e52d5126cfe9efbfa9bcf6916ba2bc4f4c3adaedc7bbb0d1d6de804fe9
                                                    • Instruction ID: 3e39ddd90fb628193caaea160b6f4ed5bf244f394cc2da11a07db6b12dca8b82
                                                    • Opcode Fuzzy Hash: f9d193e52d5126cfe9efbfa9bcf6916ba2bc4f4c3adaedc7bbb0d1d6de804fe9
                                                    • Instruction Fuzzy Hash: 34D05E123821703142307ABB280699B46EC8D822EB389043BB5449B312ED5DCE01116C
                                                    APIs
                                                    • SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: TextWindow
                                                    • String ID:
                                                    • API String ID: 530164218-0
                                                    • Opcode ID: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
                                                    • Instruction ID: e359d8c046b4275bb87a72ac3440150ee0889cd0e7de0465f76ccf46c1161c2e
                                                    • Opcode Fuzzy Hash: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
                                                    • Instruction Fuzzy Hash: 81D05EE27011602BCB01BAED54C4AC667CC9B8D25AB1840BBF904EF257D638CE40C398
                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                    • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                    • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                    • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,004515CB,00000000), ref: 0042CD2F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 699a035a793c66476b33cfcb292e18e8433149420fa0246697406cd7a61acf8b
                                                    • Instruction ID: 53db4a1afaa3b7bebcc80daf879f764776582c58df104e6651e2d127eece83ed
                                                    • Opcode Fuzzy Hash: 699a035a793c66476b33cfcb292e18e8433149420fa0246697406cd7a61acf8b
                                                    • Instruction Fuzzy Hash: 48C08CE03222001A9E60A6BD2CC551F06CC891423A3A41E3BB129EB2E2D23D88162818
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A6D4,0040CC80,?,00000000,?), ref: 00406EDD
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
                                                    • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                    • Opcode Fuzzy Hash: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
                                                    • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                    APIs
                                                    • SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                      • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497F80,00000001,00000000,00000002,00000000,004980E1,?,?,00000005,00000000,00498115), ref: 004506B7
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLast
                                                    • String ID:
                                                    • API String ID: 734332943-0
                                                    • Opcode ID: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
                                                    • Instruction ID: 9573b676cf6dd5fef234c73c81a1a5d02d78d5ca05287b50762f3c98dcfac2da
                                                    • Opcode Fuzzy Hash: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
                                                    • Instruction Fuzzy Hash: 1AC04CA5700211479F10A6BA85C1A0662D86A5D3157144066BD08CF207D668D8148A18
                                                    APIs
                                                    • SetCurrentDirectoryA.KERNEL32(00000000,?,00497F0E,00000000,004980E1,?,?,00000005,00000000,00498115,?,?,00000000), ref: 004072B3
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory
                                                    • String ID:
                                                    • API String ID: 1611563598-0
                                                    • Opcode ID: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                    • Instruction ID: 2ee9fcf0c2ecb8048618371478a38130c752a95b947e2a8aefd026f579ab26ad
                                                    • Opcode Fuzzy Hash: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                    • Instruction Fuzzy Hash: 33B012E03D120A2BCA0079FE4CC192A00CC46292163401B3B3006EB1C3D83DC8180824
                                                    APIs
                                                    • SetErrorMode.KERNEL32(?,0042E40D), ref: 0042E400
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
                                                    • Instruction ID: 426ac138898b17598b25982f2c454791bd479401c65f9a69ae9baa170422678e
                                                    • Opcode Fuzzy Hash: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
                                                    • Instruction Fuzzy Hash: CDB09B7670C6105EE709D6D5B45552D63D4D7C57207E14477F010D2581D57D58054E18
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow
                                                    • String ID:
                                                    • API String ID: 3375834691-0
                                                    • Opcode ID: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                    • Instruction ID: 4f6e5339ba6c71e81ef5aec1f6829bfe42d3c8de95bc03762545e97b2cddf6f9
                                                    • Opcode Fuzzy Hash: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                    • Instruction Fuzzy Hash: 1AA00275501500AADA00E7B5D849F7E2298BB44204FD905F9714897056C57C99008B55
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6a5b427799e3a1a51bee95e3b6531cccdda2c23f0d04629469e10dfbec5d95ca
                                                    • Instruction ID: 41a6872630840156d23f43a697f0b10540748f54e9aa1b8241e7bbe25a2b1888
                                                    • Opcode Fuzzy Hash: 6a5b427799e3a1a51bee95e3b6531cccdda2c23f0d04629469e10dfbec5d95ca
                                                    • Instruction Fuzzy Hash: 73517574E002099FDB00EFA9C892AAFBBF5EB49314F50817AE500E7351DB389D41CB98
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0047E0D7,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047E091
                                                      • Part of subcall function 0042CA00: GetSystemMetrics.USER32(0000002A), ref: 0042CA12
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMetricsMultiSystemWide
                                                    • String ID:
                                                    • API String ID: 224039744-0
                                                    • Opcode ID: e132d2ef04a63de935c4c35b48bd2cf8058ca50829dce82296b65d4ea0831439
                                                    • Instruction ID: eae35791d74d3c6fa9542b7b93a9934f931fbcb936d4a93fe60c884bc0bffbb6
                                                    • Opcode Fuzzy Hash: e132d2ef04a63de935c4c35b48bd2cf8058ca50829dce82296b65d4ea0831439
                                                    • Instruction Fuzzy Hash: 3451B170A00255AFDB20DF65D8C8FAE7BB8EB18308F118177E405A73A1D778AE45CB59
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
                                                    • Instruction ID: 3312bc658de40493dbbbdb628fa1ac862c14c743cb2aabe02eeb7d71ec829e14
                                                    • Opcode Fuzzy Hash: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
                                                    • Instruction Fuzzy Hash: D5115A752007059BCB20DF19D880B82FBE5EF98390F10C53BE9688B385D3B4E8458BA9
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,0045302D), ref: 0045300F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID:
                                                    • API String ID: 1452528299-0
                                                    • Opcode ID: 796ee09302341f2f0fe022b6b7ad64e2259239b3e6510a293da86372227c0e6a
                                                    • Instruction ID: b902f5f71593d0acd8113edc39c0d5725662cc955bae9521e0e34912f41e4d76
                                                    • Opcode Fuzzy Hash: 796ee09302341f2f0fe022b6b7ad64e2259239b3e6510a293da86372227c0e6a
                                                    • Instruction Fuzzy Hash: 850170356042486FC701DF699C008EEFBE8EB4D76171082B7FC24C3382D7345E059664
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,?,00004000,?,?,?,00001C1C,00005C1F,00401973), ref: 00401766
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID:
                                                    • API String ID: 1263568516-0
                                                    • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                    • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                                                    • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                    • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: 11f5b55454e2001d57305e4d26194660ee260494afc1ae4151642f59c6b90a28
                                                    • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                    • Opcode Fuzzy Hash: 11f5b55454e2001d57305e4d26194660ee260494afc1ae4151642f59c6b90a28
                                                    • Instruction Fuzzy Hash:
                                                    APIs
                                                    • GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
                                                    • SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
                                                    • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
                                                    • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
                                                    • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
                                                    • FreeLibrary.KERNEL32(00000001,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F26F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                    • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                    • API String ID: 2323315520-3614243559
                                                    • Opcode ID: 62814c6def9f01bce39a36d2c4270fbdb1234b3c2cb706e68bb71ccad2797809
                                                    • Instruction ID: e724c2aa341d6685c6ab1c4031cb88844a897dd828fe35f3324890dc483947ec
                                                    • Opcode Fuzzy Hash: 62814c6def9f01bce39a36d2c4270fbdb1234b3c2cb706e68bb71ccad2797809
                                                    • Instruction Fuzzy Hash: 8E314FB2640700ABEB01EBB9AC46A6B3794F328724741093FB508D7192D77C5C55CF5C
                                                    APIs
                                                    • GetTickCount.KERNEL32 ref: 0045862F
                                                    • QueryPerformanceCounter.KERNEL32(021D3858,00000000,004588C2,?,?,021D3858,00000000,?,00458FBE,?,021D3858,00000000), ref: 00458638
                                                    • GetSystemTimeAsFileTime.KERNEL32(021D3858,021D3858), ref: 00458642
                                                    • GetCurrentProcessId.KERNEL32(?,021D3858,00000000,004588C2,?,?,021D3858,00000000,?,00458FBE,?,021D3858,00000000), ref: 0045864B
                                                    • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004586C1
                                                    • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,021D3858,021D3858), ref: 004586CF
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458717
                                                    • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,0045886D,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458750
                                                      • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                    • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004587F9
                                                    • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 0045882F
                                                    • CloseHandle.KERNEL32(000000FF,00458874,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458867
                                                      • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004984F9,00000000), ref: 0045349F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                    • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                    • API String ID: 770386003-3271284199
                                                    • Opcode ID: fefe6b15b28a2f5dfcc74fe9a44b7459f870169ac87af102ceb1fd8277ffa27c
                                                    • Instruction ID: 54c9584e853abf465b9d0f30fdd509929e5717807e8393d963d4681616065440
                                                    • Opcode Fuzzy Hash: fefe6b15b28a2f5dfcc74fe9a44b7459f870169ac87af102ceb1fd8277ffa27c
                                                    • Instruction Fuzzy Hash: 19710470A003449EDB11EB65CC45B9E77F4EB05705F1085BAF904FB282DB7899488F69
                                                    APIs
                                                      • Part of subcall function 004784C4: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,021D2BCC,?,?,?,021D2BCC,00478688,00000000,004787A6,?,?,-00000010,?), ref: 004784DD
                                                      • Part of subcall function 004784C4: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004784E3
                                                      • Part of subcall function 004784C4: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021D2BCC,?,?,?,021D2BCC,00478688,00000000,004787A6,?,?,-00000010,?), ref: 004784F6
                                                      • Part of subcall function 004784C4: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021D2BCC,?,?,?,021D2BCC), ref: 00478520
                                                      • Part of subcall function 004784C4: CloseHandle.KERNEL32(00000000,?,?,?,021D2BCC,00478688,00000000,004787A6,?,?,-00000010,?), ref: 0047853E
                                                      • Part of subcall function 0047859C: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,0047862E,?,?,?,021D2BCC,?,00478690,00000000,004787A6,?,?,-00000010,?), ref: 004785CC
                                                    • ShellExecuteEx.SHELL32(0000003C), ref: 004786E0
                                                    • GetLastError.KERNEL32(00000000,004787A6,?,?,-00000010,?), ref: 004786E9
                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00478736
                                                    • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 0047875A
                                                    • CloseHandle.KERNEL32(00000000,0047878B,00000000,00000000,000000FF,000000FF,00000000,00478784,?,00000000,004787A6,?,?,-00000010,?), ref: 0047877E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                    • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                    • API String ID: 883996979-221126205
                                                    • Opcode ID: 05426b5e2553d641bc0d59fb02fc5a091f65b8757d7083e7eaf17f783fb7e87f
                                                    • Instruction ID: 1811090e6f026d40e608c2e83a367b80f37f0c53e01274ec65c4d0aaf8478ae2
                                                    • Opcode Fuzzy Hash: 05426b5e2553d641bc0d59fb02fc5a091f65b8757d7083e7eaf17f783fb7e87f
                                                    • Instruction Fuzzy Hash: 7B316670940604AEDB54EFA6CC49ADEB6B8EB05318F50843FF519E7281DE7C89058B59
                                                    APIs
                                                    • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 004229F4
                                                    • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BBE), ref: 00422A04
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: MessageSendShowWindow
                                                    • String ID:
                                                    • API String ID: 1631623395-0
                                                    • Opcode ID: fe921b6abe71c983525f7b2efb66a1e42baf216d7bc61c4d7c6314d42f4983af
                                                    • Instruction ID: 9e9026b6a08d43f4c34b0c014f83afec13b9727198b5f0eb67f7172f0d04fbcb
                                                    • Opcode Fuzzy Hash: fe921b6abe71c983525f7b2efb66a1e42baf216d7bc61c4d7c6314d42f4983af
                                                    • Instruction Fuzzy Hash: 90915171B04214BFDB11EFA9DA86F9D77F4AB04304F5500BAF504AB392CB78AE419B58
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 00418393
                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 004183B0
                                                    • GetWindowRect.USER32(?), ref: 004183CC
                                                    • GetWindowLongA.USER32(?,000000F0), ref: 004183DA
                                                    • GetWindowLongA.USER32(?,000000F8), ref: 004183EF
                                                    • ScreenToClient.USER32(00000000), ref: 004183F8
                                                    • ScreenToClient.USER32(00000000,?), ref: 00418403
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                    • String ID: ,
                                                    • API String ID: 2266315723-3772416878
                                                    • Opcode ID: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
                                                    • Instruction ID: 8875a2d430ef8be2c5346fa25315cde737655516302bc4d2344e38a88124d083
                                                    • Opcode Fuzzy Hash: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
                                                    • Instruction Fuzzy Hash: 2B112B71505201ABEB00DF69C885F9B77E8AF48314F04067EFD58DB296D738D900CB65
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000028), ref: 004555F3
                                                    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555F9
                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00455612
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455639
                                                    • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045563E
                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 0045564F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                    • String ID: SeShutdownPrivilege
                                                    • API String ID: 107509674-3733053543
                                                    • Opcode ID: 4cd84603c944fb792c2fd6e701572921a06a1b68e4cc7e04e52dcf9a944d71d3
                                                    • Instruction ID: 23182b732e3c774e917f784577cc733395bd6f0e504c2650860deaf78f25ff04
                                                    • Opcode Fuzzy Hash: 4cd84603c944fb792c2fd6e701572921a06a1b68e4cc7e04e52dcf9a944d71d3
                                                    • Instruction Fuzzy Hash: CBF0C870294B41B9EA10A6718C17F3B21C89B40709F80083ABD05E90D3D7BDD40C4A2E
                                                    APIs
                                                    • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D191
                                                    • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D1A1
                                                    • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D1B1
                                                    • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047FAC3,00000000,0047FAEC), ref: 0045D1D6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$CryptVersion
                                                    • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                    • API String ID: 1951258720-508647305
                                                    • Opcode ID: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
                                                    • Instruction ID: d394b6b565b4a55a8c16e24b867b534ad65140704dc94b035c924c7661ebf9a3
                                                    • Opcode Fuzzy Hash: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
                                                    • Instruction Fuzzy Hash: A2F030B0D41700CAD318EFF6AC957263B96EB9830AF14C03BA414C51A2D7794454DF2C
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00498336,?,?,00000000,0049B628,?,004984C0,00000000,00498514,?,?,00000000,0049B628), ref: 0049824F
                                                    • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 004982D2
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0049830E,?,00000000,?,00000000,00498336,?,?,00000000,0049B628,?,004984C0,00000000), ref: 004982EA
                                                    • FindClose.KERNEL32(000000FF,00498315,0049830E,?,00000000,?,00000000,00498336,?,?,00000000,0049B628,?,004984C0,00000000,00498514), ref: 00498308
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FileFind$AttributesCloseFirstNext
                                                    • String ID: isRS-$isRS-???.tmp
                                                    • API String ID: 134685335-3422211394
                                                    • Opcode ID: e5e746a4206f9636cdb65a3f8bf32247130a98a67cfbb6b2fbe2788e69782e1e
                                                    • Instruction ID: f5231d497961e3aaae96e0777280f5b29c2e5ab496b24ed358bc68db71827f47
                                                    • Opcode Fuzzy Hash: e5e746a4206f9636cdb65a3f8bf32247130a98a67cfbb6b2fbe2788e69782e1e
                                                    • Instruction Fuzzy Hash: D6315671901618AFDF20EF65CC41ADEBBBCDF45714F5084FBA808A32A1DB389E458E58
                                                    APIs
                                                    • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457611
                                                    • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457638
                                                    • SetForegroundWindow.USER32(?), ref: 00457649
                                                    • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00457921,?,00000000,0045795D), ref: 0045790C
                                                    Strings
                                                    • Cannot evaluate variable because [Code] isn't running yet, xrefs: 0045778C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                    • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                    • API String ID: 2236967946-3182603685
                                                    • Opcode ID: 02182f65679fc44c66fc5509e09f40db7d953209f550825c00fb47c8f665695e
                                                    • Instruction ID: eb512ad49ed5febd93ec6f292a038892ec4962d67be2c97403c2ee1da8299cdd
                                                    • Opcode Fuzzy Hash: 02182f65679fc44c66fc5509e09f40db7d953209f550825c00fb47c8f665695e
                                                    • Instruction Fuzzy Hash: 1D91C434608204DFEB15CF55D991F5ABBF5FB89304F2184BAEC0497792C638AE05DB68
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F4B), ref: 00455E3C
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E42
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                    • API String ID: 1646373207-3712701948
                                                    • Opcode ID: cfe60cce1451a080aa5580a85cc9e89e6cd68787435ab98da43f9732f1f28c23
                                                    • Instruction ID: d81c9a8c7c52065d28d66f53e81ce4f313aa74f068c2efe820cb9bfc493487ae
                                                    • Opcode Fuzzy Hash: cfe60cce1451a080aa5580a85cc9e89e6cd68787435ab98da43f9732f1f28c23
                                                    • Instruction Fuzzy Hash: B0418671A04649AFCF01EFA5C8929EEB7B8EF48305F504567F804F7292D67C5E098B68
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 00417D0F
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
                                                    • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$Placement$Iconic
                                                    • String ID: ,
                                                    • API String ID: 568898626-3772416878
                                                    • Opcode ID: d460cbcd6522e18bfa96e221bd03ab5df80cf9c807befa16e6725f229280989e
                                                    • Instruction ID: e85585575f8c5a3e7823c55acc6b28d6d187d41511fbfc80546af44b70413e2d
                                                    • Opcode Fuzzy Hash: d460cbcd6522e18bfa96e221bd03ab5df80cf9c807befa16e6725f229280989e
                                                    • Instruction Fuzzy Hash: 4C2112716042089BDF10EF69D8C1AEA77B8AF48314F05456AFD18DF346D678DD84CBA8
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001,00000000,0046433F), ref: 004641CD
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 00464213
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642C8
                                                    • FindClose.KERNEL32(000000FF,004642F3,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642E6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseErrorFirstModeNext
                                                    • String ID:
                                                    • API String ID: 4011626565-0
                                                    • Opcode ID: d65fe662ced77c8e67b3f484c5a5271a1863079ff85dc4491b19206ced0d9f2b
                                                    • Instruction ID: 9d9184480f8630aada0b530c6bd54f2fc26159d28d851f3c8c43bf9f92f270d6
                                                    • Opcode Fuzzy Hash: d65fe662ced77c8e67b3f484c5a5271a1863079ff85dc4491b19206ced0d9f2b
                                                    • Instruction Fuzzy Hash: 77418370A00A18DBCF10EFA5DC959DEB7B8EB88305F5044AAF804A7341E7789E448E59
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001,00000000,00463E99), ref: 00463D0D
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463D9C
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E2E
                                                    • FindClose.KERNEL32(000000FF,00463E55,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E48
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseErrorFirstModeNext
                                                    • String ID:
                                                    • API String ID: 4011626565-0
                                                    • Opcode ID: 319132aa37af3a0de75fcf0f51ad10aa5df08e751fe1a03177a059127406539b
                                                    • Instruction ID: 85e7d80bc36d7b3e80fea797042c039a90a2821ca6a16b1e557570abf42aa49f
                                                    • Opcode Fuzzy Hash: 319132aa37af3a0de75fcf0f51ad10aa5df08e751fe1a03177a059127406539b
                                                    • Instruction Fuzzy Hash: 3A41B770A00A589FCB11EF65CC45ADEB7B8EB88705F4044BAF404A7381E67D9F48CE59
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E956
                                                    • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E981
                                                    • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E98E
                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E996
                                                    • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E99C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                    • String ID:
                                                    • API String ID: 1177325624-0
                                                    • Opcode ID: 00c40fca2cfdd97ba02e44e9efda7f487b55ec81a2bcf6d63bb4130569f45397
                                                    • Instruction ID: 661b18b1de4eb1238568a50ab540e77c3175952f9b14320adb6d96c9b056064d
                                                    • Opcode Fuzzy Hash: 00c40fca2cfdd97ba02e44e9efda7f487b55ec81a2bcf6d63bb4130569f45397
                                                    • Instruction Fuzzy Hash: 80F090B23A17207AF620B57A5C86F7F418CCB89B68F10423BBA04FF1D1D9A85D0555AD
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 00483ACE
                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 00483AEC
                                                    • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A8,00482FAA,00482FDE,00000000,00482FFE,?,?,?,0049C0A8), ref: 00483B0E
                                                    • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A8,00482FAA,00482FDE,00000000,00482FFE,?,?,?,0049C0A8), ref: 00483B22
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$IconicLong
                                                    • String ID:
                                                    • API String ID: 2754861897-0
                                                    • Opcode ID: a8682cd5c1eeeb0685a914d0fd4a2573ee1bee36a61407b30f5c3b39df3f658e
                                                    • Instruction ID: 69330953dcc9e05924eb29a41a10fa607e48fc8b98de7115352c70869ea30612
                                                    • Opcode Fuzzy Hash: a8682cd5c1eeeb0685a914d0fd4a2573ee1bee36a61407b30f5c3b39df3f658e
                                                    • Instruction Fuzzy Hash: FE015E70701240ABE600FF659C8BB6A26C5AB14749F480A3BB5449B2A3CA6DEE85C71C
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00462824), ref: 004627A8
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00462804,?,00000000,?,00000000,00462824), ref: 004627E4
                                                    • FindClose.KERNEL32(000000FF,0046280B,00462804,?,00000000,?,00000000,00462824), ref: 004627FE
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNext
                                                    • String ID:
                                                    • API String ID: 3541575487-0
                                                    • Opcode ID: 8963c7f3b1c349b7c6238f578806947089c9928b174111815e2d7f1f1bfb4290
                                                    • Instruction ID: e6acefadc91213b77ea930f6be1f86c6134c8588622ee3d3acab995ed1c325b6
                                                    • Opcode Fuzzy Hash: 8963c7f3b1c349b7c6238f578806947089c9928b174111815e2d7f1f1bfb4290
                                                    • Instruction Fuzzy Hash: 87210831904B08BECB11EB65CC41ACEB7ACDB49304F5084B7E808E32A1F6789E44CE69
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 004241E4
                                                    • SetActiveWindow.USER32(?,?,?,0046CDAB), ref: 004241F1
                                                      • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                      • Part of subcall function 00423B14: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021D25AC,0042420A,?,?,?,0046CDAB), ref: 00423B4F
                                                    • SetFocus.USER32(00000000,?,?,?,0046CDAB), ref: 0042421E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveFocusIconicShow
                                                    • String ID:
                                                    • API String ID: 649377781-0
                                                    • Opcode ID: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
                                                    • Instruction ID: c953833529836f01456b8f788e47b4b7c36f7a841d6c6df07f57e62630513da6
                                                    • Opcode Fuzzy Hash: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
                                                    • Instruction Fuzzy Hash: 8CF030B170012097CB10BFAAA8C5B9676A8AB48344F5500BBBD05DF357CA7CDC018778
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 00417D0F
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
                                                    • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$Placement$Iconic
                                                    • String ID:
                                                    • API String ID: 568898626-0
                                                    • Opcode ID: 10c4cad34842aada7366c7ae835e87bb47f6877ef465302f7d8a53f72357e128
                                                    • Instruction ID: d9358ea7cd183770b33139a8ac7b7a0a70302bd2c01e5fc8313c3e2814ac7f2c
                                                    • Opcode Fuzzy Hash: 10c4cad34842aada7366c7ae835e87bb47f6877ef465302f7d8a53f72357e128
                                                    • Instruction Fuzzy Hash: 33012C71204108ABDB10EE59D8C1EF673A8AF45724F154566FD19DF242D639ED8087A8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CaptureIconic
                                                    • String ID:
                                                    • API String ID: 2277910766-0
                                                    • Opcode ID: c22591b8c3f2be6e3e416ff0957708157ed46c57fff49ed7de8fa542590db40d
                                                    • Instruction ID: 6cb7601519473143bf4e876ebf6758ccc8fc4fa751d6c6e0357a6193460a6b05
                                                    • Opcode Fuzzy Hash: c22591b8c3f2be6e3e416ff0957708157ed46c57fff49ed7de8fa542590db40d
                                                    • Instruction Fuzzy Hash: 0AF0A4723056425BD730AB2EC984AB762F69F84314B14403BE419CBFA1EB3CDCC08798
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 0042419B
                                                      • Part of subcall function 00423A84: EnumWindows.USER32(00423A1C), ref: 00423AA8
                                                      • Part of subcall function 00423A84: GetWindow.USER32(?,00000003), ref: 00423ABD
                                                      • Part of subcall function 00423A84: GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
                                                      • Part of subcall function 00423A84: SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
                                                    • SetActiveWindow.USER32(?,?,?,00423D73,00000000,0042415C), ref: 004241AF
                                                      • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveEnumIconicLongShowWindows
                                                    • String ID:
                                                    • API String ID: 2671590913-0
                                                    • Opcode ID: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
                                                    • Instruction ID: ce5d4440ec1c13bcfda566247f28ea27228b22b89c70f7a48f218b5e8bc86154
                                                    • Opcode Fuzzy Hash: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
                                                    • Instruction Fuzzy Hash: 55E01AA070011087DB10AFAADCC8B9632A9BB48304F55017ABD49CF35BD63CC8608724
                                                    APIs
                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127D5), ref: 004127C3
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: 120c9c179850e2d77f2b5158c289480559fb4752f9becda92d3f5c4f199058c9
                                                    • Instruction ID: 2c049f03cfb376e3baa0368465928f91904f6d03483072bf0e6cb5f6a46bccc5
                                                    • Opcode Fuzzy Hash: 120c9c179850e2d77f2b5158c289480559fb4752f9becda92d3f5c4f199058c9
                                                    • Instruction Fuzzy Hash: 4A5102357082048FD710DB6ADA80A9BF3E5EF98314B2082BBD814C77A1D7B8AD91C75D
                                                    APIs
                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478D62
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: 42035b0a390062e6d23d792172f6b82ff2c7c829b3002557c0f48d8802eb32c2
                                                    • Instruction ID: d776cd64023d9362bd44f1cd953eb23282d5c738cf602bd75e0929d40b898630
                                                    • Opcode Fuzzy Hash: 42035b0a390062e6d23d792172f6b82ff2c7c829b3002557c0f48d8802eb32c2
                                                    • Instruction Fuzzy Hash: C1416775644108DFCB20CF99C6888AAB7F5EB58310B35C99AE84CDB341D738EE41DBA4
                                                    APIs
                                                    • ArcFourCrypt._ISCRYPT(?,?,?,?), ref: 0045D247
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CryptFour
                                                    • String ID:
                                                    • API String ID: 2153018856-0
                                                    • Opcode ID: 60613f318f2e56de1b1058283c26d55875caf569050bffc963c4b4a7e30f6a75
                                                    • Instruction ID: 5effe0378c810cd07e0217cdc1e7a72ed78fe315a0c34b067f2c35eeb24cdbba
                                                    • Opcode Fuzzy Hash: 60613f318f2e56de1b1058283c26d55875caf569050bffc963c4b4a7e30f6a75
                                                    • Instruction Fuzzy Hash: D0C09BF200420CBF650057D5ECC9C77B75CE6586547408126F7048210195726C104574
                                                    APIs
                                                    • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DB6C,?,0046DD4D), ref: 0045D25A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CryptFour
                                                    • String ID:
                                                    • API String ID: 2153018856-0
                                                    • Opcode ID: d774fb8793e7b9215c4f3788321c424c537fe54849dfeb2a35b58218e4d2cefe
                                                    • Instruction ID: 17600df93846144bfd8e61cd07b91608ca2a028cf3222f5d1774599e6ed580aa
                                                    • Opcode Fuzzy Hash: d774fb8793e7b9215c4f3788321c424c537fe54849dfeb2a35b58218e4d2cefe
                                                    • Instruction Fuzzy Hash: B7A002F0B80300BAFD2057F15E5EF26252C97D0F01F2084657306E90D085A56400853C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2929418472.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000001.00000002.2929402149.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000001.00000002.2929440767.0000000010002000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                    • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                    • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                    • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2929418472.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000001.00000002.2929402149.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000001.00000002.2929440767.0000000010002000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                    • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                    • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                    • Instruction Fuzzy Hash:
                                                    APIs
                                                      • Part of subcall function 0044B604: GetVersionExA.KERNEL32(00000094), ref: 0044B621
                                                    • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498D46), ref: 0044B67F
                                                    • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
                                                    • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
                                                    • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
                                                    • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
                                                    • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7C9
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7DB
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7ED
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B7FF
                                                    • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B811
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B823
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B835
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B847
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B859
                                                    • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B86B
                                                    • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B87D
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B88F
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8A1
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8B3
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8C5
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8D7
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8E9
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B8FB
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B90D
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B91F
                                                    • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B931
                                                    • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B943
                                                    • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B955
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B967
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B979
                                                    • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B98B
                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B99D
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9AF
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9C1
                                                    • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9D3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoadVersion
                                                    • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                    • API String ID: 1968650500-2910565190
                                                    • Opcode ID: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
                                                    • Instruction ID: e93aa9000a3b975727f71862fff1c9a8a52c50bca2d3d110ef64c9f3a3b13d35
                                                    • Opcode Fuzzy Hash: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
                                                    • Instruction Fuzzy Hash: D391A8F0A40B11ABEB00EFB5AD96A2A3BA8EB15714310067BB454DF295D778DC108FDD
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0041CA40
                                                    • CreateCompatibleDC.GDI32(?), ref: 0041CA4C
                                                    • CreateBitmap.GDI32(0041A944,?,00000001,00000001,00000000), ref: 0041CA70
                                                    • CreateCompatibleBitmap.GDI32(?,0041A944,?), ref: 0041CA80
                                                    • SelectObject.GDI32(0041CE3C,00000000), ref: 0041CA9B
                                                    • FillRect.USER32(0041CE3C,?,?), ref: 0041CAD6
                                                    • SetTextColor.GDI32(0041CE3C,00000000), ref: 0041CAEB
                                                    • SetBkColor.GDI32(0041CE3C,00000000), ref: 0041CB02
                                                    • PatBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00FF0062), ref: 0041CB18
                                                    • CreateCompatibleDC.GDI32(?), ref: 0041CB2B
                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041CB5C
                                                    • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041CB74
                                                    • RealizePalette.GDI32(00000000), ref: 0041CB7D
                                                    • SelectPalette.GDI32(0041CE3C,00000000,00000001), ref: 0041CB8C
                                                    • RealizePalette.GDI32(0041CE3C), ref: 0041CB95
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041CBAE
                                                    • SetBkColor.GDI32(00000000,00000000), ref: 0041CBC5
                                                    • BitBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00000000,00000000,00000000,00CC0020), ref: 0041CBE1
                                                    • SelectObject.GDI32(00000000,?), ref: 0041CBEE
                                                    • DeleteDC.GDI32(00000000), ref: 0041CC04
                                                      • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
                                                    • String ID:
                                                    • API String ID: 269503290-0
                                                    • Opcode ID: f6ec0e72e5bf4d3a4b35452a053ce6985fd66c4a2c028599b4b656ed1e18f085
                                                    • Instruction ID: 91afdf38925dfcc0a19aef53af63d8b93a06df8cfedaf367688fa0d34ebdb442
                                                    • Opcode Fuzzy Hash: f6ec0e72e5bf4d3a4b35452a053ce6985fd66c4a2c028599b4b656ed1e18f085
                                                    • Instruction Fuzzy Hash: 01610071A44648AFDF10EBE9DC86FDFB7B8EB48704F10446AB504E7281D67CA940CB68
                                                    APIs
                                                    • CoCreateInstance.OLE32(00499A74,00000000,00000001,00499774,?,00000000,004569E3), ref: 0045667E
                                                    • CoCreateInstance.OLE32(00499764,00000000,00000001,00499774,?,00000000,004569E3), ref: 004566A4
                                                    • SysFreeString.OLEAUT32(00000000), ref: 0045685B
                                                    Strings
                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 00456840
                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 00456892
                                                    • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004567BD
                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004567F1
                                                    • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 00456904
                                                    • IPersistFile::Save, xrefs: 00456962
                                                    • CoCreateInstance, xrefs: 004566AF
                                                    • %ProgramFiles(x86)%\, xrefs: 0045672E
                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 004568CA
                                                    • IPropertyStore::Commit, xrefs: 004568E3
                                                    • {pf32}\, xrefs: 0045671E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateInstance$FreeString
                                                    • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
                                                    • API String ID: 308859552-2363233914
                                                    • Opcode ID: a0575c07f5dbe1f8e7a7a23a6ade5e0a0cf91765ce74541052d2130e474f3a3a
                                                    • Instruction ID: 626cebdda9c2f027bca35673d9c6b56497010998b1692f4b35f589c77fa21a92
                                                    • Opcode Fuzzy Hash: a0575c07f5dbe1f8e7a7a23a6ade5e0a0cf91765ce74541052d2130e474f3a3a
                                                    • Instruction Fuzzy Hash: 26B13170A00144AFDB50DFA9C845B9E7BF8AF09306F5540AAF804E7362DB78DD48CB69
                                                    APIs
                                                    • ShowWindow.USER32(?,00000005,00000000,004988BC,?,?,00000000,?,00000000,00000000,?,00498C73,00000000,00498C7D,?,00000000), ref: 004985A7
                                                    • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004988BC,?,?,00000000,?,00000000,00000000,?,00498C73,00000000), ref: 004985BA
                                                    • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004988BC,?,?,00000000,?,00000000,00000000), ref: 004985CA
                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004985EB
                                                    • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004988BC,?,?,00000000,?,00000000), ref: 004985FB
                                                      • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                    • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                    • API String ID: 2000705611-3672972446
                                                    • Opcode ID: 2c6f745618312d1343eb966f07f1a142d93ad7c4dd2afed7ea5240104eb64e0a
                                                    • Instruction ID: ff08a4da3ffacb89a0b451d6d304ab02822aded01301bce40496ce293a30bef9
                                                    • Opcode Fuzzy Hash: 2c6f745618312d1343eb966f07f1a142d93ad7c4dd2afed7ea5240104eb64e0a
                                                    • Instruction Fuzzy Hash: 4B91B634A042449FDF01EBA9CC52BAF7BA4EB4A304F5144BBF500A7692DE7C9905CB29
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,0045A994,?,?,?,?,?,00000006,?,00000000,004979B1,?,00000000,00497A54), ref: 0045A846
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                    • API String ID: 1452528299-3112430753
                                                    • Opcode ID: 8b8de21ee5b71d86044b816628dba2f396f5363eda986b0b83270a7f67df780a
                                                    • Instruction ID: 43962401d403c06de7b31dde6fd87328655f81364e16ca473e433d379c6e1912
                                                    • Opcode Fuzzy Hash: 8b8de21ee5b71d86044b816628dba2f396f5363eda986b0b83270a7f67df780a
                                                    • Instruction Fuzzy Hash: EC719070B002545BCB00EB6998417AE77A49F4931AF91896BFC01AB383DB7C9E1DC75E
                                                    APIs
                                                    • GetVersion.KERNEL32 ref: 0045CBDA
                                                    • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CBFA
                                                    • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CC07
                                                    • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CC14
                                                    • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CC22
                                                      • Part of subcall function 0045CAC8: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CB67,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CB41
                                                    • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCDB
                                                    • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCE4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                    • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                    • API String ID: 59345061-4263478283
                                                    • Opcode ID: a232fc9af4861a9c5d561c4cdd8364b97c4fb44f2e207c549b4316288fabcd11
                                                    • Instruction ID: 99773ef8a3d0261052733c4904a47669a242c0659fe16ead1f438c4abb71ff4e
                                                    • Opcode Fuzzy Hash: a232fc9af4861a9c5d561c4cdd8364b97c4fb44f2e207c549b4316288fabcd11
                                                    • Instruction Fuzzy Hash: BD518471900308EFDB10DF99C881BEEBBB8EB48711F14806AF904E7241C678A945CFA9
                                                    APIs
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 0041B3C3
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 0041B3CD
                                                    • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3DF
                                                    • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B3F6
                                                    • GetDC.USER32(00000000), ref: 0041B402
                                                    • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B42F
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041B455
                                                    • SelectObject.GDI32(00000000,?), ref: 0041B470
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B47F
                                                    • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B4C7
                                                    • DeleteDC.GDI32(00000000), ref: 0041B4D0
                                                    • DeleteDC.GDI32(?), ref: 0041B4D9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                                    • String ID:
                                                    • API String ID: 644427674-0
                                                    • Opcode ID: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
                                                    • Instruction ID: 0f3e5998203d07172116f12fa3fedaa120d09cd030f2870c51d139f455c41937
                                                    • Opcode Fuzzy Hash: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
                                                    • Instruction Fuzzy Hash: E941AD71E44619AFDB10DAE9C846FEFB7BCEB08704F104466B614F7281D6786D408BA8
                                                    APIs
                                                      • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472E54
                                                    • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00472F5B
                                                    • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 00472F71
                                                    • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00472F96
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                    • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                    • API String ID: 971782779-3668018701
                                                    • Opcode ID: 990eaa4bdac991bdce3dc023d752333eda30439449dc0add793edfc9e4bb7b4b
                                                    • Instruction ID: 70dfeb6d3285313767042aba4635c5ad43c1f2ff9f1230b4453fc56d38a30733
                                                    • Opcode Fuzzy Hash: 990eaa4bdac991bdce3dc023d752333eda30439449dc0add793edfc9e4bb7b4b
                                                    • Instruction Fuzzy Hash: E0D13374A00148AFDF11EFA9D582BDDBBF5AF08305F50806AF804B7392D6789E45CB69
                                                    APIs
                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,?,00000000,?,00000000,00454B0D,?,0045AB6A,00000003,00000000,00000000,00454B44), ref: 0045498D
                                                      • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                    • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,0045AB6A,00000000,00000000,?,00000000,?,00000000), ref: 00454A11
                                                    • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,0045AB6A,00000000,00000000,?,00000000,?,00000000), ref: 00454A40
                                                    Strings
                                                    • RegOpenKeyEx, xrefs: 00454910
                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548AB
                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548E4
                                                    • , xrefs: 004548FE
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: QueryValue$FormatMessageOpen
                                                    • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                    • API String ID: 2812809588-1577016196
                                                    • Opcode ID: 9b9dfa61090610d27ab865beaece96ce5b3da7702bfc757bf330bb76a078598e
                                                    • Instruction ID: 3b35aed17da8244e85d272d2923899a44a2159637523a8fd9e70e85f8d21f96a
                                                    • Opcode Fuzzy Hash: 9b9dfa61090610d27ab865beaece96ce5b3da7702bfc757bf330bb76a078598e
                                                    • Instruction Fuzzy Hash: 23914871E44148ABDB10DF95C842BDEB7FCEB49309F50406BF900FB282D6789E458B69
                                                    APIs
                                                      • Part of subcall function 00459364: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004594FF
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 00459569
                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004595D0
                                                    Strings
                                                    • .NET Framework version %s not found, xrefs: 00459609
                                                    • v2.0.50727, xrefs: 0045955B
                                                    • .NET Framework not found, xrefs: 0045961D
                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00459583
                                                    • v1.1.4322, xrefs: 004595C2
                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 0045951C
                                                    • v4.0.30319, xrefs: 004594F1
                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 004594B2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Close$Open
                                                    • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                    • API String ID: 2976201327-446240816
                                                    • Opcode ID: 977e2d3cd33b4cd9294f0f03bcbe6eb3eddcf61cdb5810a8364f79b6ebaabd84
                                                    • Instruction ID: e7879d346446e6db82ad1067b50e8ffdd52b59a139ce3e0e88c8f748029a0227
                                                    • Opcode Fuzzy Hash: 977e2d3cd33b4cd9294f0f03bcbe6eb3eddcf61cdb5810a8364f79b6ebaabd84
                                                    • Instruction Fuzzy Hash: EB51A331A04148EBCB01DFA8C8A1BEE77A5DB59305F54447BA801DB353EA3D9E1ECB19
                                                    APIs
                                                    • CloseHandle.KERNEL32(?), ref: 00458A7B
                                                    • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458A97
                                                    • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458AA5
                                                    • GetExitCodeProcess.KERNEL32(?), ref: 00458AB6
                                                    • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458AFD
                                                    • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458B19
                                                    Strings
                                                    • Helper process exited, but failed to get exit code., xrefs: 00458AEF
                                                    • Stopping 64-bit helper process. (PID: %u), xrefs: 00458A6D
                                                    • Helper isn't responding; killing it., xrefs: 00458A87
                                                    • Helper process exited with failure code: 0x%x, xrefs: 00458AE3
                                                    • Helper process exited., xrefs: 00458AC5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                    • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                    • API String ID: 3355656108-1243109208
                                                    • Opcode ID: ad2dcfba7775d92cdd705c6c37c7301898455033d5c50531ee5783888c1f7286
                                                    • Instruction ID: 3f2324d87e707cedf1d5c4e10b6e93e7b0b52df74c864805f1ac214018e434b5
                                                    • Opcode Fuzzy Hash: ad2dcfba7775d92cdd705c6c37c7301898455033d5c50531ee5783888c1f7286
                                                    • Instruction Fuzzy Hash: 2F2130706087409AD720E779C44575BB6D49F08345F04CC2FF99AEB283DF78E8488B2A
                                                    APIs
                                                      • Part of subcall function 0042DDE4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045464F
                                                    • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045478B
                                                      • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                    Strings
                                                    • , xrefs: 004545B1
                                                    • RegCreateKeyEx, xrefs: 004545C3
                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454567
                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454597
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateFormatMessageQueryValue
                                                    • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                    • API String ID: 2481121983-1280779767
                                                    • Opcode ID: 79b7515256ab6cc25d697d542fc9f7a9b13bca3f64e6169635af42a7d90306bb
                                                    • Instruction ID: 93c55a0ab54dbcba353dd8d7ef9dbdddde8d62e860aeeeeaccb8ee2ace91ec52
                                                    • Opcode Fuzzy Hash: 79b7515256ab6cc25d697d542fc9f7a9b13bca3f64e6169635af42a7d90306bb
                                                    • Instruction Fuzzy Hash: 49810F75A00209AFDB00DFD5C981BDEB7B8EB49309F10452AF900FB282D7789E45CB69
                                                    APIs
                                                      • Part of subcall function 004538BC: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,uoI,_iu,?,00000000,004539F6), ref: 004539AB
                                                      • Part of subcall function 004538BC: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,uoI,_iu,?,00000000,004539F6), ref: 004539BB
                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00496E21
                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00496F75), ref: 00496E42
                                                    • CreateWindowExA.USER32(00000000,STATIC,00496F84,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00496E69
                                                    • SetWindowLongA.USER32(?,000000FC,004965FC), ref: 00496E7C
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496F48,?,?,000000FC,004965FC,00000000,STATIC,00496F84), ref: 00496EAC
                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00496F20
                                                    • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496F48,?,?,000000FC,004965FC,00000000), ref: 00496F2C
                                                      • Part of subcall function 00453D30: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
                                                    • DestroyWindow.USER32(?,00496F4F,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496F48,?,?,000000FC,004965FC,00000000,STATIC), ref: 00496F42
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                    • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                    • API String ID: 1549857992-2312673372
                                                    • Opcode ID: c1e27346708524ed962f522e89fbdb3f6ecc9022e95a0b39fd91e794d4f84109
                                                    • Instruction ID: e02f9a0327592f206aa6a63a0645f409ad27af093be3632dc75f62a316812853
                                                    • Opcode Fuzzy Hash: c1e27346708524ed962f522e89fbdb3f6ecc9022e95a0b39fd91e794d4f84109
                                                    • Instruction Fuzzy Hash: 58414C70A44208AFDF00EBA5DD42F9E7BF8EB08714F52457AF510F7292D7799A008B68
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E830,00000000), ref: 0042E441
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E447
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E830,00000000), ref: 0042E495
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressCloseHandleModuleProc
                                                    • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$QaE$kernel32.dll
                                                    • API String ID: 4190037839-2312295185
                                                    • Opcode ID: 8bcd604a55439ceb47fea7ba95052636446e00800d3d3edb63372dc0373b7890
                                                    • Instruction ID: f42d7e7755912f49377b3a3c2778cbb45b18f2cdc7334bb7b0fb93ca3fe573dd
                                                    • Opcode Fuzzy Hash: 8bcd604a55439ceb47fea7ba95052636446e00800d3d3edb63372dc0373b7890
                                                    • Instruction Fuzzy Hash: E8213230B10225BBDB10EAE6DC51B9E76B8EB44308F90447BA504E7281E77CDE419B5C
                                                    APIs
                                                    • GetActiveWindow.USER32 ref: 004629FC
                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462A10
                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462A1D
                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462A2A
                                                    • GetWindowRect.USER32(?,00000000), ref: 00462A76
                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462AB4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                    • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                    • API String ID: 2610873146-3407710046
                                                    • Opcode ID: be810167d085ce5d79451071bddde1aea5a5b97ebc567b885f730a6f7d0e2fb3
                                                    • Instruction ID: 865a179037155f8fdabe2954c964c2dd38b7d55406d5d1e7c7801a7b23b437f8
                                                    • Opcode Fuzzy Hash: be810167d085ce5d79451071bddde1aea5a5b97ebc567b885f730a6f7d0e2fb3
                                                    • Instruction Fuzzy Hash: B7219575701B057BD610D6A88D85F3B36D8EB84715F094A2AF944DB3C1E6F8EC018B9A
                                                    APIs
                                                    • GetActiveWindow.USER32 ref: 0042F194
                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1A8
                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1B5
                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1C2
                                                    • GetWindowRect.USER32(?,00000000), ref: 0042F20E
                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F24C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                    • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                    • API String ID: 2610873146-3407710046
                                                    • Opcode ID: 0bd4435ce292f1e5bbefee0a1fae93cdcffa7d02ebe00659dbed0c72d26099ab
                                                    • Instruction ID: 50a2e38ba83faf67dd7c56e8d7733487d454ef14a416094e89dadcccf0bf0910
                                                    • Opcode Fuzzy Hash: 0bd4435ce292f1e5bbefee0a1fae93cdcffa7d02ebe00659dbed0c72d26099ab
                                                    • Instruction Fuzzy Hash: 3821F279704710ABD300EA68ED41F3B37A9DB89714F88457AF944DB382DA79EC044BA9
                                                    APIs
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00458DFB,?,00000000,00458E5E,?,?,021D3858,00000000), ref: 00458C79
                                                    • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,021D3858,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CD6
                                                    • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,021D3858,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CE3
                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00458D2F
                                                    • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,021D3858,?,00000000,00458D90,?,00000000), ref: 00458D55
                                                    • GetLastError.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,021D3858,?,00000000,00458D90,?,00000000), ref: 00458D5C
                                                      • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004984F9,00000000), ref: 0045349F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                    • String ID: CreateEvent$TransactNamedPipe
                                                    • API String ID: 2182916169-3012584893
                                                    • Opcode ID: 7b509680db312d6d9eeee96a6ca75077f36d693cf911451bc7dd7bcd49c3517f
                                                    • Instruction ID: 06b5d05a5e38ae799b2edb69ba26f0faef77b18cb4ad173b91f5c3c95d125767
                                                    • Opcode Fuzzy Hash: 7b509680db312d6d9eeee96a6ca75077f36d693cf911451bc7dd7bcd49c3517f
                                                    • Instruction Fuzzy Hash: EF418E75A00608AFDB15DF95C981F9EB7F8EB48714F1044AAF900F72D2DA789E44CA28
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456E85,?,?,00000031,?), ref: 00456D48
                                                    • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456D4E
                                                    • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456D9B
                                                      • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004984F9,00000000), ref: 0045349F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressErrorHandleLastLoadModuleProcType
                                                    • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                    • API String ID: 1914119943-2711329623
                                                    • Opcode ID: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
                                                    • Instruction ID: d1bb8c6bfccdc0522a96f5e3020b18907c52df716e7671809b7eaf465cfb4023
                                                    • Opcode Fuzzy Hash: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
                                                    • Instruction Fuzzy Hash: 6831A375A00604AFDB41EFAACC12D5BB7BDEB8970675244A6FD04D3352DB38DD08CA28
                                                    APIs
                                                    • RectVisible.GDI32(?,?), ref: 00416E13
                                                    • SaveDC.GDI32(?), ref: 00416E27
                                                    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E4A
                                                    • RestoreDC.GDI32(?,?), ref: 00416E65
                                                    • CreateSolidBrush.GDI32(00000000), ref: 00416EE5
                                                    • FrameRect.USER32(?,?,?), ref: 00416F18
                                                    • DeleteObject.GDI32(?), ref: 00416F22
                                                    • CreateSolidBrush.GDI32(00000000), ref: 00416F32
                                                    • FrameRect.USER32(?,?,?), ref: 00416F65
                                                    • DeleteObject.GDI32(?), ref: 00416F6F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                    • String ID:
                                                    • API String ID: 375863564-0
                                                    • Opcode ID: b9a1a6b4ef0fbc1228a8f8785835a4c3e08f1bfb9097ff9bdf89ecadc5e4d088
                                                    • Instruction ID: c082a38e55a2621cff38c0036c5e412d4739722926df34ebe37a7eff5f7859fc
                                                    • Opcode Fuzzy Hash: b9a1a6b4ef0fbc1228a8f8785835a4c3e08f1bfb9097ff9bdf89ecadc5e4d088
                                                    • Instruction Fuzzy Hash: 70515A712086459FDB50EF69C8C4B9B77E8AF48314F15466AFD488B286C738EC81CB99
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                    • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                    • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                    • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                    • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                    • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                    • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                    • String ID:
                                                    • API String ID: 1694776339-0
                                                    • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                    • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                    • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                    • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                    APIs
                                                    • GetSystemMenu.USER32(00000000,00000000), ref: 00422233
                                                    • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422251
                                                    • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042225E
                                                    • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226B
                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422278
                                                    • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422285
                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00422292
                                                    • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0042229F
                                                    • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222BD
                                                    • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222D9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$EnableItem$System
                                                    • String ID:
                                                    • API String ID: 3985193851-0
                                                    • Opcode ID: 4d8bc361089dd12c5078b36f4c4993afe50deda9ff5b79e06e1db0131907f366
                                                    • Instruction ID: 662ae76830c3dbb110fd6952920e185112f137d20e740dc0dcce1beff7d7cd05
                                                    • Opcode Fuzzy Hash: 4d8bc361089dd12c5078b36f4c4993afe50deda9ff5b79e06e1db0131907f366
                                                    • Instruction Fuzzy Hash: AF2144703407047AE720E724CD8BF9BBBD89B04708F5451A5BA487F6D3C6F9AB804698
                                                    APIs
                                                    • FreeLibrary.KERNEL32(10000000), ref: 00481B65
                                                    • FreeLibrary.KERNEL32(02400000), ref: 00481B79
                                                    • SendNotifyMessageA.USER32(00020428,00000496,00002710,00000000), ref: 00481BEB
                                                    Strings
                                                    • Not restarting Windows because Setup is being run from the debugger., xrefs: 00481B9A
                                                    • Restarting Windows., xrefs: 00481BC6
                                                    • DeinitializeSetup, xrefs: 00481A61
                                                    • Deinitializing Setup., xrefs: 004819C6
                                                    • GetCustomSetupExitCode, xrefs: 00481A05
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary$MessageNotifySend
                                                    • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                    • API String ID: 3817813901-1884538726
                                                    • Opcode ID: 6d74b07853b62e9a78f4af2a4b9518ca68df11045f622bb3010e2b904ba9fea3
                                                    • Instruction ID: 5f614c2becb2f9b2df5b9334f77b872cbbc58191adb727a5ecf500f3ff499cff
                                                    • Opcode Fuzzy Hash: 6d74b07853b62e9a78f4af2a4b9518ca68df11045f622bb3010e2b904ba9fea3
                                                    • Instruction Fuzzy Hash: 12519F307042009FD715EF69E995B6A77E8EB19714F1188BBE800C73B2DB38A846CB5D
                                                    APIs
                                                    • SHGetMalloc.SHELL32(?), ref: 004616C7
                                                    • GetActiveWindow.USER32 ref: 0046172B
                                                    • CoInitialize.OLE32(00000000), ref: 0046173F
                                                    • SHBrowseForFolder.SHELL32(?), ref: 00461756
                                                    • CoUninitialize.OLE32(00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046176B
                                                    • SetActiveWindow.USER32(?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 00461781
                                                    • SetActiveWindow.USER32(?,?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046178A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                    • String ID: A
                                                    • API String ID: 2684663990-3554254475
                                                    • Opcode ID: 5abff382c365b356a5f9979bd0a1a977532a81d07c44ab4be7d70d1cfd9c4776
                                                    • Instruction ID: 0f37cca2ee7d5c89cd5c8fe3b5c5f67eac08b275376d6c087401a1ac056189be
                                                    • Opcode Fuzzy Hash: 5abff382c365b356a5f9979bd0a1a977532a81d07c44ab4be7d70d1cfd9c4776
                                                    • Instruction Fuzzy Hash: C3312F70E00348AFDB10EFA6D885A9EBBF8EB09304F55847AF404E7251E7785A048F59
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,00472C0D,?,?,?,00000008,00000000,00000000,00000000,?,00472E69,?,?,00000000,004730D8), ref: 00472B70
                                                      • Part of subcall function 0042CD94: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE0A
                                                      • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,00498845,00000000,0049889A,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                    • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472C0D,?,?,?,00000008,00000000,00000000,00000000,?,00472E69), ref: 00472BE7
                                                    • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472C0D,?,?,?,00000008,00000000,00000000,00000000), ref: 00472BED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                    • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                    • API String ID: 884541143-1710247218
                                                    • Opcode ID: 15e75fedc04b3aa363ec587cdf338b9bca21dc0c17d6f5d62e1bed9c64d546c9
                                                    • Instruction ID: 5d3afa004f47515b0afb51a46fc12790b9d79365c4da9299bd662cb786c7dc46
                                                    • Opcode Fuzzy Hash: 15e75fedc04b3aa363ec587cdf338b9bca21dc0c17d6f5d62e1bed9c64d546c9
                                                    • Instruction Fuzzy Hash: 3E11D0707005147FD712EA698E82A9F73ACDB59714F61857BB404A72C1DB7CEE02865C
                                                    APIs
                                                    • GetProcAddress.KERNEL32(02400000,inflateInit_), ref: 0045D2BD
                                                    • GetProcAddress.KERNEL32(02400000,inflate), ref: 0045D2CD
                                                    • GetProcAddress.KERNEL32(02400000,inflateEnd), ref: 0045D2DD
                                                    • GetProcAddress.KERNEL32(02400000,inflateReset), ref: 0045D2ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc
                                                    • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                    • API String ID: 190572456-3516654456
                                                    • Opcode ID: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
                                                    • Instruction ID: d913f85fec6517a53d2ec7ba369195fd603025f4bffd93910817278a70f0814a
                                                    • Opcode Fuzzy Hash: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
                                                    • Instruction Fuzzy Hash: C20112B0D00701DBE724DFF6ACC672636A5ABA8306F14C03B9D09962A2D77D0459DF2E
                                                    APIs
                                                    • SetBkColor.GDI32(?,00000000), ref: 0041A9B9
                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041A9F3
                                                    • SetBkColor.GDI32(?,?), ref: 0041AA08
                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA52
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041AA5D
                                                    • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA6D
                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AAAC
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041AAB6
                                                    • SetBkColor.GDI32(00000000,?), ref: 0041AAC3
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Color$StretchText
                                                    • String ID:
                                                    • API String ID: 2984075790-0
                                                    • Opcode ID: a8d6bc22a29610fb7d9e8f004505559cc23da0f7e724cd4a229c9d2e97503fc4
                                                    • Instruction ID: 4467ea82dd13d464879b0bd0dd0607b47ee3045dce17e21d2c6451b7f26a8ea4
                                                    • Opcode Fuzzy Hash: a8d6bc22a29610fb7d9e8f004505559cc23da0f7e724cd4a229c9d2e97503fc4
                                                    • Instruction Fuzzy Hash: 8761E5B5A00505AFCB40EFADD985E9AB7F8EF08314B10816AF908DB262C775ED40CF58
                                                    APIs
                                                      • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                    • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458278,?, /s ",?,regsvr32.exe",?,00458278), ref: 004581EA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseDirectoryHandleSystem
                                                    • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                    • API String ID: 2051275411-1862435767
                                                    • Opcode ID: 8f98767bd471881ea9df2c93d8a569edb70bdf2c2fabfe62ed544d022ea99af7
                                                    • Instruction ID: cda81b302c56d3c3b7af3d8ffa4af26d40175ae7a7c1cff7e24eee752c39b11a
                                                    • Opcode Fuzzy Hash: 8f98767bd471881ea9df2c93d8a569edb70bdf2c2fabfe62ed544d022ea99af7
                                                    • Instruction Fuzzy Hash: 21411670A047486BDB10EFD6D842B8DBBF9AF45305F50407FB904BB292DF789A098B19
                                                    APIs
                                                    • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1A9
                                                    • GetSysColor.USER32(00000014), ref: 0044D1B0
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0044D1C8
                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D1F1
                                                    • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D1FB
                                                    • GetSysColor.USER32(00000010), ref: 0044D202
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0044D21A
                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D243
                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D26E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Text$Color$Draw$OffsetRect
                                                    • String ID:
                                                    • API String ID: 1005981011-0
                                                    • Opcode ID: 7d2b2fc9822961681121e15aec8fda6e1bcec34d0c54e5d8dfbef80c477f73a5
                                                    • Instruction ID: 8406a00effd73db105afccad7da3796984cf264811f0ddac3e5cace4e0ac1d2b
                                                    • Opcode Fuzzy Hash: 7d2b2fc9822961681121e15aec8fda6e1bcec34d0c54e5d8dfbef80c477f73a5
                                                    • Instruction Fuzzy Hash: A021BDB42015047FC710FB2ACD8AE8B6BDCDF19319B05457AB958EB292C67CDD404668
                                                    APIs
                                                    • GetFocus.USER32 ref: 0041B745
                                                    • GetDC.USER32(?), ref: 0041B751
                                                    • SelectPalette.GDI32(00000000,?,00000000), ref: 0041B786
                                                    • RealizePalette.GDI32(00000000), ref: 0041B792
                                                    • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041B7C0
                                                    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041B7F4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Palette$Select$BitmapCreateFocusRealize
                                                    • String ID: 7'H
                                                    • API String ID: 3275473261-2091340224
                                                    • Opcode ID: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
                                                    • Instruction ID: 38bdddf8d72f5571b31e8017bfcff87152bbfcb95d4f6cd7f9962c0a723fddb9
                                                    • Opcode Fuzzy Hash: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
                                                    • Instruction Fuzzy Hash: 8A512F70A002099FDF11DFA9C881AEEBBF9FF49704F104066F504A7791D7799981CBA9
                                                    APIs
                                                    • GetFocus.USER32 ref: 0041BA17
                                                    • GetDC.USER32(?), ref: 0041BA23
                                                    • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BA5D
                                                    • RealizePalette.GDI32(00000000), ref: 0041BA69
                                                    • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BA8D
                                                    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BAC1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Palette$Select$BitmapCreateFocusRealize
                                                    • String ID: 7'H
                                                    • API String ID: 3275473261-2091340224
                                                    • Opcode ID: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
                                                    • Instruction ID: 3fcaffe560058c7771eaec6053d79e0e1924f360d52694d27862de55114c0f48
                                                    • Opcode Fuzzy Hash: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
                                                    • Instruction Fuzzy Hash: 9D512A74A002189FDB11DFA9C891AAEBBF9FF49700F154066F904EB751D738AD40CBA4
                                                    APIs
                                                      • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                      • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,00498845,00000000,0049889A,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 004966D9
                                                    • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 004966ED
                                                    • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00496707
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00496713
                                                    • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00496719
                                                    • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 0049672C
                                                    Strings
                                                    • Deleting Uninstall data files., xrefs: 0049664F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                    • String ID: Deleting Uninstall data files.
                                                    • API String ID: 1570157960-2568741658
                                                    • Opcode ID: 6b1a562372018b3c04c21fd55addb09df91798402f7a20c98910ed9b47dc373c
                                                    • Instruction ID: fc2dff9fd315349f2156f28d73b8ddc54b813d50684bf5e3b9d02ed62c94c615
                                                    • Opcode Fuzzy Hash: 6b1a562372018b3c04c21fd55addb09df91798402f7a20c98910ed9b47dc373c
                                                    • Instruction Fuzzy Hash: 0E218570344250AFEB10E7BAFDC2B2A3798DB14328F62443BF505961D2DA7CAC448A6D
                                                    APIs
                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,00470449,?,?,?,?,00000000), ref: 004703B3
                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,00470449), ref: 004703CA
                                                    • AddFontResourceA.GDI32(00000000), ref: 004703E7
                                                    • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004703FB
                                                    Strings
                                                    • Failed to set value in Fonts registry key., xrefs: 004703BC
                                                    • AddFontResource, xrefs: 00470405
                                                    • Failed to open Fonts registry key., xrefs: 004703D1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                    • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                    • API String ID: 955540645-649663873
                                                    • Opcode ID: 0e60b4dff13f95c41d2b7ddd60daa426212decfb7f4df4faf9448f3b0738515b
                                                    • Instruction ID: 7e5676c94f998b7724f079aab18eb66bfb7253da6a81524f4a54bf1ce8fa652d
                                                    • Opcode Fuzzy Hash: 0e60b4dff13f95c41d2b7ddd60daa426212decfb7f4df4faf9448f3b0738515b
                                                    • Instruction Fuzzy Hash: B921B074741204BBD710EA669D42FAE67AC8B54708F608437BA04EB3C2DA7C9E05966D
                                                    APIs
                                                      • Part of subcall function 00416410: GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
                                                      • Part of subcall function 00416410: UnregisterClassA.USER32(?,00400000), ref: 004164AB
                                                      • Part of subcall function 00416410: RegisterClassA.USER32(?), ref: 004164CE
                                                    • GetVersion.KERNEL32 ref: 00462E60
                                                    • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00462E9E
                                                    • SHGetFileInfo.SHELL32(00462F3C,00000000,?,00000160,00004011), ref: 00462EBB
                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 00462ED9
                                                    • SetCursor.USER32(00000000,00000000,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462EDF
                                                    • SetCursor.USER32(?,00462F1F,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462F12
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                    • String ID: Explorer
                                                    • API String ID: 2594429197-512347832
                                                    • Opcode ID: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
                                                    • Instruction ID: b0f6820fd5a5ea072646c086af9eca81c98a3cd1ffd9b7ca0f87214cf94a4ba1
                                                    • Opcode Fuzzy Hash: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
                                                    • Instruction Fuzzy Hash: CD21E7307403047AEB15BB759D47B9A3798DB09708F4004BFFA05EA1C3EEBD9901966D
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,021D2BCC,?,?,?,021D2BCC,00478688,00000000,004787A6,?,?,-00000010,?), ref: 004784DD
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004784E3
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021D2BCC,?,?,?,021D2BCC,00478688,00000000,004787A6,?,?,-00000010,?), ref: 004784F6
                                                    • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021D2BCC,?,?,?,021D2BCC), ref: 00478520
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,021D2BCC,00478688,00000000,004787A6,?,?,-00000010,?), ref: 0047853E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                    • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                    • API String ID: 2704155762-2318956294
                                                    • Opcode ID: d5ea4166fcaf8126fc80c765a532ee783e785b3a68d34ab88d5b8918896e85ee
                                                    • Instruction ID: 059ef19278573a22ad79f3efb81f267758515d2cc5b9caaab61c4a46906d4c84
                                                    • Opcode Fuzzy Hash: d5ea4166fcaf8126fc80c765a532ee783e785b3a68d34ab88d5b8918896e85ee
                                                    • Instruction Fuzzy Hash: 500184607C07047AE521317F4C8ABBB654D8B50779F14853FBA1CFA2D2DDAD9D06025E
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,00459F8E,?,00000000,00000000,00000000,?,00000006,?,00000000,004979B1,?,00000000,00497A54), ref: 00459ED2
                                                      • Part of subcall function 004543F4: FindClose.KERNEL32(000000FF,004544EA), ref: 004544D9
                                                    Strings
                                                    • Stripped read-only attribute., xrefs: 00459E94
                                                    • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00459F47
                                                    • Failed to delete directory (%d). Will retry later., xrefs: 00459EEB
                                                    • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00459EAC
                                                    • Deleting directory: %s, xrefs: 00459E5B
                                                    • Failed to strip read-only attribute., xrefs: 00459EA0
                                                    • Failed to delete directory (%d)., xrefs: 00459F68
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseErrorFindLast
                                                    • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                    • API String ID: 754982922-1448842058
                                                    • Opcode ID: 80f7886d710564e036732f28763ec8210f816c25e7c1dc05d6f6c8754f6c9741
                                                    • Instruction ID: b8d9b7298ea7c3337bda5d500217c07e27fbd6b384233f4239b27a523d6d10d0
                                                    • Opcode Fuzzy Hash: 80f7886d710564e036732f28763ec8210f816c25e7c1dc05d6f6c8754f6c9741
                                                    • Instruction Fuzzy Hash: 1841A331A04208CACB10EB69C8413AEB6A55F4530AF54897BAC01D73D3CB7C8E0DC75E
                                                    APIs
                                                    • GetCapture.USER32 ref: 00422EA4
                                                    • GetCapture.USER32 ref: 00422EB3
                                                    • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EB9
                                                    • ReleaseCapture.USER32 ref: 00422EBE
                                                    • GetActiveWindow.USER32 ref: 00422ECD
                                                    • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F4C
                                                    • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FB0
                                                    • GetActiveWindow.USER32 ref: 00422FBF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CaptureMessageSend$ActiveWindow$Release
                                                    • String ID:
                                                    • API String ID: 862346643-0
                                                    • Opcode ID: c643ce2b5946eedbc9fc7e9e432b1ebed7a1b2002a4b485bdd2aba3560ad3673
                                                    • Instruction ID: c6261992695b47722d84ffa44129b55dc5b2a4dad2f70b0012283783c1c7b094
                                                    • Opcode Fuzzy Hash: c643ce2b5946eedbc9fc7e9e432b1ebed7a1b2002a4b485bdd2aba3560ad3673
                                                    • Instruction Fuzzy Hash: 24417230B00245AFDB10EB69DA86B9E77F1EF44304F5540BAF404AB2A2D778AE40DB49
                                                    APIs
                                                    • GetWindowLongA.USER32(?,000000F0), ref: 0042F2BA
                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0042F2D1
                                                    • GetActiveWindow.USER32 ref: 0042F2DA
                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F307
                                                    • SetActiveWindow.USER32(?,0042F437,00000000,?), ref: 0042F328
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveLong$Message
                                                    • String ID:
                                                    • API String ID: 2785966331-0
                                                    • Opcode ID: ffaa0164ef6debd839ee17ddcc6e3af86a32ff139a3091cd84ca3200376ed077
                                                    • Instruction ID: ac844ef734d24c76dc9aa96f201b13a865b129e9c1b137beabd8cb6517960092
                                                    • Opcode Fuzzy Hash: ffaa0164ef6debd839ee17ddcc6e3af86a32ff139a3091cd84ca3200376ed077
                                                    • Instruction Fuzzy Hash: F931D271A00254AFEB01EFA5DD52E6EBBB8EB09304F9144BAF804E3291D73C9D10CB58
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0042948A
                                                    • GetTextMetricsA.GDI32(00000000), ref: 00429493
                                                      • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                    • SelectObject.GDI32(00000000,00000000), ref: 004294A2
                                                    • GetTextMetricsA.GDI32(00000000,?), ref: 004294AF
                                                    • SelectObject.GDI32(00000000,00000000), ref: 004294B6
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 004294BE
                                                    • GetSystemMetrics.USER32(00000006), ref: 004294E3
                                                    • GetSystemMetrics.USER32(00000006), ref: 004294FD
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
                                                    • String ID:
                                                    • API String ID: 1583807278-0
                                                    • Opcode ID: 3849d669cc5c74c993e0a2aa2b3e18385fbd5df5d4012cb52b0f7167846bb92e
                                                    • Instruction ID: 8a5b62ad3b2811282b00f4aa11bc4c2c065e9b9ae855548013837f5c18493421
                                                    • Opcode Fuzzy Hash: 3849d669cc5c74c993e0a2aa2b3e18385fbd5df5d4012cb52b0f7167846bb92e
                                                    • Instruction Fuzzy Hash: 0F01C4A17087103BE321767A9CC6F6F65C8DB44358F84043BF686D63D3D96C9C41866A
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0041DE27
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041DE31
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041DE3E
                                                    • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE4D
                                                    • GetStockObject.GDI32(00000007), ref: 0041DE5B
                                                    • GetStockObject.GDI32(00000005), ref: 0041DE67
                                                    • GetStockObject.GDI32(0000000D), ref: 0041DE73
                                                    • LoadIconA.USER32(00000000,00007F00), ref: 0041DE84
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ObjectStock$CapsDeviceIconLoadRelease
                                                    • String ID:
                                                    • API String ID: 225703358-0
                                                    • Opcode ID: 93123cf7b7da28845296a778695a34f9ae7968dfa7e72d2685fd09fde09bf652
                                                    • Instruction ID: 282f56568f1177e4dad385ec7f61a974d29090d827cf1f87eb40c920fa9ca7e8
                                                    • Opcode Fuzzy Hash: 93123cf7b7da28845296a778695a34f9ae7968dfa7e72d2685fd09fde09bf652
                                                    • Instruction Fuzzy Hash: 4C1142706457015EE340BFA66E52B6A36A4D725708F40413FF609AF3D1D77A2C448B9E
                                                    APIs
                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 00463344
                                                    • SetCursor.USER32(00000000,00000000,00007F02,00000000,004633D9), ref: 0046334A
                                                    • SetCursor.USER32(?,004633C1,00007F02,00000000,004633D9), ref: 004633B4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Cursor$Load
                                                    • String ID: $ $Internal error: Item already expanding
                                                    • API String ID: 1675784387-1948079669
                                                    • Opcode ID: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
                                                    • Instruction ID: e4e85f4aa3fa623d7d3a169fbc538aa22306e9421cedfdc69a3031d12d347dae
                                                    • Opcode Fuzzy Hash: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
                                                    • Instruction Fuzzy Hash: 4CB18270604284EFDB11DF29C545B9ABBF1BF04305F1484AAE8469B792DB78EE44CB4A
                                                    APIs
                                                    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfileStringWrite
                                                    • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                    • API String ID: 390214022-3304407042
                                                    • Opcode ID: 6524e2600f73056719b6f742776d46035d79f8a5ff73170b15895403f711d1ba
                                                    • Instruction ID: 4c4b1d7f09994941c57eaafc4db68242d6a3f6c21ecd3f2b5b8f846a746055a2
                                                    • Opcode Fuzzy Hash: 6524e2600f73056719b6f742776d46035d79f8a5ff73170b15895403f711d1ba
                                                    • Instruction Fuzzy Hash: 40911434E002099BDB01EFA5D842BDEB7F5AF4874AF608466E90077392D7786E49CB58
                                                    APIs
                                                    • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476DFD
                                                    • SetWindowLongW.USER32(00000000,000000FC,00476D58), ref: 00476E24
                                                    • GetACP.KERNEL32(00000000,0047703C,?,00000000,00477066), ref: 00476E61
                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476EA7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ClassInfoLongMessageSendWindow
                                                    • String ID: COMBOBOX$Inno Setup: Language
                                                    • API String ID: 3391662889-4234151509
                                                    • Opcode ID: b79c5f29d35df44cb857ed8d09d175a6c561ef16fea31c14755826af523c90a0
                                                    • Instruction ID: 0412f7d462c55716b9fe1da93bb0ea7ea772e4a9a8c53c014367dccec02c53c9
                                                    • Opcode Fuzzy Hash: b79c5f29d35df44cb857ed8d09d175a6c561ef16fea31c14755826af523c90a0
                                                    • Instruction Fuzzy Hash: 25813C346006059FCB10DF69D985EAAB7F1FB09304F5581BAE808EB362D738AD45CB58
                                                    APIs
                                                    • GetSystemDefaultLCID.KERNEL32(00000000,00408968,?,?,?,?,00000000,00000000,00000000,?,0040996F,00000000,00409982), ref: 0040873A
                                                      • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                      • Part of subcall function 004085B4: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087B6,?,?,?,00000000,00408968), ref: 004085C7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale$DefaultSystem
                                                    • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                    • API String ID: 1044490935-665933166
                                                    • Opcode ID: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
                                                    • Instruction ID: 5c6fde8006682913ecab3173e7335377554a92ac61a87523d81808753b4ec1a9
                                                    • Opcode Fuzzy Hash: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
                                                    • Instruction Fuzzy Hash: 7D516C24B00108ABDB01FBA69E4169EB7A9DB94308F50C07FA181BB3C3CE3DDA05975D
                                                    APIs
                                                    • GetVersion.KERNEL32(00000000,004118F9), ref: 0041178C
                                                    • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041184A
                                                      • Part of subcall function 00411AAC: CreatePopupMenu.USER32 ref: 00411AC6
                                                    • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118D6
                                                      • Part of subcall function 00411AAC: CreateMenu.USER32 ref: 00411AD0
                                                    • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118BD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Menu$Insert$Create$ItemPopupVersion
                                                    • String ID: ,$?
                                                    • API String ID: 2359071979-2308483597
                                                    • Opcode ID: 0ab46ab0cc7fe058ed933c8385d76a728ca89a8f4439a32f590fae80f497a602
                                                    • Instruction ID: ecf66c9774bccec907b621c371347452b74b7622051e058d8a4a73451c3e974f
                                                    • Opcode Fuzzy Hash: 0ab46ab0cc7fe058ed933c8385d76a728ca89a8f4439a32f590fae80f497a602
                                                    • Instruction Fuzzy Hash: D7510674A00245ABDB10EF6ADC816EA7BF9AF09304B11857BF904E73A6D738DD41CB58
                                                    APIs
                                                    • GetObjectA.GDI32(?,00000018,?), ref: 0041BF28
                                                    • GetObjectA.GDI32(?,00000018,?), ref: 0041BF37
                                                    • GetBitmapBits.GDI32(?,?,?), ref: 0041BF88
                                                    • GetBitmapBits.GDI32(?,?,?), ref: 0041BF96
                                                    • DeleteObject.GDI32(?), ref: 0041BF9F
                                                    • DeleteObject.GDI32(?), ref: 0041BFA8
                                                    • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFC5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Object$BitmapBitsDelete$CreateIcon
                                                    • String ID:
                                                    • API String ID: 1030595962-0
                                                    • Opcode ID: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
                                                    • Instruction ID: 74cae3b7aa7aab4ce12a2fbd062d204c5c4082198076ec6df892ad84fd278e80
                                                    • Opcode Fuzzy Hash: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
                                                    • Instruction Fuzzy Hash: 6A510671A002199FCB10DFA9C9819EEB7F9EF48314B11416AF914E7395D738AD41CB68
                                                    APIs
                                                    • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CEFE
                                                    • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041CF1D
                                                    • SelectPalette.GDI32(?,?,00000001), ref: 0041CF83
                                                    • RealizePalette.GDI32(?), ref: 0041CF92
                                                    • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CFFC
                                                    • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D03A
                                                    • SelectPalette.GDI32(?,?,00000001), ref: 0041D05F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
                                                    • String ID:
                                                    • API String ID: 2222416421-0
                                                    • Opcode ID: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
                                                    • Instruction ID: 4b814cf558339e083a7fb5ccd56fb4ffad9fd0a27a4bfdacf16c2dd2476febac
                                                    • Opcode Fuzzy Hash: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
                                                    • Instruction Fuzzy Hash: D2515EB0604200AFDB14DFA8C985F9BBBE9EF08304F10459AB549DB292C778ED81CB58
                                                    APIs
                                                    • SendMessageA.USER32(00000000,?,?), ref: 0045732E
                                                      • Part of subcall function 0042427C: GetWindowTextA.USER32(?,?,00000100), ref: 0042429C
                                                      • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                      • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                      • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00457395
                                                    • TranslateMessage.USER32(?), ref: 004573B3
                                                    • DispatchMessageA.USER32(?), ref: 004573BC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
                                                    • String ID: [Paused]
                                                    • API String ID: 1007367021-4230553315
                                                    • Opcode ID: 53079df397450839c1be9d6f90d1eabc7e4f06b59fd13b19abbe2567fd675748
                                                    • Instruction ID: a72840e20965590be0df7748d4dcd1bfe023db3bc5775872eefead19b10ec59e
                                                    • Opcode Fuzzy Hash: 53079df397450839c1be9d6f90d1eabc7e4f06b59fd13b19abbe2567fd675748
                                                    • Instruction Fuzzy Hash: 633175319082449ADB11DBB9EC81B9E7FB8EF49314F5540B7EC00E7292D73C9909DB69
                                                    APIs
                                                    • GetCursor.USER32(00000000,0046B5B7), ref: 0046B534
                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 0046B542
                                                    • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B5B7), ref: 0046B548
                                                    • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B5B7), ref: 0046B552
                                                    • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B5B7), ref: 0046B558
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Cursor$LoadSleep
                                                    • String ID: CheckPassword
                                                    • API String ID: 4023313301-1302249611
                                                    • Opcode ID: d3a4bda224e49b7c19c6e85614fa64fc2d363bef31ec0c6cb5b6db7cbc1567a3
                                                    • Instruction ID: 73fb877c1e4dfe3485e101e0574a9cd8148d402c0bf43ecdc22ebbd1c1dc91ac
                                                    • Opcode Fuzzy Hash: d3a4bda224e49b7c19c6e85614fa64fc2d363bef31ec0c6cb5b6db7cbc1567a3
                                                    • Instruction Fuzzy Hash: 8A318234741204AFD711EB69C899FDA7BE4EF45308F5580B6B804DB3A2D778AE40CB99
                                                    APIs
                                                      • Part of subcall function 00477CE8: GetWindowThreadProcessId.USER32(00000000), ref: 00477CF0
                                                      • Part of subcall function 00477CE8: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477DE7,0049C0A8,00000000), ref: 00477D03
                                                      • Part of subcall function 00477CE8: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477D09
                                                    • SendMessageA.USER32(00000000,0000004A,00000000,0047817A), ref: 00477DF5
                                                    • GetTickCount.KERNEL32 ref: 00477E3A
                                                    • GetTickCount.KERNEL32 ref: 00477E44
                                                    • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477E99
                                                    Strings
                                                    • CallSpawnServer: Unexpected response: $%x, xrefs: 00477E2A
                                                    • CallSpawnServer: Unexpected status: %d, xrefs: 00477E82
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                    • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                    • API String ID: 613034392-3771334282
                                                    • Opcode ID: 938d03829804b4b335d5993def61d5358e979f07a3e2d71a44e1dbaa5b2b64f6
                                                    • Instruction ID: 28a3d443adb5681cbf75f787d1d4035b8c0e403bae8a56f7a3c7edfd84534579
                                                    • Opcode Fuzzy Hash: 938d03829804b4b335d5993def61d5358e979f07a3e2d71a44e1dbaa5b2b64f6
                                                    • Instruction Fuzzy Hash: 7531A234B042159BDF10EBB9C8867EE76A0AF44314F9084BBB548EB382D67C8D418B9D
                                                    APIs
                                                    • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 0045983F
                                                    Strings
                                                    • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 0045984A
                                                    • Failed to load .NET Framework DLL "%s", xrefs: 00459824
                                                    • .NET Framework CreateAssemblyCache function failed, xrefs: 00459862
                                                    • CreateAssemblyCache, xrefs: 00459836
                                                    • Fusion.dll, xrefs: 004597DF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc
                                                    • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                    • API String ID: 190572456-3990135632
                                                    • Opcode ID: 30d6eb7b5594f7be86115a47ed4d8b8074cd2571106f838d68984864f228bbb4
                                                    • Instruction ID: 9a538673283cb431493768ab67eac729fe35d93f11f945e2dcd414e2b3f175b6
                                                    • Opcode Fuzzy Hash: 30d6eb7b5594f7be86115a47ed4d8b8074cd2571106f838d68984864f228bbb4
                                                    • Instruction Fuzzy Hash: A2318B70E10649ABCB10FFA5C88169EB7B8EF45315F50857BE814E7382DB389E08C799
                                                    APIs
                                                      • Part of subcall function 0041C048: GetObjectA.GDI32(?,00000018), ref: 0041C055
                                                    • GetFocus.USER32 ref: 0041C168
                                                    • GetDC.USER32(?), ref: 0041C174
                                                    • SelectPalette.GDI32(?,?,00000000), ref: 0041C195
                                                    • RealizePalette.GDI32(?), ref: 0041C1A1
                                                    • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1B8
                                                    • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C1E0
                                                    • ReleaseDC.USER32(?,?), ref: 0041C1ED
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Palette$Select$BitsFocusObjectRealizeRelease
                                                    • String ID:
                                                    • API String ID: 3303097818-0
                                                    • Opcode ID: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
                                                    • Instruction ID: 25a0b6576c779426e59073023ceed4ef49f3845c1b310514cd4f08ef327de147
                                                    • Opcode Fuzzy Hash: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
                                                    • Instruction Fuzzy Hash: 49116D71A44604BFDF10DBE9CC81FAFB7FCEB48700F50486AB518E7281DA7899008B28
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000E), ref: 00418C70
                                                    • GetSystemMetrics.USER32(0000000D), ref: 00418C78
                                                    • 6F552980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C7E
                                                      • Part of subcall function 004107F8: 6F54C400.COMCTL32(0049B628,000000FF,00000000,00418CAC,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004107FC
                                                    • 6F5BCB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CCE
                                                    • 6F5BC740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CD9
                                                    • 6F5BCB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000), ref: 00418CEC
                                                    • 6F550860.COMCTL32(0049B628,00418D0F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E), ref: 00418D02
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$C400C740F550860F552980
                                                    • String ID:
                                                    • API String ID: 1828538299-0
                                                    • Opcode ID: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
                                                    • Instruction ID: f48c8f8e6a400555c090207229051c9eae11b8a9b20c4da93df477ea8fa1a9e8
                                                    • Opcode Fuzzy Hash: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
                                                    • Instruction Fuzzy Hash: 6B112475744204BBDB50EBA9EC82FAD73F8DB08704F504066B514EB2C1DAB9AD808759
                                                    APIs
                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00483E78), ref: 00483E5D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                    • API String ID: 47109696-2530820420
                                                    • Opcode ID: 580b6ebcc282feda728e66f4744ee476028ae89e3e5c4c31016e31958fd9d5bd
                                                    • Instruction ID: 25921c403f2b5f567fb5f4f3c7af55a601c8772c13db7d52183c2381382c2629
                                                    • Opcode Fuzzy Hash: 580b6ebcc282feda728e66f4744ee476028ae89e3e5c4c31016e31958fd9d5bd
                                                    • Instruction Fuzzy Hash: 18118B30704244AADB10FF66D852BBF7BA8DB55B05F614877A800E7282E738DE06875C
                                                    APIs
                                                    • SelectObject.GDI32(00000000,?), ref: 0041B470
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B47F
                                                    • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B4C7
                                                    • DeleteDC.GDI32(00000000), ref: 0041B4D0
                                                    • DeleteDC.GDI32(?), ref: 0041B4D9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ObjectSelect$Delete$Stretch
                                                    • String ID:
                                                    • API String ID: 1458357782-0
                                                    • Opcode ID: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                    • Instruction ID: 052e9154069abc57648b404522aaf552eddfcc6d95cd3388d63b7ef9ce004286
                                                    • Opcode Fuzzy Hash: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                    • Instruction Fuzzy Hash: 7B115C72E40619ABDB10DAD9DC86FEFB7BCEF08704F144555B614F7282C678AC418BA8
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0049566D
                                                      • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                    • SelectObject.GDI32(00000000,00000000), ref: 0049568F
                                                    • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495C0D), ref: 004956A3
                                                    • GetTextMetricsA.GDI32(00000000,?), ref: 004956C5
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 004956E2
                                                    Strings
                                                    • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 0049569A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
                                                    • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                    • API String ID: 2948443157-222967699
                                                    • Opcode ID: 6193ea116cced1d0ddecebe1ebaa873db022b6c64879767ff21dedb844ea8b8c
                                                    • Instruction ID: aa45ef3a08b9b1b3d6db281b41741beecd98e5659053a5c9a55995a42d862fa4
                                                    • Opcode Fuzzy Hash: 6193ea116cced1d0ddecebe1ebaa873db022b6c64879767ff21dedb844ea8b8c
                                                    • Instruction Fuzzy Hash: DF01C476A04704BFDB01DBA9CC45E5EB7ECDB08700F600476F604E3280D678AE108B28
                                                    APIs
                                                    • GetCursorPos.USER32 ref: 004233AF
                                                    • WindowFromPoint.USER32(?,?), ref: 004233BC
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233CA
                                                    • GetCurrentThreadId.KERNEL32 ref: 004233D1
                                                    • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233EA
                                                    • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423401
                                                    • SetCursor.USER32(00000000), ref: 00423413
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                    • String ID:
                                                    • API String ID: 1770779139-0
                                                    • Opcode ID: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                    • Instruction ID: 22bb490dc700fc35bbf8fe9eba0271ced42fa0644d0760cf779c582944844a3d
                                                    • Opcode Fuzzy Hash: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                    • Instruction Fuzzy Hash: BA01D4223046103AD6217B755D82E2F26E8DB85B15F50407FF504BB283DA3D9D11937D
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 00495490
                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 0049549D
                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 004954AA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule
                                                    • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                    • API String ID: 667068680-2254406584
                                                    • Opcode ID: 1f09ea86fa9f1161c7bb6facee3a330abbae00fa7718bfc66bdeed5218745655
                                                    • Instruction ID: b7d09f1d66b2cebba25e8f78ccdc85d8b1554d01ca73cca348f52a405d9fcbb0
                                                    • Opcode Fuzzy Hash: 1f09ea86fa9f1161c7bb6facee3a330abbae00fa7718bfc66bdeed5218745655
                                                    • Instruction Fuzzy Hash: B6F0C292641F1526DA61256A0C41B7F7DCCCB81771F350037BD04A6282E9689C5087ED
                                                    APIs
                                                    • GetProcAddress.KERNEL32(02400000,BZ2_bzDecompressInit), ref: 0045D691
                                                    • GetProcAddress.KERNEL32(02400000,BZ2_bzDecompress), ref: 0045D6A1
                                                    • GetProcAddress.KERNEL32(02400000,BZ2_bzDecompressEnd), ref: 0045D6B1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc
                                                    • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                    • API String ID: 190572456-212574377
                                                    • Opcode ID: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
                                                    • Instruction ID: 26f5c6c79611f6cc0facecefa5b4932716cc5d8e9f8ea2477ead0514974f6e87
                                                    • Opcode Fuzzy Hash: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
                                                    • Instruction Fuzzy Hash: 0EF01DB0D00705DFD724EFB6ACC672736D5AB6831AF50813B990E95262D778045ACF2C
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,0048141C), ref: 0042EA35
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA3B
                                                    • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA4C
                                                      • Part of subcall function 0042E9AC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
                                                      • Part of subcall function 0042E9AC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
                                                      • Part of subcall function 0042E9AC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
                                                    • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA60
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                    • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                    • API String ID: 142928637-2676053874
                                                    • Opcode ID: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
                                                    • Instruction ID: 20967f7a279d57b19857f2ad39d34e10c6be6de8430a8d3efc5b40b14e24a4c3
                                                    • Opcode Fuzzy Hash: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
                                                    • Instruction Fuzzy Hash: 99E092A1741B20EAEA10B7B67C86FAA2658EB1076DF500037F100A51F1C3BD1C80CE9E
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F089), ref: 0044C7EB
                                                    • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C7FC
                                                    • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C80C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                    • API String ID: 2238633743-1050967733
                                                    • Opcode ID: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
                                                    • Instruction ID: d6497c9818d993b67a5702c7731996643d684f189bbd4b702b1f6e54e13363b7
                                                    • Opcode Fuzzy Hash: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
                                                    • Instruction Fuzzy Hash: 50F0DA70282305CAE750BBB5FDD57263694E3A470AF18277BE841551A2C7B94844CB8C
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498D78), ref: 00478D7A
                                                    • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478D87
                                                    • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478D97
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule
                                                    • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                    • API String ID: 667068680-222143506
                                                    • Opcode ID: 38e5a7150ec03c6d9b7b5e0811c14b529cbe67c52f639ab39c7042ff428b1b8a
                                                    • Instruction ID: 629efeff2940ecd2eda783961154afe4f10d194e4720689bf605bb13d0e90904
                                                    • Opcode Fuzzy Hash: 38e5a7150ec03c6d9b7b5e0811c14b529cbe67c52f639ab39c7042ff428b1b8a
                                                    • Instruction Fuzzy Hash: B1C0C9F02C0701EE9650B7B15CCAD7A2948C960728320803FB449A61C2D97C0C104F2D
                                                    APIs
                                                    • GetFocus.USER32 ref: 0041B57E
                                                    • GetDC.USER32(?), ref: 0041B58A
                                                    • GetDeviceCaps.GDI32(?,00000068), ref: 0041B5A6
                                                    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5C3
                                                    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5DA
                                                    • ReleaseDC.USER32(?,?), ref: 0041B626
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
                                                    • String ID:
                                                    • API String ID: 2502006586-0
                                                    • Opcode ID: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
                                                    • Instruction ID: 1753bd22f5710d4f749a3cf2d8329d0f84e6490acb09e3fae29671003709e3a5
                                                    • Opcode Fuzzy Hash: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
                                                    • Instruction Fuzzy Hash: D0410631A04258AFDF10DFA9C885AAFBBB4EF59704F1484AAF500EB351D3389D51CBA5
                                                    APIs
                                                    • SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
                                                    • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D184,?,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0F6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                    • API String ID: 1452528299-1580325520
                                                    • Opcode ID: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
                                                    • Instruction ID: 81e1e27ad3ae8d1ea1d6b81b4c13ff0be47bc54c17845d393ef4ad8e2f10c1e8
                                                    • Opcode Fuzzy Hash: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
                                                    • Instruction Fuzzy Hash: 2C117535A04608AFD731DA91C942B9EB6ADDF4470AF6040776D00572C3D67C5F0B992E
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000B), ref: 0041BDD5
                                                    • GetSystemMetrics.USER32(0000000C), ref: 0041BDDF
                                                    • GetDC.USER32(00000000), ref: 0041BDE9
                                                    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041BE10
                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041BE1D
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041BE56
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CapsDeviceMetricsSystem$Release
                                                    • String ID:
                                                    • API String ID: 447804332-0
                                                    • Opcode ID: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
                                                    • Instruction ID: d5b995c8e3894394b735eabd433659eae54025482fea58e306a85006fdca5b97
                                                    • Opcode Fuzzy Hash: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
                                                    • Instruction Fuzzy Hash: E5212A74E04648AFEB00EFA9C941BEEB7B4EB48714F10846AF514B7690D7785940CB69
                                                    APIs
                                                    • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                                                    • LocalFree.KERNEL32(0084E4E0,00000000,00401B68), ref: 00401ACF
                                                    • VirtualFree.KERNEL32(?,00000000,00008000,0084E4E0,00000000,00401B68), ref: 00401AEE
                                                    • LocalFree.KERNEL32(0084F4E0,?,00000000,00008000,0084E4E0,00000000,00401B68), ref: 00401B2D
                                                    • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                                                    • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                    • String ID:
                                                    • API String ID: 3782394904-0
                                                    • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                    • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                                                    • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                    • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                                                    APIs
                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0047E8BA
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CDA1), ref: 0047E8E0
                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0047E8F0
                                                    • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E911
                                                    • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E925
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E941
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$Show
                                                    • String ID:
                                                    • API String ID: 3609083571-0
                                                    • Opcode ID: 77e6a2adad21d98839384031fe55f8444971447d2e808788bc8698eaef74262f
                                                    • Instruction ID: a2b7b733205f1e44b1ee07f0e12066402cabc9af87ff61d57cc470ab2f400ee5
                                                    • Opcode Fuzzy Hash: 77e6a2adad21d98839384031fe55f8444971447d2e808788bc8698eaef74262f
                                                    • Instruction Fuzzy Hash: DF012DF2641210ABE610D769DE85F2237D8AB0D360F0906A6B644DF2E3C738E8408A49
                                                    APIs
                                                      • Part of subcall function 0041A6E0: CreateBrushIndirect.GDI32 ref: 0041A74B
                                                    • UnrealizeObject.GDI32(00000000), ref: 0041B27C
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B28E
                                                    • SetBkColor.GDI32(?,00000000), ref: 0041B2B1
                                                    • SetBkMode.GDI32(?,00000002), ref: 0041B2BC
                                                    • SetBkColor.GDI32(?,00000000), ref: 0041B2D7
                                                    • SetBkMode.GDI32(?,00000001), ref: 0041B2E2
                                                      • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                    • String ID:
                                                    • API String ID: 3527656728-0
                                                    • Opcode ID: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                    • Instruction ID: d03b18a2b949c207061bd18b8e5d47ed8ce294e6be165222704fda36eef26a4f
                                                    • Opcode Fuzzy Hash: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                    • Instruction Fuzzy Hash: 56F0CD756015009BDE00FFAAD9CBE4B3B989F043097048496B908DF187CA3CD8649B3A
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,uoI,_iu,?,00000000,004539F6), ref: 004539AB
                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,uoI,_iu,?,00000000,004539F6), ref: 004539BB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateFileHandle
                                                    • String ID: .tmp$_iu$uoI
                                                    • API String ID: 3498533004-921926588
                                                    • Opcode ID: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
                                                    • Instruction ID: 7da7e9bbb2667b7856572ae533a3071efe8e017fb0344d9459fa270775feb22d
                                                    • Opcode Fuzzy Hash: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
                                                    • Instruction Fuzzy Hash: 1831C5B0A00249ABCB11EF95D842B9EBBB4AF44345F20453AF810B73C2D7785F058B69
                                                    APIs
                                                      • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                    • ShowWindow.USER32(?,00000005,00000000,00498115,?,?,00000000), ref: 00497EE6
                                                      • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                      • Part of subcall function 004072A8: SetCurrentDirectoryA.KERNEL32(00000000,?,00497F0E,00000000,004980E1,?,?,00000005,00000000,00498115,?,?,00000000), ref: 004072B3
                                                      • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                    • String ID: .dat$.msg$IMsg$Uninstall
                                                    • API String ID: 3312786188-1660910688
                                                    • Opcode ID: 1c11d0ae27487594f38b9cd21c2d985737f1e6e162c6aba1f214a076d538747b
                                                    • Instruction ID: 4af9ec424ffd7bb028b399940d064470676df1dbf9fc20c07eaa3e8db441866f
                                                    • Opcode Fuzzy Hash: 1c11d0ae27487594f38b9cd21c2d985737f1e6e162c6aba1f214a076d538747b
                                                    • Instruction Fuzzy Hash: 0A313034A00114AFCB00EF65DD9295E7BB5EF45318B51857AF400A7396DB38BD058B68
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EADA
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAE0
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB09
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressByteCharHandleModuleMultiProcWide
                                                    • String ID: ShutdownBlockReasonCreate$user32.dll
                                                    • API String ID: 828529508-2866557904
                                                    • Opcode ID: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
                                                    • Instruction ID: 7e091cf0cf0c4dae12ae48626bdfb721f4796128e550bb25d34418d77cfbcdd5
                                                    • Opcode Fuzzy Hash: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
                                                    • Instruction Fuzzy Hash: 70F0C8D034061136E620B57F5C82F7B598C8F94759F140436B109E62C2D96CA905426E
                                                    APIs
                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00458028
                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00458049
                                                    • CloseHandle.KERNEL32(?,0045807C), ref: 0045806F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                    • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                    • API String ID: 2573145106-3235461205
                                                    • Opcode ID: f4b7924840392a1c056809c60f673386a353f05297e24ea8de8fb179b7d06f04
                                                    • Instruction ID: 2f0632834368beac7d1c7250186d6a5b4d0e74160b608b18ba1b2b0c741dc3d5
                                                    • Opcode Fuzzy Hash: f4b7924840392a1c056809c60f673386a353f05297e24ea8de8fb179b7d06f04
                                                    • Instruction Fuzzy Hash: 8101A231600204AFD710EBA98C02A5A73A8EB49B25F51407BFC10E73D3DE399E08965D
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
                                                    • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressExchangeHandleInterlockedModuleProc
                                                    • String ID: ChangeWindowMessageFilter$user32.dll
                                                    • API String ID: 3478007392-2498399450
                                                    • Opcode ID: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
                                                    • Instruction ID: c922fa4e85abb1c6873f36dcd01b6443d81c66d6c3501223796626af46e79b09
                                                    • Opcode Fuzzy Hash: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
                                                    • Instruction Fuzzy Hash: 5CE0ECB2740324EADA103B627E8AF663558E724B19F50043BF001751F1C7FD1C80CA9E
                                                    APIs
                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 00477CF0
                                                    • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477DE7,0049C0A8,00000000), ref: 00477D03
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477D09
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProcProcessThreadWindow
                                                    • String ID: AllowSetForegroundWindow$user32.dll
                                                    • API String ID: 1782028327-3855017861
                                                    • Opcode ID: f9be9efaead6c2fbd8908541d11dbdf556349f0c700595575b991620a4140b68
                                                    • Instruction ID: f0440eada8c732a727bde105613721c80d17da46f8d6a443c7132e17ed4762d5
                                                    • Opcode Fuzzy Hash: f9be9efaead6c2fbd8908541d11dbdf556349f0c700595575b991620a4140b68
                                                    • Instruction Fuzzy Hash: 4BD09E90248702A9D920B2F54D46EBF225C8D947647A1883B7448E218ADA7CDC008A79
                                                    APIs
                                                    • BeginPaint.USER32(00000000,?), ref: 00416C52
                                                    • SaveDC.GDI32(?), ref: 00416C83
                                                    • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D45), ref: 00416CE4
                                                    • RestoreDC.GDI32(?,?), ref: 00416D0B
                                                    • EndPaint.USER32(00000000,?,00416D4C,00000000,00416D45), ref: 00416D3F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                    • String ID:
                                                    • API String ID: 3808407030-0
                                                    • Opcode ID: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
                                                    • Instruction ID: 8164e3b37c2b38cc39b91ef4074089abf19b8963c3e0e5cbd12a4ce3d65b1abe
                                                    • Opcode Fuzzy Hash: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
                                                    • Instruction Fuzzy Hash: A1415070A002049FCB14DBA9C585FAA77F9FF48304F1540AEE8459B362D778DD81CB58
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
                                                    • Instruction ID: a833d86c80f2fb81cba799e3b93fc1891ddf3ebdd98a67124a25423b7ab76754
                                                    • Opcode Fuzzy Hash: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
                                                    • Instruction Fuzzy Hash: 563132746057809FC320EF69C984B9BB7E8AF89354F04491EF9D5C3752C638E8818F19
                                                    APIs
                                                    • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429808
                                                    • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429837
                                                    • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429853
                                                    • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042987E
                                                    • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 0042989C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
                                                    • Instruction ID: 8b65b0e689063cc909dba6714575951256d1ad54ff8cece17fd29570ea6901c2
                                                    • Opcode Fuzzy Hash: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
                                                    • Instruction Fuzzy Hash: 6E219D707107057BEB10AB62DC82F5B7AECAB41708F54443EB501AB2D2DFB8AE418228
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000B), ref: 0041BBCA
                                                    • GetSystemMetrics.USER32(0000000C), ref: 0041BBD4
                                                    • GetDC.USER32(00000000), ref: 0041BC12
                                                    • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC59
                                                    • DeleteObject.GDI32(00000000), ref: 0041BC9A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$BitmapCreateDeleteObject
                                                    • String ID:
                                                    • API String ID: 1095203571-0
                                                    • Opcode ID: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
                                                    • Instruction ID: 2a907a32995036c4e239f44386a828d3a2f1e7d44945ead90e55d18394f4d4ff
                                                    • Opcode Fuzzy Hash: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
                                                    • Instruction Fuzzy Hash: 5D315C70E00208EFDB04DFA5C941AAEB7F5EB48700F2084AAF514AB781D7789E40DB98
                                                    APIs
                                                      • Part of subcall function 0045D04C: SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00473800,?,?,0049C1E0,00000000), ref: 004737B9
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00473800,?,?,0049C1E0,00000000), ref: 004737CF
                                                    Strings
                                                    • Setting permissions on registry key: %s\%s, xrefs: 0047377E
                                                    • Could not set permissions on the registry key because it currently does not exist., xrefs: 004737C3
                                                    • Failed to set permissions on registry key (%d)., xrefs: 004737E0
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                    • API String ID: 1452528299-4018462623
                                                    • Opcode ID: 624eadda418fdc7cffc746c18dc7d5f130c4742f62c33cd43457c6f9331317cf
                                                    • Instruction ID: d878fdb5017a08c6729d904a96a1fe29390a0c9eb8edb650a20b90f40e03c0be
                                                    • Opcode Fuzzy Hash: 624eadda418fdc7cffc746c18dc7d5f130c4742f62c33cd43457c6f9331317cf
                                                    • Instruction Fuzzy Hash: FE21B6B0A042045BCB04EFAAC8426EEBBE4DF49315F50857AF408E7392D7785E0587AE
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                    • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                    • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$AllocString
                                                    • String ID:
                                                    • API String ID: 262959230-0
                                                    • Opcode ID: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
                                                    • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                    • Opcode Fuzzy Hash: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
                                                    • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                    APIs
                                                    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 00414419
                                                    • RealizePalette.GDI32(00000000), ref: 00414421
                                                    • SelectPalette.GDI32(00000000,00000000,00000001), ref: 00414435
                                                    • RealizePalette.GDI32(00000000), ref: 0041443B
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00414446
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Palette$RealizeSelect$Release
                                                    • String ID:
                                                    • API String ID: 2261976640-0
                                                    • Opcode ID: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
                                                    • Instruction ID: 3cc421e061c7a323c9855e33cbe13bf4890882f9e8533d15179bd5f7679f66d2
                                                    • Opcode Fuzzy Hash: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
                                                    • Instruction Fuzzy Hash: A2018F7520C3806AE600A63D8C85A9F6BED9FCA718F15446EF495DB282DA7AC8018765
                                                    APIs
                                                      • Part of subcall function 0041F074: GetActiveWindow.USER32 ref: 0041F077
                                                      • Part of subcall function 0041F074: GetCurrentThreadId.KERNEL32 ref: 0041F08C
                                                      • Part of subcall function 0041F074: EnumThreadWindows.USER32(00000000,Function_0001F050), ref: 0041F092
                                                      • Part of subcall function 004231A8: GetSystemMetrics.USER32(00000000), ref: 004231AA
                                                    • OffsetRect.USER32(?,?,?), ref: 00424DC9
                                                    • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424E8C
                                                    • OffsetRect.USER32(?,?,?), ref: 00424E9D
                                                      • Part of subcall function 00423564: GetCurrentThreadId.KERNEL32 ref: 00423579
                                                      • Part of subcall function 00423564: SetWindowsHookExA.USER32(00000003,00423520,00000000,00000000), ref: 00423589
                                                      • Part of subcall function 00423564: CreateThread.KERNEL32(00000000,000003E8,004234D0,00000000,00000000), ref: 004235AD
                                                      • Part of subcall function 00424B2C: SetTimer.USER32(00000000,00000001,?,004234B4), ref: 00424B47
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Thread$CurrentOffsetRectWindows$ActiveCreateDrawEnumHookMetricsSystemTextTimerWindow
                                                    • String ID: vLB
                                                    • API String ID: 1477829881-1797516613
                                                    • Opcode ID: f60c0db94f79c6435689c3be0ec5c51bd4171bba0cd3912559ff41693b1fd493
                                                    • Instruction ID: 1a85cd152e58b5c2614c87f396891e2b5808bef0cf689969089b0637ec596c27
                                                    • Opcode Fuzzy Hash: f60c0db94f79c6435689c3be0ec5c51bd4171bba0cd3912559ff41693b1fd493
                                                    • Instruction Fuzzy Hash: C5812675A003188FCB14DFA8D880ADEBBF4FF88314F50416AE905AB296E738AD45CF44
                                                    APIs
                                                    • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407003
                                                    • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040707D
                                                    • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070D5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Enum$NameOpenResourceUniversal
                                                    • String ID: Z
                                                    • API String ID: 3604996873-1505515367
                                                    • Opcode ID: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
                                                    • Instruction ID: 78f4b6eea80f90a9c0d6dbacb1000d6f5057f9b0a0312f2c839bfa0eabc808a5
                                                    • Opcode Fuzzy Hash: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
                                                    • Instruction Fuzzy Hash: 14516470E04208AFDB11DF95C951AAFBBB9EF09304F1045BAE500BB3D1D778AE458B5A
                                                    APIs
                                                    • SetRectEmpty.USER32(?), ref: 0044D04E
                                                    • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D079
                                                    • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D101
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: DrawText$EmptyRect
                                                    • String ID:
                                                    • API String ID: 182455014-2867612384
                                                    • Opcode ID: db68161afd5408c1654aba573c24ce19d8cbe725abe67675f0ae0ab7d5240f47
                                                    • Instruction ID: ac611c4ae9e9b4e435f74cd3b872a097dcdbbef8ea8fa2dc8c743a2ef399c877
                                                    • Opcode Fuzzy Hash: db68161afd5408c1654aba573c24ce19d8cbe725abe67675f0ae0ab7d5240f47
                                                    • Instruction Fuzzy Hash: 18517171E00248AFDB11DFA5C885BDEBBF8BF48308F18447AE845EB252D7789945CB64
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0042EF9E
                                                      • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                    • SelectObject.GDI32(?,00000000), ref: 0042EFC1
                                                    • ReleaseDC.USER32(00000000,?), ref: 0042F0A0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateFontIndirectObjectReleaseSelect
                                                    • String ID: ...\
                                                    • API String ID: 3133960002-983595016
                                                    • Opcode ID: d60d3d61fda1cfccc6004d571d4f03e95d236a90023185ba22a27d4902aa0075
                                                    • Instruction ID: de545d42c11d103cbad381cc3223c2b5efa9fdb4a6e9ae4bb0445229962d8c70
                                                    • Opcode Fuzzy Hash: d60d3d61fda1cfccc6004d571d4f03e95d236a90023185ba22a27d4902aa0075
                                                    • Instruction Fuzzy Hash: 5A316370B00128AFDB11EB96D841BAEB7F8EB09348F90447BE410A7392D7785E49CA59
                                                    APIs
                                                    • GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
                                                    • UnregisterClassA.USER32(?,00400000), ref: 004164AB
                                                    • RegisterClassA.USER32(?), ref: 004164CE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Class$InfoRegisterUnregister
                                                    • String ID: @
                                                    • API String ID: 3749476976-2766056989
                                                    • Opcode ID: 32c7bff64fe8078beb5c73cee1a3f36bf3645a98757bc26b4be27a2261280048
                                                    • Instruction ID: c77080f262680b7bd3c4c6a37e0a11d074b1995aa9dd52ebf92fb76dd285a693
                                                    • Opcode Fuzzy Hash: 32c7bff64fe8078beb5c73cee1a3f36bf3645a98757bc26b4be27a2261280048
                                                    • Instruction Fuzzy Hash: B8316D702042409BD720EF69C981B9B77E5AB89308F04457FF949DB392DB39DD44CB6A
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00498CB4,00000000,0049845A,?,?,00000000,0049B628), ref: 004983D4
                                                    • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498CB4,00000000,0049845A,?,?,00000000,0049B628), ref: 004983FD
                                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00498416
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: File$Attributes$Move
                                                    • String ID: isRS-%.3u.tmp
                                                    • API String ID: 3839737484-3657609586
                                                    • Opcode ID: ae818b9b44497de6b1bc8be15d0cd9039968b1ae4d5861c90f185070e17a1e16
                                                    • Instruction ID: a059824fbc9249a9060551c16e124b50a911f3483d94646a6204680355f36541
                                                    • Opcode Fuzzy Hash: ae818b9b44497de6b1bc8be15d0cd9039968b1ae4d5861c90f185070e17a1e16
                                                    • Instruction Fuzzy Hash: 52215271E04219AFCF01DFA9C8819AFBBB8EF45314F51453FB414B72D1DA385E018A59
                                                    APIs
                                                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                    • ExitProcess.KERNEL32 ref: 00404E0D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ExitMessageProcess
                                                    • String ID: Error$Runtime error at 00000000
                                                    • API String ID: 1220098344-2970929446
                                                    • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                    • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                                                    • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                    • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                                                    APIs
                                                      • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                      • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                      • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                    • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456C50
                                                    • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456C7D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                    • String ID: LoadTypeLib$RegisterTypeLib
                                                    • API String ID: 1312246647-2435364021
                                                    • Opcode ID: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
                                                    • Instruction ID: 3ed1135b8019c5f4588910a0035f5c9e1cabb82a18fedb82429c118dce795412
                                                    • Opcode Fuzzy Hash: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
                                                    • Instruction Fuzzy Hash: 2911B430B00604AFDB02EFA6CD51A5EB7BDEB89705F5184B6FC44D3752DA389904CA24
                                                    APIs
                                                    • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 0045716E
                                                    • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 0045720B
                                                    Strings
                                                    • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 0045719A
                                                    • Failed to create DebugClientWnd, xrefs: 004571D4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                    • API String ID: 3850602802-3720027226
                                                    • Opcode ID: fc6fb7872fb3d8ab83dfebd9de70012b153cb3911e0f3b29455ddd2ada20f49f
                                                    • Instruction ID: 232a6e2857eacf703fa66588ab1bc34ed17cd0eb6a8f8a523432cade59eaaa7b
                                                    • Opcode Fuzzy Hash: fc6fb7872fb3d8ab83dfebd9de70012b153cb3911e0f3b29455ddd2ada20f49f
                                                    • Instruction Fuzzy Hash: 8611E770248250AFD710AB68AC85B5FBBD49B54319F15407AFE849F383D7798C18C7AE
                                                    APIs
                                                      • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                    • GetFocus.USER32 ref: 004788AB
                                                    • GetKeyState.USER32(0000007A), ref: 004788BD
                                                    • WaitMessage.USER32(?,00000000,004788E4,?,00000000,0047890B,?,?,00000001,00000000,?,?,?,00480556,00000000,0048141C), ref: 004788C7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FocusMessageStateTextWaitWindow
                                                    • String ID: Wnd=$%x
                                                    • API String ID: 1381870634-2927251529
                                                    • Opcode ID: ecab7a4e4ee1d52cc5458a1f4190fbeb54aa9787c1af12207c1503c8785d61f1
                                                    • Instruction ID: 7602fbdde3feda049942b6d856a81d0b7a4c4c0c2e506da53dc8d66baae0c1c2
                                                    • Opcode Fuzzy Hash: ecab7a4e4ee1d52cc5458a1f4190fbeb54aa9787c1af12207c1503c8785d61f1
                                                    • Instruction Fuzzy Hash: 6B11EB70A40645AFC700FF75DC459AE77F8EB48304B9284BFF408E7280DB386900CA6A
                                                    APIs
                                                    • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E768
                                                    • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E777
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Time$File$LocalSystem
                                                    • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                    • API String ID: 1748579591-1013271723
                                                    • Opcode ID: b5a965d629e679462cee1fe0d12d3cfb9bd2af2622692aeb463d283e3c1ff69e
                                                    • Instruction ID: d6c712b8a1c8fe7cad0a5a3f3eb7758ab27952dbda4e85a7147eb7d881f6fbea
                                                    • Opcode Fuzzy Hash: b5a965d629e679462cee1fe0d12d3cfb9bd2af2622692aeb463d283e3c1ff69e
                                                    • Instruction Fuzzy Hash: 25113AA440C3919ED300DF2AC04432BBAE4ABD9704F04892EF8C8C6381E779C848DB77
                                                    APIs
                                                    • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F83
                                                      • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,00498845,00000000,0049889A,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 00453FA8
                                                      • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004984F9,00000000), ref: 0045349F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: File$AttributesDeleteErrorLastMove
                                                    • String ID: DeleteFile$MoveFile
                                                    • API String ID: 3024442154-139070271
                                                    • Opcode ID: ec873e7ff72dae555d3190a6b892f6e399c1e5fd19ebf83f3592a013235906e0
                                                    • Instruction ID: b5871bee3d194af1fa843ac656f6d820fc0ba16d57580c91db5694710367c43f
                                                    • Opcode Fuzzy Hash: ec873e7ff72dae555d3190a6b892f6e399c1e5fd19ebf83f3592a013235906e0
                                                    • Instruction Fuzzy Hash: AEF062716142045BD701FBA2D84266EA7ECDB8435EF60443BB900BB6C3DA3C9E094529
                                                    APIs
                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                    • API String ID: 47109696-2631785700
                                                    • Opcode ID: 4e861220b475c878ff727a824721439133a631de87b618ea7b4611a6d191cb9d
                                                    • Instruction ID: 1950c6f853cc10ed35e504d9d8503a730f6ffd27dc9bba4e9fa27fab35675349
                                                    • Opcode Fuzzy Hash: 4e861220b475c878ff727a824721439133a631de87b618ea7b4611a6d191cb9d
                                                    • Instruction Fuzzy Hash: 12F0AF31300110DBCB10EB9AD885B6F6299DB9931AF50503BF981DB293E73CCC168629
                                                    APIs
                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483D59
                                                    • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483D7C
                                                    Strings
                                                    • System\CurrentControlSet\Control\Windows, xrefs: 00483D26
                                                    • CSDVersion, xrefs: 00483D50
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseOpenQueryValue
                                                    • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                    • API String ID: 3677997916-1910633163
                                                    • Opcode ID: 12a26ccb63bcfc9289d36b00324cbf667c9b0308b1544d38002d5f6d22e14824
                                                    • Instruction ID: d6021fe1b3f5c2f253c74081020f26ee341d0c01eb1a087a604f31c061d7dc03
                                                    • Opcode Fuzzy Hash: 12a26ccb63bcfc9289d36b00324cbf667c9b0308b1544d38002d5f6d22e14824
                                                    • Instruction Fuzzy Hash: D0F01D75A40209B6DF10EAD0CC46BAFB3BCAB14B05F104966E910E7281E778AB049B59
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                    • API String ID: 1646373207-4063490227
                                                    • Opcode ID: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
                                                    • Instruction ID: 657275fb9dfacbe144619f02b172540cf2f0c5a6f4252bec6bd03a25d2dd35a2
                                                    • Opcode Fuzzy Hash: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
                                                    • Instruction Fuzzy Hash: A5E0DFE0B40B0122D70032BA1C82B6B108D4B84728F90053B3894E62D6DDBCD9840A6D
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAD0), ref: 0042EB62
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB68
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                    • API String ID: 1646373207-260599015
                                                    • Opcode ID: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
                                                    • Instruction ID: e1ec077e445c8734ae54db5ffdd633522f5c412f0b7fee52e54de0d29bb4c321
                                                    • Opcode Fuzzy Hash: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
                                                    • Instruction Fuzzy Hash: A2D0C793311732665D10B1F73CD1EAB058C891527935404B7F515E5641D55DEC1115AD
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498D46), ref: 0044F77F
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: NotifyWinEvent$user32.dll
                                                    • API String ID: 1646373207-597752486
                                                    • Opcode ID: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
                                                    • Instruction ID: 5e946f17392c81a4f172a46fe169fb9a1f72c9003761a5edf28bd31acc2f1150
                                                    • Opcode Fuzzy Hash: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
                                                    • Instruction Fuzzy Hash: 59E012F0E417049AFF00BBB57B86B1A3A90E764719B00057FF414A6292DB7C481C4F9D
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498D9C,00000001,00000000,00498DC0), ref: 00498AC6
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498ACC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: DisableProcessWindowsGhosting$user32.dll
                                                    • API String ID: 1646373207-834958232
                                                    • Opcode ID: 4a0b01289633be40f34e048a77cc5d2291091933ee720fcd0b60eff8e8834b57
                                                    • Instruction ID: 0173489568db28fab32324b6380fe6ca455c07e5d0351f19105cd1af989eef12
                                                    • Opcode Fuzzy Hash: 4a0b01289633be40f34e048a77cc5d2291091933ee720fcd0b60eff8e8834b57
                                                    • Instruction Fuzzy Hash: 36B00280681701549D1472BA0D06B1B18488892779714047F3515F55C6DDFC8D545A3D
                                                    APIs
                                                      • Part of subcall function 0044B658: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498D46), ref: 0044B67F
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
                                                    • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498D6E), ref: 00464603
                                                    • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: SHPathPrepareForWriteA$shell32.dll
                                                    • API String ID: 2238633743-2683653824
                                                    • Opcode ID: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
                                                    • Instruction ID: ed4894befccbfeda2ad80f7d1b9e1cb4df1a551eae9986247d0c145e26b1cd95
                                                    • Opcode Fuzzy Hash: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
                                                    • Instruction Fuzzy Hash: DDB092D0A82740A4C90077F2985B90F2A4488A271EB10153B710476483EABC84100EAE
                                                    APIs
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D944,?,?,?,?,00000000,0047DA99,?,?,?,00000000,?,0047DBA8), ref: 0047D920
                                                    • FindClose.KERNEL32(000000FF,0047D94B,0047D944,?,?,?,?,00000000,0047DA99,?,?,?,00000000,?,0047DBA8,00000000), ref: 0047D93E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Find$CloseFileNext
                                                    • String ID:
                                                    • API String ID: 2066263336-0
                                                    • Opcode ID: 63fb31312818f8c95b0bdd19d6b3fed535286156fc4f9f49cc5d5a6cf26a791e
                                                    • Instruction ID: c8df52d1e8f73b1a5b8a98970802db1a55b0fe89a75d723b77f3b2da40dba5b8
                                                    • Opcode Fuzzy Hash: 63fb31312818f8c95b0bdd19d6b3fed535286156fc4f9f49cc5d5a6cf26a791e
                                                    • Instruction Fuzzy Hash: 3A813B70D0424DAFCB11EFA5CC41ADFBBB9EF49304F4080AAE808A7291D6399B46CF55
                                                    APIs
                                                      • Part of subcall function 0042EE30: GetTickCount.KERNEL32 ref: 0042EE36
                                                      • Part of subcall function 0042EC88: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECBD
                                                    • GetLastError.KERNEL32(00000000,00475875,?,?,0049C1E0,00000000), ref: 0047575E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CountErrorFileLastMoveTick
                                                    • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                    • API String ID: 2406187244-2685451598
                                                    • Opcode ID: 585f588039cf6c8e2219cca060c34e768082099a9472bbe1440c0e3cb72f6fa3
                                                    • Instruction ID: 5b31dde6bb6ee4f12738a739f0e986191c4efbaaa8786a84f26f02688feeefb1
                                                    • Opcode Fuzzy Hash: 585f588039cf6c8e2219cca060c34e768082099a9472bbe1440c0e3cb72f6fa3
                                                    • Instruction Fuzzy Hash: 20416370A006098FDB10FFA5D882AEE77B8EF48314F518537E414BB381D7789A058BAD
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 00413D46
                                                    • GetDesktopWindow.USER32 ref: 00413DFE
                                                      • Part of subcall function 00418EC0: 6F5BC6F0.COMCTL32(?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EDC
                                                      • Part of subcall function 00418EC0: ShowCursor.USER32(00000001,?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EF9
                                                    • SetCursor.USER32(00000000,?,?,?,?,00413AF3,00000000,00413B06), ref: 00413E3C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CursorDesktopWindow$Show
                                                    • String ID:
                                                    • API String ID: 2074268717-0
                                                    • Opcode ID: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
                                                    • Instruction ID: d0219f8535474b9b7e790bb207accfb6dce16a9ac66decbe361331da1304c66b
                                                    • Opcode Fuzzy Hash: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
                                                    • Instruction Fuzzy Hash: 91412C75600210AFC710DF2AFA84B56B7E1EB65329B16817BE405CB365DB38DD81CF98
                                                    APIs
                                                    • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A75
                                                    • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AE4
                                                    • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B7F
                                                    • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BBE
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: LoadString$FileMessageModuleName
                                                    • String ID:
                                                    • API String ID: 704749118-0
                                                    • Opcode ID: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
                                                    • Instruction ID: 7d65b0a5aa49ad722f3f3263bbe29e3330acee4661d9e2153cfe083702b22da2
                                                    • Opcode Fuzzy Hash: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
                                                    • Instruction Fuzzy Hash: 1F3123716083849AD370EB65C945BDF77D89B85704F40483FB6C8E72D1EB7859048B6B
                                                    APIs
                                                    • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E90D
                                                      • Part of subcall function 0044CF50: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF82
                                                    • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E991
                                                      • Part of subcall function 0042BBB4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBC8
                                                    • IsRectEmpty.USER32(?), ref: 0044E953
                                                    • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E976
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                    • String ID:
                                                    • API String ID: 855768636-0
                                                    • Opcode ID: 04ca6cb6e2ccef701aa7cc40eb4f9654f1f9ed030ec2c7ff107260b1fda3279a
                                                    • Instruction ID: f7bad605b8f68185b4e834990bb8ca2287257270a928060092b59a923d315d7c
                                                    • Opcode Fuzzy Hash: 04ca6cb6e2ccef701aa7cc40eb4f9654f1f9ed030ec2c7ff107260b1fda3279a
                                                    • Instruction Fuzzy Hash: E5114A71B0030067E650BA7B8C86B5B76C9AB88748F15083FB545EB387DE7DDD094299
                                                    APIs
                                                    • OffsetRect.USER32(?,?,00000000), ref: 00495ADC
                                                    • OffsetRect.USER32(?,00000000,?), ref: 00495AF7
                                                    • OffsetRect.USER32(?,?,00000000), ref: 00495B11
                                                    • OffsetRect.USER32(?,00000000,?), ref: 00495B2C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: OffsetRect
                                                    • String ID:
                                                    • API String ID: 177026234-0
                                                    • Opcode ID: 1a7b820049be1fccb12470de9550d957125159f483069f204bdd0ac347790e73
                                                    • Instruction ID: d50c5ba87e085f93dc65ee7aca07b067794a0f9c190ffa08ce6a151eaa349c11
                                                    • Opcode Fuzzy Hash: 1a7b820049be1fccb12470de9550d957125159f483069f204bdd0ac347790e73
                                                    • Instruction Fuzzy Hash: 6421AEB6704601AFCB00DE69CD85E6BB7DEEBC4340F248A2AF944C7249D638E9448755
                                                    APIs
                                                    • GetCursorPos.USER32 ref: 00417260
                                                    • SetCursor.USER32(00000000), ref: 004172A3
                                                    • GetLastActivePopup.USER32(?), ref: 004172CD
                                                    • GetForegroundWindow.USER32(?), ref: 004172D4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                    • String ID:
                                                    • API String ID: 1959210111-0
                                                    • Opcode ID: 2815b631d4163c2f90f869daf06518e44bda7049ed7788c1b372a89dcb0b58ef
                                                    • Instruction ID: de3f0dc6b436800086b9427ec8ddd2ec86eeedce3a35093462374e80c8eda50e
                                                    • Opcode Fuzzy Hash: 2815b631d4163c2f90f869daf06518e44bda7049ed7788c1b372a89dcb0b58ef
                                                    • Instruction Fuzzy Hash: C52183313086118AD720AFA9E945AE733F1EF44754B0544ABF8558B352DB3DDC82CB9E
                                                    APIs
                                                    • MulDiv.KERNEL32(?,00000008,?), ref: 00495745
                                                    • MulDiv.KERNEL32(?,00000008,?), ref: 00495759
                                                    • MulDiv.KERNEL32(?,00000008,?), ref: 0049576D
                                                    • MulDiv.KERNEL32(?,00000008,?), ref: 0049578B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                    • Instruction ID: 57bd1f3e4af5a5b99f2b3baf23c4af08b73f73eebd4a5b621a3c8c8d6947ff9a
                                                    • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                    • Instruction Fuzzy Hash: 9C111872605504ABCB40DEA9D8C4D9B7BECEF89364B2441AAF908DB246D634ED408B68
                                                    APIs
                                                    • GetClassInfoA.USER32(00400000,0041F470,?), ref: 0041F4A1
                                                    • UnregisterClassA.USER32(0041F470,00400000), ref: 0041F4CA
                                                    • RegisterClassA.USER32(00499598), ref: 0041F4D4
                                                    • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F50F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Class$InfoLongRegisterUnregisterWindow
                                                    • String ID:
                                                    • API String ID: 4025006896-0
                                                    • Opcode ID: 2789f09181fedf2aa8f29be774d1bfe7920984f559ea6f8e8637ed1726722249
                                                    • Instruction ID: 7a0dc659497f48f9aad4428a0df7724adcaf244520b53866b591a9b3b5545ee4
                                                    • Opcode Fuzzy Hash: 2789f09181fedf2aa8f29be774d1bfe7920984f559ea6f8e8637ed1726722249
                                                    • Instruction Fuzzy Hash: F6011B72240104AADA10EBACED81E9B33999729314B11423BB615E72A2D6399C558BAC
                                                    APIs
                                                    • WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
                                                    • CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                    • String ID:
                                                    • API String ID: 4071923889-0
                                                    • Opcode ID: 8aa0dd6ec5a68f6f7641eb82506f7728cd0b20fc7582fe19e2ee2bc87ac6724f
                                                    • Instruction ID: ea90b2abd28d60bbe0c33bbe6d7a83e36ef454db8471bda6b5c19e9a906557d9
                                                    • Opcode Fuzzy Hash: 8aa0dd6ec5a68f6f7641eb82506f7728cd0b20fc7582fe19e2ee2bc87ac6724f
                                                    • Instruction Fuzzy Hash: B9012D31A006097FEB1097AA8C02F6FBBECDF49764F610127F904D72C2C5788D409A78
                                                    APIs
                                                    • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D027
                                                    • LoadResource.KERNEL32(00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CCAC,0000000A,00000000), ref: 0040D041
                                                    • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CCAC), ref: 0040D05B
                                                    • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?), ref: 0040D065
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLockSizeof
                                                    • String ID:
                                                    • API String ID: 3473537107-0
                                                    • Opcode ID: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                    • Instruction ID: ce77ce8360aa458f47a01e9b0563465317cd85cc21d7bcd45488e041df035c61
                                                    • Opcode Fuzzy Hash: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                    • Instruction Fuzzy Hash: 49F04F726056046F9B14EE59A881D5B77ECDE88268310013AF908E7286DA38DD018B68
                                                    APIs
                                                    • GetLastError.KERNEL32(?,00000000), ref: 00470741
                                                    Strings
                                                    • Failed to set NTFS compression state (%d)., xrefs: 00470752
                                                    • Unsetting NTFS compression on file: %s, xrefs: 00470727
                                                    • Setting NTFS compression on file: %s, xrefs: 0047070F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                    • API String ID: 1452528299-3038984924
                                                    • Opcode ID: d7860faf63ba55006ae41e3c439ba0f952fed5b92e6b4a654d15771b21c1c974
                                                    • Instruction ID: 516ba9922c05d2884c901261e3297babd46d2414ea2f30b5c6a01ed0c8da25d4
                                                    • Opcode Fuzzy Hash: d7860faf63ba55006ae41e3c439ba0f952fed5b92e6b4a654d15771b21c1c974
                                                    • Instruction Fuzzy Hash: 06016721D0924896CB08D7AD94412DDBBA49F49304F44C5AFE459E7382DB781A098BAA
                                                    APIs
                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000,0045B7D5), ref: 00455DD8
                                                    • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000), ref: 00455DE1
                                                    • RemoveFontResourceA.GDI32(00000000), ref: 00455DEE
                                                    • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455E02
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                    • String ID:
                                                    • API String ID: 4283692357-0
                                                    • Opcode ID: 31926d3b7233cd0d42d7794d649c612f69a0037c8a0cd025a9d084ab4d481536
                                                    • Instruction ID: 71ccc6c4ad223293e5fa71c014565a1ca4f3f808124b73c5b0663eb55104ffd2
                                                    • Opcode Fuzzy Hash: 31926d3b7233cd0d42d7794d649c612f69a0037c8a0cd025a9d084ab4d481536
                                                    • Instruction Fuzzy Hash: 57F0BEB174070036EA10B6BAAC4BF2B26CC8F54745F10883ABA00EF2C3D97CDC04962D
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,00000000), ref: 0046FF95
                                                    Strings
                                                    • Unsetting NTFS compression on directory: %s, xrefs: 0046FF7B
                                                    • Setting NTFS compression on directory: %s, xrefs: 0046FF63
                                                    • Failed to set NTFS compression state (%d)., xrefs: 0046FFA6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                    • API String ID: 1452528299-1392080489
                                                    • Opcode ID: 0d8f965f1f337f46f955c7ee94d892778df29f99908d1ca1613bd7e3ecc8a71d
                                                    • Instruction ID: a045838dcc4f37756fc34b517471cd96220c37e591c9b42891c7cb6a53decabf
                                                    • Opcode Fuzzy Hash: 0d8f965f1f337f46f955c7ee94d892778df29f99908d1ca1613bd7e3ecc8a71d
                                                    • Instruction Fuzzy Hash: E4016721E0825856CB04D7ADA4412DDBBA49F4E314F54C1BFA495D7286EB780A0C879A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CountSleepTick
                                                    • String ID:
                                                    • API String ID: 2227064392-0
                                                    • Opcode ID: dfa0650b41a5fbb69b4da717be5ba207ba5450cdb50d9376c11a56b5a3797e8a
                                                    • Instruction ID: 5023ad3def2f1da38b899e91e1387ff360f0e65e610db7639cf4f02af7769762
                                                    • Opcode Fuzzy Hash: dfa0650b41a5fbb69b4da717be5ba207ba5450cdb50d9376c11a56b5a3797e8a
                                                    • Instruction Fuzzy Hash: F8E0ED6235919086E63172BF18C25BF4948CBC23A5B28493FE088D6282C9584C0A873E
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,0048141C,?,?,?,?,?,00498E2F,00000000), ref: 00478361
                                                    • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,0048141C,?,?,?,?,?,00498E2F), ref: 00478367
                                                    • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,0048141C), ref: 00478389
                                                    • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,0048141C), ref: 0047839A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                    • String ID:
                                                    • API String ID: 215268677-0
                                                    • Opcode ID: d60bb82440296f468b4e9264c8736cc4fa795d9297d640bad5b09a11fbf97270
                                                    • Instruction ID: ec998ea276eaf377f210c997b943063a3ee056d2675e5df16b8613807e0ae048
                                                    • Opcode Fuzzy Hash: d60bb82440296f468b4e9264c8736cc4fa795d9297d640bad5b09a11fbf97270
                                                    • Instruction Fuzzy Hash: EEF037716443007BD700E6B5CD81E5B73DCEB44754F04483E7E94D71C1EA79D9089726
                                                    APIs
                                                    • GetLastActivePopup.USER32(?), ref: 0042424C
                                                    • IsWindowVisible.USER32(?), ref: 0042425D
                                                    • IsWindowEnabled.USER32(?), ref: 00424267
                                                    • SetForegroundWindow.USER32(?), ref: 00424271
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                    • String ID:
                                                    • API String ID: 2280970139-0
                                                    • Opcode ID: 13ade4494cb6c1f977c60239d5fd74f0629ce9c5699ef6f3eeab0a2299bd7f47
                                                    • Instruction ID: 2c5ff33fc315f6eb6fab431e1453bcb0e66c5aaaa6596e28cc8dc28fd0b03a53
                                                    • Opcode Fuzzy Hash: 13ade4494cb6c1f977c60239d5fd74f0629ce9c5699ef6f3eeab0a2299bd7f47
                                                    • Instruction Fuzzy Hash: C7E0EC61B02672D6AE31FA7B2881A9F518C9D45BE434641EBBC04FB38ADB2CDC1141BD
                                                    APIs
                                                    • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047BC55,?,00000000,00000000,00000001,00000000,0047A609,?,00000000), ref: 0047A5CD
                                                    Strings
                                                    • Failed to parse "reg" constant, xrefs: 0047A5D4
                                                    • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A441
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                    • API String ID: 3535843008-1938159461
                                                    • Opcode ID: ff15b3a6cec5d22ab61080e9116f6b7dde54b3ea1da144d43bbdb493181e6094
                                                    • Instruction ID: 103f4a143b0119ba066f3ec327db5bbf5ada2b92893d8531b8727a73284c7c03
                                                    • Opcode Fuzzy Hash: ff15b3a6cec5d22ab61080e9116f6b7dde54b3ea1da144d43bbdb493181e6094
                                                    • Instruction Fuzzy Hash: B9814274E00108AFCF10DFA5D485ADEBBF9AF88314F50816AE854B7391DB399E05CB99
                                                    APIs
                                                    • GetForegroundWindow.USER32(00000000,0048386A,?,00000000,004838AB,?,?,?,?,00000000,00000000,00000000,?,0046BDF1), ref: 00483719
                                                    • SetActiveWindow.USER32(?,00000000,0048386A,?,00000000,004838AB,?,?,?,?,00000000,00000000,00000000,?,0046BDF1), ref: 0048372B
                                                    Strings
                                                    • Will not restart Windows automatically., xrefs: 0048384A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveForeground
                                                    • String ID: Will not restart Windows automatically.
                                                    • API String ID: 307657957-4169339592
                                                    • Opcode ID: 42c4117fe9f42618f3fa8ab4db5063fd04075d7b889279c417d92162234f37a9
                                                    • Instruction ID: d5b7be76e9212aa441480b1bdbd102f68b6527a9126a01235f58b6c089baa19a
                                                    • Opcode Fuzzy Hash: 42c4117fe9f42618f3fa8ab4db5063fd04075d7b889279c417d92162234f37a9
                                                    • Instruction Fuzzy Hash: E2412170248240AFD711FF68D896BAD7BE4A715B09F244CB7F840473A2D27C9A459B1E
                                                    APIs
                                                    • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,00476633,?,00000000,00476644,?,00000000,0047668D), ref: 00476604
                                                    • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,00476633,?,00000000,00476644,?,00000000,0047668D), ref: 00476618
                                                    Strings
                                                    • Extracting temporary file: , xrefs: 00476540
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: FileTime$Local
                                                    • String ID: Extracting temporary file:
                                                    • API String ID: 791338737-4171118009
                                                    • Opcode ID: 5e1909f1f33528658f0ef4094d9cc81abb2b77ff5a727c435f5d22f20dbd3e61
                                                    • Instruction ID: e086036456be44248c99ad119955be4c85a4518b1c9a7c71b2334ff27603e677
                                                    • Opcode Fuzzy Hash: 5e1909f1f33528658f0ef4094d9cc81abb2b77ff5a727c435f5d22f20dbd3e61
                                                    • Instruction Fuzzy Hash: 07418770E006496FCB01DFA5C892EAFBBB9EF09304F51847AF914A7291D6789905CB58
                                                    Strings
                                                    • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CD90
                                                    • Failed to proceed to next wizard page; aborting., xrefs: 0046CD7C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                    • API String ID: 0-1974262853
                                                    • Opcode ID: 02ca1e2bdd952e3c7de43b259eb9cd19f0daa652bd3924f59340bef62ca181e8
                                                    • Instruction ID: a639c7a90007e63433286ce4554b6d7c698017ea4e0e47f6de7538ddbde49788
                                                    • Opcode Fuzzy Hash: 02ca1e2bdd952e3c7de43b259eb9cd19f0daa652bd3924f59340bef62ca181e8
                                                    • Instruction Fuzzy Hash: 0031BC30604204EFD711EB59D989BAA7BF5EB05304F6500BBF0489B3A2D7786E84DB4A
                                                    APIs
                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,7=H,?,00000001,?,?,00483D37,?,00000001,00000000), ref: 0042DE38
                                                    • RegCloseKey.ADVAPI32(?,004790D2,?,?,00000001,00000000,00000000,004790ED), ref: 004790BB
                                                    Strings
                                                    • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00479046
                                                    • %s\%s_is1, xrefs: 00479064
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                    • API String ID: 47109696-1598650737
                                                    • Opcode ID: 5cf1c10046762414c55aaa5447d12f6a49fb08724fe2a025418b3bbe6795d0bc
                                                    • Instruction ID: 400a3d5f9b6125f586a55e3f1e7b647841d59e58695aff76dcbf1fac74d6966e
                                                    • Opcode Fuzzy Hash: 5cf1c10046762414c55aaa5447d12f6a49fb08724fe2a025418b3bbe6795d0bc
                                                    • Instruction Fuzzy Hash: D6216170B142446FDB11DFAACC51ADEBBF8EB8D304F90847AE804E7381D6789E058B59
                                                    APIs
                                                    • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501FD
                                                    • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045022E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ExecuteMessageSendShell
                                                    • String ID: open
                                                    • API String ID: 812272486-2758837156
                                                    • Opcode ID: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
                                                    • Instruction ID: 7f57506e0c07b49dd0b520b237e7736b759e9f4ed638734fb0c833ac5abbff07
                                                    • Opcode Fuzzy Hash: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
                                                    • Instruction Fuzzy Hash: A1216074E00204AFDB10DFA9C896B9EBBF8EB44705F1081BAB404E7292D678DE45CA59
                                                    APIs
                                                    • ShellExecuteEx.SHELL32(0000003C), ref: 0045532C
                                                    • GetLastError.KERNEL32(0000003C,00000000,00455375,?,?,?), ref: 0045533D
                                                      • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: DirectoryErrorExecuteLastShellSystem
                                                    • String ID: <
                                                    • API String ID: 893404051-4251816714
                                                    • Opcode ID: f2b6c2f03d8cdfddb0a6be6e5c8226378c77f31d8a62e2f07c4223a48a9de58a
                                                    • Instruction ID: 92df0b2f1231c5c49ece4c570041ef31d6ed92e86db86b93cafb864a5026e18c
                                                    • Opcode Fuzzy Hash: f2b6c2f03d8cdfddb0a6be6e5c8226378c77f31d8a62e2f07c4223a48a9de58a
                                                    • Instruction Fuzzy Hash: 172167B0600609ABDB10EF65C8926AE7BE8AF44355F54403AFC44E7291D7789E49CB98
                                                    APIs
                                                    • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                                                    • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                                                      • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02239F08,00001C1C,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                      • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02239F08,00001C1C,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                      • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02239F08,00001C1C,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                      • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02239F08,00001C1C,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                    • String ID: )
                                                    • API String ID: 2227675388-1084416617
                                                    • Opcode ID: e007287126da8fa7f668c9e0dd370e3762efe765c6f58c3167b97aa7cf6c64ab
                                                    • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                                                    • Opcode Fuzzy Hash: e007287126da8fa7f668c9e0dd370e3762efe765c6f58c3167b97aa7cf6c64ab
                                                    • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                                                    APIs
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496CBD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Window
                                                    • String ID: /INITPROCWND=$%x $@
                                                    • API String ID: 2353593579-4169826103
                                                    • Opcode ID: c795715ed3c8efd438480bc0f781c8f00083acd5c228b748e219496c145c1ee8
                                                    • Instruction ID: 842359cbbd4b57163a29bfdf1a5f95bb33b9e2b7d5052559e85756976848a02d
                                                    • Opcode Fuzzy Hash: c795715ed3c8efd438480bc0f781c8f00083acd5c228b748e219496c145c1ee8
                                                    • Instruction Fuzzy Hash: 9C11A231B042489FDB01DFA4E841BAE7FE8EB48314F52847BE404E7292DB3CA905CB59
                                                    APIs
                                                      • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                      • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                    • SysFreeString.OLEAUT32(?), ref: 004474C6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: String$AllocByteCharFreeMultiWide
                                                    • String ID: NIL Interface Exception$Unknown Method
                                                    • API String ID: 3952431833-1023667238
                                                    • Opcode ID: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
                                                    • Instruction ID: eb0132878ffe7144b3db707554455947565e11d0cdd4dc78092451a8fec87e99
                                                    • Opcode Fuzzy Hash: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
                                                    • Instruction Fuzzy Hash: 8011B9706082089FEB10DFA58C52A6EBBBCEB09704F91407AF504F7681D77C9D01CB69
                                                    APIs
                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,004965BC,?,004965B0,00000000,00496597), ref: 00496562
                                                    • CloseHandle.KERNEL32(004965FC,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,004965BC,?,004965B0,00000000), ref: 00496579
                                                      • Part of subcall function 0049644C: GetLastError.KERNEL32(00000000,004964E4,?,?,?,?), ref: 00496470
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateErrorHandleLastProcess
                                                    • String ID: D
                                                    • API String ID: 3798668922-2746444292
                                                    • Opcode ID: adb7c7053ebfc7d0a966cd6ec10b080588a365a345d02bb37a27a24bdf268564
                                                    • Instruction ID: e7e346f596197b6f0184c015d01254f70025af9537202f9537602a1398b59792
                                                    • Opcode Fuzzy Hash: adb7c7053ebfc7d0a966cd6ec10b080588a365a345d02bb37a27a24bdf268564
                                                    • Instruction Fuzzy Hash: EF0152B1604248BFDB00DBA1DC42A9E7BACDF48714F52403AB504E7295D6785E05865D
                                                    APIs
                                                    • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD78
                                                    • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDB8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Value$EnumQuery
                                                    • String ID: Inno Setup: No Icons
                                                    • API String ID: 1576479698-2016326496
                                                    • Opcode ID: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
                                                    • Instruction ID: 8d080c6700cf8453afd411d185ff7d2dd707f59376968ad674d2e7d16536e1ed
                                                    • Opcode Fuzzy Hash: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
                                                    • Instruction Fuzzy Hash: 1B012B33B55B7179FB3045256D01F7B57889B82B60F64013BF942EA2C0D6999C04936E
                                                    APIs
                                                      • Part of subcall function 004555E4: GetCurrentProcess.KERNEL32(00000028), ref: 004555F3
                                                      • Part of subcall function 004555E4: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555F9
                                                    • SetForegroundWindow.USER32(?), ref: 004979EA
                                                    Strings
                                                    • Restarting Windows., xrefs: 004979C7
                                                    • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 00497A15
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentForegroundOpenTokenWindow
                                                    • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                    • API String ID: 3179053593-4147564754
                                                    • Opcode ID: 0323d8d66cc3b06406dc5b3ff14738122cfbbad5a1835cd9a951f2203844edc7
                                                    • Instruction ID: c063de388ad689520a7bf218b3c2bac36d2a05b7f2a834772bcba75d7a93240a
                                                    • Opcode Fuzzy Hash: 0323d8d66cc3b06406dc5b3ff14738122cfbbad5a1835cd9a951f2203844edc7
                                                    • Instruction Fuzzy Hash: 7C01D8706182809BEB01FB65F542BAC2F98DB44308F50847BF400672D3C73C9E49871D
                                                    APIs
                                                      • Part of subcall function 0047D220: FreeLibrary.KERNEL32(74650000,00481B83), ref: 0047D236
                                                      • Part of subcall function 0047CEF0: GetTickCount.KERNEL32 ref: 0047CF3A
                                                      • Part of subcall function 00457294: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004572B3
                                                    • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,00498AAF), ref: 004981AD
                                                    • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,00498AAF), ref: 004981B3
                                                    Strings
                                                    • Detected restart. Removing temporary directory., xrefs: 00498167
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                    • String ID: Detected restart. Removing temporary directory.
                                                    • API String ID: 1717587489-3199836293
                                                    • Opcode ID: 16827ab7a0ef7f6390a34d3bdc103766b75ce4d7b82bcbfdcba13e4dfc1a80a7
                                                    • Instruction ID: 5a0c7d6d547da3c9f2bf38e19969f213e715592a538ca6b32503ac86c24b9891
                                                    • Opcode Fuzzy Hash: 16827ab7a0ef7f6390a34d3bdc103766b75ce4d7b82bcbfdcba13e4dfc1a80a7
                                                    • Instruction Fuzzy Hash: 10E0E5312086002DEA0177AFBC5395B3F5CD747768761487FF40892952D83D5816C57D
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2928191926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2928157498.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928331595.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928367613.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928401575.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2928440153.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastSleep
                                                    • String ID:
                                                    • API String ID: 1458359878-0
                                                    • Opcode ID: 1a9f46df8411143c40a07a37eb8806f02fdea1552ea3146ec5e635b784cd6770
                                                    • Instruction ID: f31041694d7e6b08a2ea33ec2b58b28b25921f40701f973673b956735a8b67d8
                                                    • Opcode Fuzzy Hash: 1a9f46df8411143c40a07a37eb8806f02fdea1552ea3146ec5e635b784cd6770
                                                    • Instruction Fuzzy Hash: 42F02B32705F58A78B21B56A889157FB2A8DB81366750012BFC0CD7313C878CC058BBC

                                                    Execution Graph

                                                    Execution Coverage:10.3%
                                                    Dynamic/Decrypted Code Coverage:83.9%
                                                    Signature Coverage:1.7%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:37
                                                    execution_graph 20132 402d60 GetVersion 20156 4039f0 HeapCreate 20132->20156 20134 402dbf 20135 402dc4 20134->20135 20136 402dcc 20134->20136 20231 402e7b 20135->20231 20168 4036d0 20136->20168 20140 402dd4 GetCommandLineA 20182 40359e 20140->20182 20144 402dee 20214 403298 20144->20214 20146 402df3 20147 402df8 GetStartupInfoA 20146->20147 20227 403240 20147->20227 20149 402e0a GetModuleHandleA 20151 402e2e 20149->20151 20237 402fe7 20151->20237 20157 403a10 20156->20157 20158 403a46 20156->20158 20244 4038a8 20157->20244 20158->20134 20161 403a2c 20164 403a49 20161->20164 20258 404618 20161->20258 20162 403a1f 20256 403dc7 HeapAlloc 20162->20256 20164->20134 20165 403a29 20165->20164 20167 403a3a HeapDestroy 20165->20167 20167->20158 20321 402e9f 20168->20321 20171 4036ef GetStartupInfoA 20174 403800 20171->20174 20175 40373b 20171->20175 20176 403827 GetStdHandle 20174->20176 20178 403867 SetHandleCount 20174->20178 20175->20174 20177 4037ac 20175->20177 20179 402e9f 12 API calls 20175->20179 20176->20174 20180 403835 GetFileType 20176->20180 20177->20174 20181 4037ce GetFileType 20177->20181 20178->20140 20179->20175 20180->20174 20181->20177 20183 4035b9 GetEnvironmentStringsW 20182->20183 20184 4035ec 20182->20184 20185 4035c1 20183->20185 20186 4035cd GetEnvironmentStrings 20183->20186 20184->20185 20187 4035dd 20184->20187 20189 403605 WideCharToMultiByte 20185->20189 20190 4035f9 GetEnvironmentStringsW 20185->20190 20186->20187 20188 402de4 20186->20188 20187->20188 20191 40368b 20187->20191 20192 40367f GetEnvironmentStrings 20187->20192 20205 403351 20188->20205 20194 403639 20189->20194 20195 40366b FreeEnvironmentStringsW 20189->20195 20190->20188 20190->20189 20196 402e9f 12 API calls 20191->20196 20192->20188 20192->20191 20197 402e9f 12 API calls 20194->20197 20195->20188 20203 4036a6 20196->20203 20198 40363f 20197->20198 20198->20195 20199 403648 WideCharToMultiByte 20198->20199 20201 403662 20199->20201 20202 403659 20199->20202 20200 4036bc FreeEnvironmentStringsA 20200->20188 20201->20195 20387 402f51 20202->20387 20203->20200 20206 403363 20205->20206 20207 403368 GetModuleFileNameA 20205->20207 20417 405042 20206->20417 20209 40338b 20207->20209 20210 402e9f 12 API calls 20209->20210 20211 4033ac 20210->20211 20212 4033bc 20211->20212 20213 402e56 7 API calls 20211->20213 20212->20144 20213->20212 20215 4032a5 20214->20215 20218 4032aa 20214->20218 20216 405042 19 API calls 20215->20216 20216->20218 20217 402e9f 12 API calls 20219 4032d7 20217->20219 20218->20217 20220 402e56 7 API calls 20219->20220 20224 4032eb 20219->20224 20220->20224 20221 40332e 20222 402f51 7 API calls 20221->20222 20223 40333a 20222->20223 20223->20146 20224->20221 20225 402e9f 12 API calls 20224->20225 20226 402e56 7 API calls 20224->20226 20225->20224 20226->20224 20228 403249 20227->20228 20230 40324e 20227->20230 20229 405042 19 API calls 20228->20229 20229->20230 20230->20149 20232 402e84 20231->20232 20233 402e89 20231->20233 20234 403c20 7 API calls 20232->20234 20235 403c59 7 API calls 20233->20235 20234->20233 20236 402e92 ExitProcess 20235->20236 20441 403009 20237->20441 20240 4030bc 20241 4030c8 20240->20241 20242 4031f1 UnhandledExceptionFilter 20241->20242 20243 4030dc 20241->20243 20242->20243 20243->20243 20267 402c40 20244->20267 20247 4038d1 20248 4038eb GetEnvironmentVariableA 20247->20248 20250 4038e3 20247->20250 20249 4039c8 20248->20249 20252 40390a 20248->20252 20249->20250 20272 40387b GetModuleHandleA 20249->20272 20250->20161 20250->20162 20253 40394f GetModuleFileNameA 20252->20253 20254 403947 20252->20254 20253->20254 20254->20249 20269 40505e 20254->20269 20257 403de3 20256->20257 20257->20165 20259 404625 20258->20259 20260 40462c HeapAlloc 20258->20260 20261 404649 VirtualAlloc 20259->20261 20260->20261 20262 404681 20260->20262 20263 404669 VirtualAlloc 20261->20263 20264 40473e 20261->20264 20262->20165 20263->20262 20265 404730 VirtualFree 20263->20265 20264->20262 20266 404746 HeapFree 20264->20266 20265->20264 20266->20262 20268 402c4c GetVersionExA 20267->20268 20268->20247 20268->20248 20274 405075 20269->20274 20273 403892 20272->20273 20273->20250 20276 40508d 20274->20276 20279 4050bd 20276->20279 20281 405d39 20276->20281 20277 405d39 6 API calls 20277->20279 20278 405071 20278->20249 20279->20277 20279->20278 20285 405c6d 20279->20285 20282 405d57 20281->20282 20284 405d4b 20281->20284 20291 405b24 20282->20291 20284->20276 20286 405c98 20285->20286 20290 405c7b 20285->20290 20287 405cb4 20286->20287 20288 405d39 6 API calls 20286->20288 20287->20290 20303 4058d5 20287->20303 20288->20287 20290->20279 20292 405b6d 20291->20292 20293 405b55 GetStringTypeW 20291->20293 20295 405b98 GetStringTypeA 20292->20295 20296 405bbc 20292->20296 20293->20292 20294 405b71 GetStringTypeA 20293->20294 20294->20292 20297 405c59 20294->20297 20295->20297 20296->20297 20299 405bd2 MultiByteToWideChar 20296->20299 20297->20284 20299->20297 20300 405bf6 20299->20300 20300->20297 20301 405c30 MultiByteToWideChar 20300->20301 20301->20297 20302 405c49 GetStringTypeW 20301->20302 20302->20297 20304 405905 LCMapStringW 20303->20304 20305 405921 20303->20305 20304->20305 20306 405929 LCMapStringA 20304->20306 20307 40596a LCMapStringA 20305->20307 20308 405987 20305->20308 20306->20305 20315 405a63 20306->20315 20307->20315 20309 40599d MultiByteToWideChar 20308->20309 20308->20315 20310 4059c7 20309->20310 20309->20315 20311 4059fd MultiByteToWideChar 20310->20311 20310->20315 20312 405a16 LCMapStringW 20311->20312 20311->20315 20313 405a31 20312->20313 20312->20315 20314 405a37 20313->20314 20317 405a77 20313->20317 20314->20315 20316 405a45 LCMapStringW 20314->20316 20315->20290 20316->20315 20317->20315 20318 405aaf LCMapStringW 20317->20318 20318->20315 20319 405ac7 WideCharToMultiByte 20318->20319 20319->20315 20330 402eb1 20321->20330 20324 402e56 20325 402e64 20324->20325 20326 402e5f 20324->20326 20373 403c59 20325->20373 20367 403c20 20326->20367 20331 402eae 20330->20331 20333 402eb8 20330->20333 20331->20171 20331->20324 20333->20331 20334 402edd 20333->20334 20335 402eec 20334->20335 20338 402f01 20334->20338 20342 402efa 20335->20342 20343 404163 20335->20343 20337 402f40 HeapAlloc 20339 402f4f 20337->20339 20338->20337 20338->20342 20349 404910 20338->20349 20339->20333 20340 402eff 20340->20333 20342->20337 20342->20339 20342->20340 20346 404195 20343->20346 20344 404234 20348 404243 20344->20348 20363 40451d 20344->20363 20346->20344 20346->20348 20356 40446c 20346->20356 20348->20342 20350 40491e 20349->20350 20351 404a0a VirtualAlloc 20350->20351 20352 404adf 20350->20352 20355 4049db 20350->20355 20351->20355 20353 404618 5 API calls 20352->20353 20353->20355 20355->20342 20355->20355 20357 4044af HeapAlloc 20356->20357 20358 40447f HeapReAlloc 20356->20358 20360 4044ff 20357->20360 20361 4044d5 VirtualAlloc 20357->20361 20359 40449e 20358->20359 20358->20360 20359->20357 20360->20344 20361->20360 20362 4044ef HeapFree 20361->20362 20362->20360 20364 40452f VirtualAlloc 20363->20364 20366 404578 20364->20366 20366->20348 20368 403c2a 20367->20368 20369 403c59 7 API calls 20368->20369 20372 403c57 20368->20372 20370 403c41 20369->20370 20371 403c59 7 API calls 20370->20371 20371->20372 20372->20325 20376 403c6c 20373->20376 20374 402e6d 20374->20171 20375 403d83 20378 403d96 GetStdHandle WriteFile 20375->20378 20376->20374 20376->20375 20377 403cac 20376->20377 20377->20374 20379 403cb8 GetModuleFileNameA 20377->20379 20378->20374 20380 403cd0 20379->20380 20382 405408 20380->20382 20383 405415 LoadLibraryA 20382->20383 20385 405457 20382->20385 20384 405426 GetProcAddress 20383->20384 20383->20385 20384->20385 20386 40543d GetProcAddress GetProcAddress 20384->20386 20385->20374 20386->20385 20388 402f5d 20387->20388 20396 402f79 20387->20396 20389 402f7d 20388->20389 20390 402f67 20388->20390 20391 402fa8 20389->20391 20395 402f97 20389->20395 20392 402fa9 HeapFree 20390->20392 20393 402f73 20390->20393 20391->20392 20392->20396 20398 403e3a 20393->20398 20404 4048cb 20395->20404 20396->20201 20400 403e78 20398->20400 20403 40412e 20398->20403 20399 404074 VirtualFree 20401 4040d8 20399->20401 20400->20399 20400->20403 20402 4040e7 VirtualFree HeapFree 20401->20402 20401->20403 20402->20403 20403->20396 20405 4048f8 20404->20405 20406 40490e 20404->20406 20405->20406 20408 4047b2 20405->20408 20406->20396 20411 4047bf 20408->20411 20409 40486f 20409->20406 20410 4047e0 VirtualFree 20410->20411 20411->20409 20411->20410 20413 40475c VirtualFree 20411->20413 20414 404779 20413->20414 20415 4047a9 20414->20415 20416 404789 HeapFree 20414->20416 20415->20411 20416->20411 20418 40504b 20417->20418 20419 405052 20417->20419 20421 404c7e 20418->20421 20419->20207 20428 404e17 20421->20428 20423 404e0b 20423->20419 20425 404cc1 GetCPInfo 20427 404cd5 20425->20427 20427->20423 20433 404ebd GetCPInfo 20427->20433 20429 404e37 20428->20429 20430 404e27 GetOEMCP 20428->20430 20431 404c8f 20429->20431 20432 404e3c GetACP 20429->20432 20430->20429 20431->20423 20431->20425 20431->20427 20432->20431 20434 404fa8 20433->20434 20436 404ee0 20433->20436 20434->20423 20435 405b24 6 API calls 20437 404f5c 20435->20437 20436->20435 20438 4058d5 9 API calls 20437->20438 20439 404f80 20438->20439 20440 4058d5 9 API calls 20439->20440 20440->20434 20442 403015 GetCurrentProcess TerminateProcess 20441->20442 20445 403026 20441->20445 20442->20445 20443 402e37 20443->20240 20444 403090 ExitProcess 20445->20443 20445->20444 20446 40b160 Sleep 20447 40b6df 20446->20447 20448 2b9f8da LoadLibraryA 20449 2b9f9bd 20448->20449 20450 2b9f903 GetProcAddress 20448->20450 20451 2b9f917 20450->20451 20452 2b9f9b6 FreeLibrary 20450->20452 20453 2b9f929 GetAdaptersInfo 20451->20453 20454 2b9f9b1 20451->20454 20455 2ba3a8f _Allocate 60 API calls 20451->20455 20452->20449 20453->20451 20454->20452 20455->20451 17842 402344 17843 40b855 VirtualAlloc 17842->17843 17844 402544 17845 40b4d8 RegQueryValueExA 17844->17845 17846 40b4e6 17845->17846 17847 40b3be 17845->17847 17847->17845 17848 402784 RegOpenKeyExA 20456 2bd64d9 20457 2c08b5b CreateFileA 20456->20457 17849 2b97b7f 17853 2b97b85 17849->17853 17876 2b966f0 __recalloc 17849->17876 17851 2ba2eb4 59 API calls _free 17851->17876 17852 2b97bfb 17853->17852 18071 2b9882b 17853->18071 17855 2b97c50 17856 2b9670a RtlEnterCriticalSection RtlLeaveCriticalSection 17856->17876 17857 2b96704 Sleep 17857->17856 17858 2b972a7 InternetOpenA 17859 2b972c5 InternetSetOptionA InternetSetOptionA InternetSetOptionA 17858->17859 17858->17876 17863 2b9733e __recalloc 17859->17863 17860 2b9731e InternetOpenUrlA 17861 2b9737e InternetCloseHandle 17860->17861 17860->17863 17861->17876 17862 2b97342 InternetReadFile 17862->17863 17864 2b97373 InternetCloseHandle 17862->17864 17863->17860 17863->17862 17864->17861 17865 2b973e5 RtlEnterCriticalSection RtlLeaveCriticalSection 17897 2ba227c 17865->17897 17867 2ba227c 66 API calls 17867->17876 17870 2b97766 RtlEnterCriticalSection RtlLeaveCriticalSection 17870->17876 17874 2b978de RtlEnterCriticalSection 17875 2b9790b RtlLeaveCriticalSection 17874->17875 17874->17876 17996 2b93c67 17875->17996 17876->17851 17876->17856 17876->17857 17876->17858 17876->17865 17876->17867 17876->17870 17876->17874 17876->17875 17878 2ba2eec 59 API calls _malloc 17876->17878 17881 2ba3529 60 API calls _strtok 17876->17881 17889 2b9a658 73 API calls 17876->17889 17893 2b976e8 Sleep 17876->17893 17894 2b976e3 shared_ptr 17876->17894 17907 2ba2eec 17876->17907 17924 2ba3a8f 17876->17924 17932 2b9a782 17876->17932 17936 2b95119 17876->17936 17965 2b9ab42 17876->17965 17975 2b961f1 17876->17975 17978 2ba2358 17876->17978 17987 2b91ba7 17876->17987 18003 2b93d7e 17876->18003 18010 2b9826e 17876->18010 18016 2b9d04a 17876->18016 18021 2b9831d 17876->18021 18029 2b933b2 17876->18029 18036 2ba2790 17876->18036 18039 2b9966a 17876->18039 18054 2b98f36 17876->18054 18061 2b9534d 17876->18061 17878->17876 17881->17876 17889->17876 18046 2ba1830 17893->18046 17894->17876 17894->17893 18050 2b94100 17894->18050 17900 2ba2288 17897->17900 17901 2ba22ab 17897->17901 17899 2ba228e 18083 2ba5d9b 17899->18083 17900->17899 17900->17901 18089 2ba22c3 17901->18089 17902 2ba22be 17902->17876 17908 2ba2f67 17907->17908 17912 2ba2ef8 17907->17912 17909 2ba8143 __calloc_impl RtlDecodePointer 17908->17909 17910 2ba2f6d 17909->17910 17913 2ba5d9b __recalloc 58 API calls 17910->17913 17911 2ba2f03 17911->17912 17914 2ba8613 __FF_MSGBANNER 58 API calls 17911->17914 17917 2ba8670 __NMSG_WRITE 58 API calls 17911->17917 17919 2ba825c _doexit 3 API calls 17911->17919 17912->17911 17915 2ba2f2b RtlAllocateHeap 17912->17915 17918 2ba2f53 17912->17918 17920 2ba8143 __calloc_impl RtlDecodePointer 17912->17920 17922 2ba2f51 17912->17922 17916 2b97499 RtlEnterCriticalSection RtlLeaveCriticalSection 17913->17916 17914->17911 17915->17912 17915->17916 17916->17876 17917->17911 17921 2ba5d9b __recalloc 58 API calls 17918->17921 17919->17911 17920->17912 17921->17922 17923 2ba5d9b __recalloc 58 API calls 17922->17923 17923->17916 17927 2ba3a97 17924->17927 17925 2ba2eec _malloc 59 API calls 17925->17927 17926 2ba3ab1 17926->17876 17927->17925 17927->17926 17928 2ba8143 __calloc_impl RtlDecodePointer 17927->17928 17929 2ba3ab5 std::exception::exception 17927->17929 17928->17927 18682 2ba449a 17929->18682 17931 2ba3adf 17933 2b9a78c __EH_prolog 17932->17933 18685 2b9df33 17933->18685 17935 2b9a7aa shared_ptr 17935->17876 17937 2b95123 __EH_prolog 17936->17937 18689 2ba0a50 17937->18689 17940 2b93c67 72 API calls 17941 2b9514a 17940->17941 17942 2b93d7e 64 API calls 17941->17942 17943 2b95158 17942->17943 17944 2b9826e 89 API calls 17943->17944 17945 2b9516c 17944->17945 17947 2b95322 shared_ptr 17945->17947 18693 2b9a658 17945->18693 17947->17876 17949 2b951c4 17951 2b9a658 73 API calls 17949->17951 17950 2b951f6 17952 2b9a658 73 API calls 17950->17952 17959 2b951d4 17951->17959 17953 2b95207 17952->17953 17953->17947 17954 2b9a658 73 API calls 17953->17954 17956 2b9524a 17954->17956 17955 2b9a658 73 API calls 17957 2b952b4 17955->17957 17956->17947 17958 2b9a658 73 API calls 17956->17958 17957->17947 17960 2b9a658 73 API calls 17957->17960 17958->17959 17959->17947 17959->17955 17961 2b952da 17960->17961 17961->17947 17962 2b9a658 73 API calls 17961->17962 17963 2b95304 17962->17963 18698 2b9ce0c 17963->18698 17966 2b9ab4c __EH_prolog 17965->17966 18815 2b9d021 17966->18815 17968 2b9ab6d shared_ptr 18818 2ba2030 17968->18818 17970 2b9ab84 17971 2b9ab9a 17970->17971 18824 2b93fb0 17970->18824 17971->17876 17976 2ba2eec _malloc 59 API calls 17975->17976 17977 2b96204 17976->17977 17979 2ba2389 17978->17979 17980 2ba2374 17978->17980 17979->17980 17985 2ba2390 17979->17985 17981 2ba5d9b __recalloc 59 API calls 17980->17981 17982 2ba2379 17981->17982 17983 2ba4e35 __write 9 API calls 17982->17983 17984 2ba2384 17983->17984 17984->17876 17985->17984 19303 2ba5e41 17985->19303 19504 2bb5330 17987->19504 17989 2b91bb1 RtlEnterCriticalSection 17990 2b91be9 RtlLeaveCriticalSection 17989->17990 17992 2b91bd1 17989->17992 19505 2b9e263 17990->19505 17992->17990 17993 2b91c55 RtlLeaveCriticalSection 17992->17993 17993->17876 17994 2b91c22 17994->17993 17997 2ba0a50 Mailbox 68 API calls 17996->17997 17998 2b93c7e 17997->17998 19587 2b93ca2 17998->19587 18004 2b93d99 htons 18003->18004 18005 2b93dcb htons 18003->18005 19614 2b93bd3 18004->19614 19620 2b93c16 18005->19620 18009 2b93ded 18009->17876 18011 2b982a7 18010->18011 18012 2b98286 18010->18012 18015 2b982cc 18011->18015 19654 2b92ac7 18011->19654 19651 2b99530 18012->19651 18015->17876 18017 2ba0a50 Mailbox 68 API calls 18016->18017 18018 2b9d060 18017->18018 18019 2b9d14e 18018->18019 18020 2b92db5 73 API calls 18018->18020 18019->17876 18020->18018 18022 2b98338 WSASetLastError shutdown 18021->18022 18023 2b98328 18021->18023 18025 2b9a43c 69 API calls 18022->18025 18024 2ba0a50 Mailbox 68 API calls 18023->18024 18028 2b9832d 18024->18028 18026 2b98355 18025->18026 18027 2ba0a50 Mailbox 68 API calls 18026->18027 18026->18028 18027->18028 18028->17876 18030 2b933e1 18029->18030 18031 2b933c4 InterlockedCompareExchange 18029->18031 18033 2b929ee 76 API calls 18030->18033 18031->18030 18032 2b933d6 18031->18032 19748 2b932ab 18032->19748 18035 2b933f1 18033->18035 18035->17876 19801 2ba27ae 18036->19801 18038 2ba27a9 18038->17876 18040 2b99674 __EH_prolog 18039->18040 18041 2b91ba7 210 API calls 18040->18041 18042 2b996c9 18041->18042 18043 2b996e6 RtlEnterCriticalSection 18042->18043 18044 2b99701 18043->18044 18045 2b99704 RtlLeaveCriticalSection 18043->18045 18044->18045 18045->17876 18047 2ba183d 18046->18047 18048 2ba1861 18046->18048 18047->18048 18049 2ba1851 GetProcessHeap HeapFree 18047->18049 18048->17894 18049->18048 18051 2b94118 18050->18051 18052 2b94112 18050->18052 18051->17894 19807 2b9a636 18052->19807 18055 2b98f40 __EH_prolog 18054->18055 19809 2b9373f 18055->19809 18057 2b98f5a RtlEnterCriticalSection 18059 2b98f69 RtlLeaveCriticalSection 18057->18059 18060 2b98fa3 18059->18060 18060->17876 18062 2ba2eec _malloc 59 API calls 18061->18062 18063 2b95362 SHGetSpecialFolderPathA 18062->18063 18064 2b95378 18063->18064 19818 2ba36b4 18064->19818 18067 2b953e2 18067->17876 18069 2b953dc 19834 2ba39c7 18069->19834 18072 2b98840 18071->18072 18073 2b988b4 18071->18073 18074 2b9884d 18072->18074 18075 2b98864 18072->18075 20103 2b9fa93 18073->20103 20093 2b9905e 18074->20093 18078 2b99151 std::bad_exception::bad_exception 60 API calls 18075->18078 18082 2b98862 _memmove 18078->18082 18082->17855 18099 2ba5bb2 GetLastError 18083->18099 18085 2ba2293 18086 2ba4e35 18085->18086 18378 2ba4e0a RtlDecodePointer 18086->18378 18384 2ba21bb 18089->18384 18092 2ba22e5 18093 2ba5d9b __recalloc 59 API calls 18092->18093 18094 2ba22ea 18093->18094 18096 2ba4e35 __write 9 API calls 18094->18096 18095 2ba22f5 ___ascii_stricmp 18095->17902 18096->18095 18097 2ba58ba 66 API calls __tolower_l 18098 2ba22fc 18097->18098 18098->18095 18098->18097 18113 2ba910b 18099->18113 18101 2ba5bc7 18102 2ba5c15 SetLastError 18101->18102 18116 2ba89ac 18101->18116 18102->18085 18106 2ba5bee 18107 2ba5c0c 18106->18107 18108 2ba5bf4 18106->18108 18135 2ba2eb4 18107->18135 18125 2ba5c21 18108->18125 18111 2ba5bfc GetCurrentThreadId 18111->18102 18112 2ba5c12 18112->18102 18114 2ba911e 18113->18114 18115 2ba9122 TlsGetValue 18113->18115 18114->18101 18115->18101 18118 2ba89b3 18116->18118 18119 2ba5bda 18118->18119 18121 2ba89d1 18118->18121 18141 2bb03f8 18118->18141 18119->18102 18122 2ba912a 18119->18122 18121->18118 18121->18119 18149 2ba9445 Sleep 18121->18149 18123 2ba9140 18122->18123 18124 2ba9144 TlsSetValue 18122->18124 18123->18106 18124->18106 18126 2ba5c2d __CRT_INIT@12 18125->18126 18152 2ba882d 18126->18152 18128 2ba5c6a 18159 2ba5cc2 18128->18159 18131 2ba882d __lock 59 API calls 18132 2ba5c8b ___addlocaleref 18131->18132 18162 2ba5ccb 18132->18162 18134 2ba5cb6 __CRT_INIT@12 18134->18111 18136 2ba2ebd HeapFree 18135->18136 18140 2ba2ee6 _free 18135->18140 18137 2ba2ed2 18136->18137 18136->18140 18138 2ba5d9b __recalloc 57 API calls 18137->18138 18139 2ba2ed8 GetLastError 18138->18139 18139->18140 18140->18112 18142 2bb0403 18141->18142 18145 2bb041e 18141->18145 18143 2bb040f 18142->18143 18142->18145 18146 2ba5d9b __recalloc 58 API calls 18143->18146 18144 2bb042e RtlAllocateHeap 18144->18145 18147 2bb0414 18144->18147 18145->18144 18145->18147 18150 2ba8143 RtlDecodePointer 18145->18150 18146->18147 18147->18118 18149->18121 18151 2ba8156 18150->18151 18151->18145 18153 2ba883e 18152->18153 18154 2ba8851 RtlEnterCriticalSection 18152->18154 18165 2ba88b5 18153->18165 18154->18128 18156 2ba8844 18156->18154 18187 2ba837f 18156->18187 18376 2ba8997 RtlLeaveCriticalSection 18159->18376 18161 2ba5c84 18161->18131 18377 2ba8997 RtlLeaveCriticalSection 18162->18377 18164 2ba5cd2 18164->18134 18166 2ba88c1 __CRT_INIT@12 18165->18166 18167 2ba88e0 18166->18167 18194 2ba8613 18166->18194 18173 2ba8903 __CRT_INIT@12 18167->18173 18241 2ba89f4 18167->18241 18173->18156 18174 2ba88d6 18238 2ba825c 18174->18238 18175 2ba88fe 18177 2ba5d9b __recalloc 59 API calls 18175->18177 18176 2ba890d 18178 2ba882d __lock 59 API calls 18176->18178 18177->18173 18180 2ba8914 18178->18180 18181 2ba8939 18180->18181 18182 2ba8921 18180->18182 18184 2ba2eb4 _free 59 API calls 18181->18184 18246 2ba914c 18182->18246 18185 2ba892d 18184->18185 18249 2ba8955 18185->18249 18188 2ba8613 __FF_MSGBANNER 59 API calls 18187->18188 18189 2ba8387 18188->18189 18190 2ba8670 __NMSG_WRITE 59 API calls 18189->18190 18191 2ba838f 18190->18191 18346 2ba842e 18191->18346 18252 2bb00be 18194->18252 18196 2ba861a 18197 2ba8627 18196->18197 18198 2bb00be __NMSG_WRITE 59 API calls 18196->18198 18199 2ba8670 __NMSG_WRITE 59 API calls 18197->18199 18201 2ba8649 18197->18201 18198->18197 18200 2ba863f 18199->18200 18202 2ba8670 __NMSG_WRITE 59 API calls 18200->18202 18203 2ba8670 18201->18203 18202->18201 18204 2ba868e __NMSG_WRITE 18203->18204 18206 2bb00be __NMSG_WRITE 55 API calls 18204->18206 18211 2ba87b5 18204->18211 18209 2ba86a1 18206->18209 18207 2ba881e 18207->18174 18208 2ba87ba GetStdHandle 18208->18211 18214 2ba87c8 _strlen 18208->18214 18209->18208 18210 2bb00be __NMSG_WRITE 55 API calls 18209->18210 18212 2ba86b2 18210->18212 18311 2ba448b 18211->18311 18212->18208 18213 2ba86c4 18212->18213 18213->18211 18259 2baf47d 18213->18259 18214->18211 18216 2ba8801 WriteFile 18214->18216 18216->18211 18218 2ba8822 18318 2ba4e45 IsProcessorFeaturePresent 18218->18318 18219 2ba86f1 GetModuleFileNameW 18220 2ba8711 18219->18220 18225 2ba8721 __NMSG_WRITE 18219->18225 18222 2baf47d __NMSG_WRITE 55 API calls 18220->18222 18222->18225 18225->18218 18226 2ba8767 18225->18226 18268 2baf4f2 18225->18268 18226->18218 18277 2baf411 18226->18277 18341 2ba8228 GetModuleHandleExW 18238->18341 18245 2ba8a02 18241->18245 18242 2ba2eec _malloc 59 API calls 18242->18245 18243 2ba88f7 18243->18175 18243->18176 18245->18242 18245->18243 18344 2ba9445 Sleep 18245->18344 18247 2ba9169 InitializeCriticalSectionAndSpinCount 18246->18247 18248 2ba915c 18246->18248 18247->18185 18248->18185 18345 2ba8997 RtlLeaveCriticalSection 18249->18345 18251 2ba895c 18251->18173 18253 2bb00c8 18252->18253 18254 2ba5d9b __recalloc 59 API calls 18253->18254 18255 2bb00d2 18253->18255 18256 2bb00ee 18254->18256 18255->18196 18257 2ba4e35 __write 9 API calls 18256->18257 18258 2bb00f9 18257->18258 18258->18196 18260 2baf496 18259->18260 18261 2baf488 18259->18261 18262 2ba5d9b __recalloc 59 API calls 18260->18262 18261->18260 18266 2baf4af 18261->18266 18263 2baf4a0 18262->18263 18264 2ba4e35 __write 9 API calls 18263->18264 18265 2ba86e4 18264->18265 18265->18218 18265->18219 18266->18265 18267 2ba5d9b __recalloc 59 API calls 18266->18267 18267->18263 18312 2ba4493 18311->18312 18313 2ba4495 IsProcessorFeaturePresent 18311->18313 18312->18207 18315 2ba94cf 18313->18315 18324 2ba947e IsDebuggerPresent 18315->18324 18319 2ba4e50 18318->18319 18332 2ba4cd8 18319->18332 18325 2ba9493 ___raise_securityfailure 18324->18325 18330 2ba9468 SetUnhandledExceptionFilter UnhandledExceptionFilter 18325->18330 18327 2ba949b ___raise_securityfailure 18331 2ba9453 GetCurrentProcess TerminateProcess 18327->18331 18329 2ba94b8 18329->18207 18330->18327 18331->18329 18342 2ba8253 ExitProcess 18341->18342 18343 2ba8241 GetProcAddress 18341->18343 18343->18342 18344->18245 18345->18251 18349 2ba84e4 18346->18349 18348 2ba839a 18350 2ba84f0 __CRT_INIT@12 18349->18350 18351 2ba882d __lock 52 API calls 18350->18351 18352 2ba84f7 18351->18352 18353 2ba85b0 _doexit 18352->18353 18354 2ba8525 RtlDecodePointer 18352->18354 18369 2ba85fe 18353->18369 18354->18353 18356 2ba853c RtlDecodePointer 18354->18356 18362 2ba854c 18356->18362 18358 2ba860d __CRT_INIT@12 18358->18348 18360 2ba8559 RtlEncodePointer 18360->18362 18361 2ba85f5 18363 2ba825c _doexit 3 API calls 18361->18363 18362->18353 18362->18360 18364 2ba8569 RtlDecodePointer RtlEncodePointer 18362->18364 18365 2ba85fe 18363->18365 18366 2ba857b RtlDecodePointer RtlDecodePointer 18364->18366 18368 2ba860b 18365->18368 18374 2ba8997 RtlLeaveCriticalSection 18365->18374 18366->18362 18368->18348 18370 2ba8604 18369->18370 18372 2ba85de 18369->18372 18375 2ba8997 RtlLeaveCriticalSection 18370->18375 18372->18358 18373 2ba8997 RtlLeaveCriticalSection 18372->18373 18373->18361 18374->18368 18375->18372 18376->18161 18377->18164 18379 2ba4e1d 18378->18379 18380 2ba4e45 __invoke_watson 8 API calls 18379->18380 18381 2ba4e34 18380->18381 18382 2ba4e0a __write 8 API calls 18381->18382 18383 2ba229e 18382->18383 18383->17876 18385 2ba21cc 18384->18385 18390 2ba2219 18384->18390 18392 2ba5b9a 18385->18392 18388 2ba21f9 18388->18390 18412 2ba5481 18388->18412 18390->18092 18390->18098 18393 2ba5bb2 __getptd_noexit 59 API calls 18392->18393 18394 2ba5ba0 18393->18394 18395 2ba21d2 18394->18395 18396 2ba837f __amsg_exit 59 API calls 18394->18396 18395->18388 18397 2ba50ff 18395->18397 18396->18395 18398 2ba510b __CRT_INIT@12 18397->18398 18399 2ba5b9a CallCatchBlock 59 API calls 18398->18399 18400 2ba5114 18399->18400 18401 2ba5143 18400->18401 18403 2ba5127 18400->18403 18402 2ba882d __lock 59 API calls 18401->18402 18404 2ba514a 18402->18404 18405 2ba5b9a CallCatchBlock 59 API calls 18403->18405 18424 2ba517f 18404->18424 18407 2ba512c 18405->18407 18410 2ba513a __CRT_INIT@12 18407->18410 18411 2ba837f __amsg_exit 59 API calls 18407->18411 18410->18388 18411->18410 18413 2ba548d __CRT_INIT@12 18412->18413 18414 2ba5b9a CallCatchBlock 59 API calls 18413->18414 18415 2ba5497 18414->18415 18416 2ba882d __lock 59 API calls 18415->18416 18417 2ba54a9 18415->18417 18422 2ba54c7 18416->18422 18418 2ba54b7 __CRT_INIT@12 18417->18418 18420 2ba837f __amsg_exit 59 API calls 18417->18420 18418->18390 18419 2ba54f4 18678 2ba551e 18419->18678 18420->18418 18422->18419 18423 2ba2eb4 _free 59 API calls 18422->18423 18423->18419 18425 2ba518a ___addlocaleref ___removelocaleref 18424->18425 18427 2ba515e 18424->18427 18425->18427 18431 2ba4f05 18425->18431 18428 2ba5176 18427->18428 18677 2ba8997 RtlLeaveCriticalSection 18428->18677 18430 2ba517d 18430->18407 18432 2ba4f7e 18431->18432 18437 2ba4f1a 18431->18437 18433 2ba4fcb 18432->18433 18434 2ba2eb4 _free 59 API calls 18432->18434 18453 2ba4ff4 18433->18453 18501 2bad47d 18433->18501 18436 2ba4f9f 18434->18436 18441 2ba2eb4 _free 59 API calls 18436->18441 18437->18432 18440 2ba4f4b 18437->18440 18443 2ba2eb4 _free 59 API calls 18437->18443 18439 2ba4f69 18442 2ba2eb4 _free 59 API calls 18439->18442 18440->18439 18450 2ba2eb4 _free 59 API calls 18440->18450 18446 2ba4fb2 18441->18446 18447 2ba4f73 18442->18447 18448 2ba4f40 18443->18448 18444 2ba2eb4 _free 59 API calls 18444->18453 18445 2ba5053 18449 2ba2eb4 _free 59 API calls 18445->18449 18451 2ba2eb4 _free 59 API calls 18446->18451 18455 2ba2eb4 _free 59 API calls 18447->18455 18461 2bad31a 18448->18461 18457 2ba5059 18449->18457 18452 2ba4f5e 18450->18452 18454 2ba4fc0 18451->18454 18489 2bad416 18452->18489 18453->18445 18459 2ba2eb4 59 API calls _free 18453->18459 18460 2ba2eb4 _free 59 API calls 18454->18460 18455->18432 18457->18427 18459->18453 18460->18433 18463 2bad329 18461->18463 18488 2bad412 18461->18488 18462 2bad33a 18465 2bad34c 18462->18465 18466 2ba2eb4 _free 59 API calls 18462->18466 18463->18462 18464 2ba2eb4 _free 59 API calls 18463->18464 18464->18462 18467 2bad35e 18465->18467 18468 2ba2eb4 _free 59 API calls 18465->18468 18466->18465 18469 2bad370 18467->18469 18471 2ba2eb4 _free 59 API calls 18467->18471 18468->18467 18470 2bad382 18469->18470 18472 2ba2eb4 _free 59 API calls 18469->18472 18473 2bad394 18470->18473 18474 2ba2eb4 _free 59 API calls 18470->18474 18471->18469 18472->18470 18475 2bad3a6 18473->18475 18476 2ba2eb4 _free 59 API calls 18473->18476 18474->18473 18477 2bad3b8 18475->18477 18479 2ba2eb4 _free 59 API calls 18475->18479 18476->18475 18478 2bad3ca 18477->18478 18480 2ba2eb4 _free 59 API calls 18477->18480 18481 2bad3dc 18478->18481 18482 2ba2eb4 _free 59 API calls 18478->18482 18479->18477 18480->18478 18483 2bad3ee 18481->18483 18484 2ba2eb4 _free 59 API calls 18481->18484 18482->18481 18485 2bad400 18483->18485 18486 2ba2eb4 _free 59 API calls 18483->18486 18484->18483 18487 2ba2eb4 _free 59 API calls 18485->18487 18485->18488 18486->18485 18487->18488 18488->18440 18490 2bad421 18489->18490 18500 2bad479 18489->18500 18491 2bad431 18490->18491 18492 2ba2eb4 _free 59 API calls 18490->18492 18493 2bad443 18491->18493 18494 2ba2eb4 _free 59 API calls 18491->18494 18492->18491 18495 2bad455 18493->18495 18497 2ba2eb4 _free 59 API calls 18493->18497 18494->18493 18496 2bad467 18495->18496 18498 2ba2eb4 _free 59 API calls 18495->18498 18499 2ba2eb4 _free 59 API calls 18496->18499 18496->18500 18497->18495 18498->18496 18499->18500 18500->18439 18502 2ba4fe9 18501->18502 18503 2bad48c 18501->18503 18502->18444 18504 2ba2eb4 _free 59 API calls 18503->18504 18505 2bad494 18504->18505 18506 2ba2eb4 _free 59 API calls 18505->18506 18507 2bad49c 18506->18507 18508 2ba2eb4 _free 59 API calls 18507->18508 18509 2bad4a4 18508->18509 18510 2ba2eb4 _free 59 API calls 18509->18510 18511 2bad4ac 18510->18511 18512 2ba2eb4 _free 59 API calls 18511->18512 18513 2bad4b4 18512->18513 18514 2ba2eb4 _free 59 API calls 18513->18514 18515 2bad4bc 18514->18515 18516 2ba2eb4 _free 59 API calls 18515->18516 18517 2bad4c3 18516->18517 18518 2ba2eb4 _free 59 API calls 18517->18518 18519 2bad4cb 18518->18519 18520 2ba2eb4 _free 59 API calls 18519->18520 18521 2bad4d3 18520->18521 18522 2ba2eb4 _free 59 API calls 18521->18522 18523 2bad4db 18522->18523 18677->18430 18681 2ba8997 RtlLeaveCriticalSection 18678->18681 18680 2ba5525 18680->18417 18681->18680 18684 2ba44b9 RaiseException 18682->18684 18684->17931 18686 2b9df3d __EH_prolog 18685->18686 18687 2ba3a8f _Allocate 60 API calls 18686->18687 18688 2b9df54 18687->18688 18688->17935 18690 2ba0a79 18689->18690 18691 2b9513d 18689->18691 18703 2ba32e7 18690->18703 18691->17940 18694 2ba0a50 Mailbox 68 API calls 18693->18694 18696 2b9a672 18694->18696 18695 2b9519d 18695->17947 18695->17949 18695->17950 18696->18695 18769 2b92db5 18696->18769 18699 2ba0a50 Mailbox 68 API calls 18698->18699 18700 2b9ce26 18699->18700 18701 2b9cf35 18700->18701 18796 2b92b95 18700->18796 18701->17947 18706 2ba31eb 18703->18706 18705 2ba32f2 18705->18691 18707 2ba31f7 __CRT_INIT@12 18706->18707 18714 2ba84d2 18707->18714 18713 2ba321e __CRT_INIT@12 18713->18705 18715 2ba882d __lock 59 API calls 18714->18715 18716 2ba3200 18715->18716 18717 2ba322f RtlDecodePointer RtlDecodePointer 18716->18717 18718 2ba320c 18717->18718 18719 2ba325c 18717->18719 18728 2ba3229 18718->18728 18719->18718 18731 2ba909d 18719->18731 18721 2ba32bf RtlEncodePointer RtlEncodePointer 18721->18718 18722 2ba326e 18722->18721 18723 2ba3293 18722->18723 18738 2ba8a3b 18722->18738 18723->18718 18725 2ba8a3b __realloc_crt 62 API calls 18723->18725 18726 2ba32ad RtlEncodePointer 18723->18726 18727 2ba32a7 18725->18727 18726->18721 18727->18718 18727->18726 18765 2ba84db 18728->18765 18732 2ba90bb RtlSizeHeap 18731->18732 18733 2ba90a6 18731->18733 18732->18722 18734 2ba5d9b __recalloc 59 API calls 18733->18734 18735 2ba90ab 18734->18735 18736 2ba4e35 __write 9 API calls 18735->18736 18737 2ba90b6 18736->18737 18737->18722 18741 2ba8a42 18738->18741 18740 2ba8a7f 18740->18723 18741->18740 18743 2bb02e4 18741->18743 18764 2ba9445 Sleep 18741->18764 18744 2bb02f8 18743->18744 18745 2bb02ed 18743->18745 18747 2bb0300 18744->18747 18753 2bb030d 18744->18753 18746 2ba2eec _malloc 59 API calls 18745->18746 18748 2bb02f5 18746->18748 18749 2ba2eb4 _free 59 API calls 18747->18749 18748->18741 18763 2bb0308 _free 18749->18763 18750 2bb0345 18752 2ba8143 __calloc_impl RtlDecodePointer 18750->18752 18751 2bb0315 RtlReAllocateHeap 18751->18753 18751->18763 18754 2bb034b 18752->18754 18753->18750 18753->18751 18755 2bb0375 18753->18755 18757 2ba8143 __calloc_impl RtlDecodePointer 18753->18757 18760 2bb035d 18753->18760 18756 2ba5d9b __recalloc 59 API calls 18754->18756 18758 2ba5d9b __recalloc 59 API calls 18755->18758 18756->18763 18757->18753 18759 2bb037a GetLastError 18758->18759 18759->18763 18761 2ba5d9b __recalloc 59 API calls 18760->18761 18762 2bb0362 GetLastError 18761->18762 18762->18763 18763->18741 18764->18741 18768 2ba8997 RtlLeaveCriticalSection 18765->18768 18767 2ba322e 18767->18713 18768->18767 18770 2b92dca 18769->18770 18771 2b92de4 18769->18771 18772 2ba0a50 Mailbox 68 API calls 18770->18772 18773 2b92dfc 18771->18773 18776 2b92def 18771->18776 18775 2b92dcf 18772->18775 18783 2b92d39 WSASetLastError WSASend 18773->18783 18775->18696 18777 2ba0a50 Mailbox 68 API calls 18776->18777 18777->18775 18778 2ba0a50 68 API calls Mailbox 18781 2b92e0c 18778->18781 18779 2b92e54 WSASetLastError select 18793 2b9a43c 18779->18793 18781->18775 18781->18778 18781->18779 18782 2b92d39 71 API calls 18781->18782 18782->18781 18784 2b9a43c 69 API calls 18783->18784 18785 2b92d6e 18784->18785 18786 2b92d82 18785->18786 18787 2b92d75 18785->18787 18789 2ba0a50 Mailbox 68 API calls 18786->18789 18791 2b92d7a 18786->18791 18788 2ba0a50 Mailbox 68 API calls 18787->18788 18788->18791 18789->18791 18790 2b92d9c 18790->18781 18791->18790 18792 2ba0a50 Mailbox 68 API calls 18791->18792 18792->18790 18794 2ba0a50 Mailbox 68 API calls 18793->18794 18795 2b9a448 WSAGetLastError 18794->18795 18795->18781 18797 2b92bb1 18796->18797 18798 2b92bc7 18796->18798 18799 2ba0a50 Mailbox 68 API calls 18797->18799 18800 2b92bd2 18798->18800 18810 2b92bdf 18798->18810 18802 2b92bb6 18799->18802 18803 2ba0a50 Mailbox 68 API calls 18800->18803 18801 2b92be2 WSASetLastError WSARecv 18804 2b9a43c 69 API calls 18801->18804 18802->18700 18803->18802 18804->18810 18805 2ba0a50 68 API calls Mailbox 18805->18810 18806 2b92d22 18811 2b91996 18806->18811 18808 2b92cbc WSASetLastError select 18809 2b9a43c 69 API calls 18808->18809 18809->18810 18810->18801 18810->18802 18810->18805 18810->18806 18810->18808 18812 2b919bb 18811->18812 18813 2b9199f 18811->18813 18812->18802 18814 2ba32e7 __cinit 68 API calls 18813->18814 18814->18812 18837 2b9e1b3 18815->18837 18817 2b9d033 18817->17968 18919 2ba32fc 18818->18919 18821 2ba2054 18821->17970 18822 2ba207d ResumeThread 18822->17970 18823 2ba2076 CloseHandle 18823->18822 18825 2ba0a50 Mailbox 68 API calls 18824->18825 18826 2b93fb8 18825->18826 19274 2b91815 18826->19274 18829 2b9a5be 18830 2b9a5c8 __EH_prolog 18829->18830 19280 2b9cb76 18830->19280 18838 2b9e1bd __EH_prolog 18837->18838 18843 2b94030 18838->18843 18842 2b9e1eb 18842->18817 18855 2bb5330 18843->18855 18845 2b9403a GetProcessHeap RtlAllocateHeap 18846 2b9407c 18845->18846 18847 2b94053 std::exception::exception 18845->18847 18846->18842 18849 2b9408a 18846->18849 18856 2b9a5fd 18847->18856 18850 2b94094 __EH_prolog 18849->18850 18900 2b9a21c 18850->18900 18855->18845 18857 2b9a607 __EH_prolog 18856->18857 18864 2b9cbac 18857->18864 18862 2ba449a __CxxThrowException@8 RaiseException 18863 2b9a635 18862->18863 18870 2b9d70c 18864->18870 18867 2b9cbc6 18892 2b9d744 18867->18892 18869 2b9a624 18869->18862 18873 2ba2453 18870->18873 18876 2ba2481 18873->18876 18877 2ba248f 18876->18877 18878 2b9a616 18876->18878 18882 2ba2517 18877->18882 18878->18867 18883 2ba2520 18882->18883 18885 2ba2494 18882->18885 18884 2ba2eb4 _free 59 API calls 18883->18884 18884->18885 18885->18878 18886 2ba24d9 18885->18886 18887 2ba250a 18886->18887 18888 2ba24e5 _strlen 18886->18888 18887->18878 18889 2ba2eec _malloc 59 API calls 18888->18889 18890 2ba24f7 18889->18890 18890->18887 18891 2ba6bfc __setenvp 59 API calls 18890->18891 18891->18887 18893 2b9d74e __EH_prolog 18892->18893 18896 2b9b66f 18893->18896 18895 2b9d785 Mailbox 18895->18869 18897 2b9b679 __EH_prolog 18896->18897 18898 2ba2453 std::exception::exception 59 API calls 18897->18898 18899 2b9b68a Mailbox 18898->18899 18899->18895 18911 2b9b033 18900->18911 18903 2b93fdc 18918 2bb5330 18903->18918 18905 2b93fe6 CreateEventA 18906 2b93ffd 18905->18906 18907 2b9400f 18905->18907 18908 2b93fb0 Mailbox 68 API calls 18906->18908 18907->18842 18909 2b94005 18908->18909 18910 2b9a5be Mailbox 60 API calls 18909->18910 18910->18907 18912 2b940c1 18911->18912 18913 2b9b03f 18911->18913 18912->18903 18914 2ba3a8f _Allocate 60 API calls 18913->18914 18915 2b9b04f std::exception::exception 18913->18915 18914->18915 18915->18912 18916 2ba449a __CxxThrowException@8 RaiseException 18915->18916 18917 2b9fa64 18916->18917 18918->18905 18920 2ba330a 18919->18920 18921 2ba331e 18919->18921 18923 2ba5d9b __recalloc 59 API calls 18920->18923 18922 2ba89ac __calloc_crt 59 API calls 18921->18922 18924 2ba332b 18922->18924 18925 2ba330f 18923->18925 18927 2ba337c 18924->18927 18928 2ba5b9a CallCatchBlock 59 API calls 18924->18928 18926 2ba4e35 __write 9 API calls 18925->18926 18934 2ba204b 18926->18934 18929 2ba2eb4 _free 59 API calls 18927->18929 18930 2ba3338 18928->18930 18931 2ba3382 18929->18931 18932 2ba5c21 __initptd 59 API calls 18930->18932 18931->18934 18938 2ba5d7a 18931->18938 18935 2ba3341 CreateThread 18932->18935 18934->18821 18934->18822 18934->18823 18935->18934 18937 2ba3374 GetLastError 18935->18937 18946 2ba345c 18935->18946 18937->18927 18943 2ba5d67 18938->18943 18940 2ba5d83 _free 18941 2ba5d9b __recalloc 59 API calls 18940->18941 18942 2ba5d96 18941->18942 18942->18934 18944 2ba5bb2 __getptd_noexit 59 API calls 18943->18944 18945 2ba5d6c 18944->18945 18945->18940 18947 2ba3465 __threadstartex@4 18946->18947 18948 2ba910b __CRT_INIT@12 TlsGetValue 18947->18948 18949 2ba346b 18948->18949 18950 2ba349e 18949->18950 18951 2ba3472 __threadstartex@4 18949->18951 18978 2ba5a2f 18950->18978 18953 2ba912a __CRT_INIT@12 TlsSetValue 18951->18953 18954 2ba3481 18953->18954 18955 2ba3487 GetLastError RtlExitUserThread 18954->18955 18956 2ba3494 GetCurrentThreadId 18954->18956 18955->18956 18957 2ba34b9 ___crtIsPackagedApp 18956->18957 18960 2ba34cd 18957->18960 18962 2ba3404 18957->18962 18968 2ba3395 18960->18968 18963 2ba340d LoadLibraryExW GetProcAddress 18962->18963 18964 2ba3446 RtlDecodePointer 18962->18964 18965 2ba342f 18963->18965 18966 2ba3430 RtlEncodePointer 18963->18966 18967 2ba3456 18964->18967 18965->18960 18966->18964 18967->18960 18969 2ba33a1 __CRT_INIT@12 18968->18969 18970 2ba5b9a CallCatchBlock 59 API calls 18969->18970 18971 2ba33a6 18970->18971 19010 2ba20a0 18971->19010 18979 2ba5a3b __CRT_INIT@12 18978->18979 18980 2ba5a54 18979->18980 18982 2ba5b43 __CRT_INIT@12 18979->18982 18983 2ba2eb4 _free 59 API calls 18979->18983 18981 2ba5a63 18980->18981 18984 2ba2eb4 _free 59 API calls 18980->18984 18985 2ba5a72 18981->18985 18986 2ba2eb4 _free 59 API calls 18981->18986 18982->18957 18983->18980 18984->18981 18987 2ba5a81 18985->18987 18988 2ba2eb4 _free 59 API calls 18985->18988 18986->18985 18989 2ba5a90 18987->18989 18991 2ba2eb4 _free 59 API calls 18987->18991 18988->18987 18990 2ba5a9f 18989->18990 18992 2ba2eb4 _free 59 API calls 18989->18992 18993 2ba5aae 18990->18993 18994 2ba2eb4 _free 59 API calls 18990->18994 18991->18989 18992->18990 18995 2ba5ac0 18993->18995 18996 2ba2eb4 _free 59 API calls 18993->18996 18994->18993 18997 2ba882d __lock 59 API calls 18995->18997 18996->18995 18999 2ba5ac8 18997->18999 18998 2ba5aeb 19266 2ba5b4f 18998->19266 18999->18998 19002 2ba2eb4 _free 59 API calls 18999->19002 19002->18998 19003 2ba882d __lock 59 API calls 19028 2ba1550 19010->19028 19013 2ba20e8 TlsSetValue 19014 2ba20f0 19013->19014 19050 2b9dce7 19014->19050 19039 2ba15b4 19028->19039 19029 2ba1630 19030 2ba1646 19029->19030 19033 2ba1643 CloseHandle 19029->19033 19034 2ba448b __cftof_l 6 API calls 19030->19034 19031 2ba160e ResetEvent 19035 2ba1615 19031->19035 19032 2ba15cc 19032->19031 19036 2ba15e5 OpenEventA 19032->19036 19066 2ba1b50 19032->19066 19033->19030 19037 2ba165e 19034->19037 19070 2ba1790 19035->19070 19041 2ba15ff 19036->19041 19042 2ba1607 19036->19042 19037->19013 19037->19014 19038 2ba16dc WaitForSingleObject 19038->19039 19039->19029 19039->19032 19039->19038 19043 2ba16b0 CreateEventA 19039->19043 19047 2ba1b50 GetCurrentProcessId 19039->19047 19049 2ba16ce CloseHandle 19039->19049 19041->19042 19045 2ba1604 CloseHandle 19041->19045 19042->19031 19042->19035 19043->19039 19045->19042 19047->19039 19049->19039 19080 2ba0bb0 19066->19080 19068 2ba1ba2 GetCurrentProcessId 19069 2ba1bb5 19068->19069 19074 2ba179f 19070->19074 19071 2ba17f7 19074->19071 19075 2ba17d5 CreateEventA 19074->19075 19076 2ba1b50 GetCurrentProcessId 19074->19076 19075->19071 19080->19068 19272 2ba8997 RtlLeaveCriticalSection 19266->19272 19268 2ba5af8 19268->19003 19272->19268 19277 2ba2413 19274->19277 19278 2ba24d9 std::exception::_Copy_str 59 API calls 19277->19278 19279 2b9182a 19278->19279 19279->18829 19286 2b9d63d 19280->19286 19283 2b9cb90 19295 2b9d675 19283->19295 19289 2b9b161 19286->19289 19290 2b9b16b __EH_prolog 19289->19290 19291 2ba2453 std::exception::exception 59 API calls 19290->19291 19292 2b9b17c 19291->19292 19293 2b97c31 std::bad_exception::bad_exception 60 API calls 19292->19293 19294 2b9a5dd 19293->19294 19294->19283 19296 2b9d67f __EH_prolog 19295->19296 19299 2b9b559 19296->19299 19300 2b9b563 __EH_prolog 19299->19300 19301 2b9b161 std::bad_exception::bad_exception 60 API calls 19300->19301 19324 2ba9d71 19303->19324 19305 2ba5e4f 19306 2ba5e5a 19305->19306 19307 2ba5e71 19305->19307 19309 2ba5d9b __recalloc 59 API calls 19306->19309 19308 2ba5e76 19307->19308 19318 2ba5e83 __flsbuf 19307->19318 19310 2ba5d9b __recalloc 59 API calls 19308->19310 19317 2ba5e5f 19309->19317 19310->19317 19311 2ba5edd 19312 2ba5f61 19311->19312 19313 2ba5ee7 19311->19313 19314 2ba9d95 __write 79 API calls 19312->19314 19315 2ba5f01 19313->19315 19321 2ba5f18 19313->19321 19314->19317 19343 2ba9d95 19315->19343 19317->17984 19318->19311 19318->19317 19320 2ba5ed2 19318->19320 19331 2baf6e2 19318->19331 19320->19311 19340 2baf8a5 19320->19340 19321->19317 19371 2baf736 19321->19371 19325 2ba9d7b 19324->19325 19326 2ba9d90 19324->19326 19327 2ba5d9b __recalloc 59 API calls 19325->19327 19326->19305 19328 2ba9d80 19327->19328 19329 2ba4e35 __write 9 API calls 19328->19329 19330 2ba9d8b 19329->19330 19330->19305 19332 2baf6fa 19331->19332 19333 2baf6ed 19331->19333 19335 2baf706 19332->19335 19336 2ba5d9b __recalloc 59 API calls 19332->19336 19334 2ba5d9b __recalloc 59 API calls 19333->19334 19337 2baf6f2 19334->19337 19335->19320 19338 2baf727 19336->19338 19337->19320 19339 2ba4e35 __write 9 API calls 19338->19339 19339->19337 19341 2ba89f4 __malloc_crt 59 API calls 19340->19341 19342 2baf8ba 19341->19342 19342->19311 19344 2ba9da1 __CRT_INIT@12 19343->19344 19345 2ba9dae 19344->19345 19346 2ba9dc5 19344->19346 19347 2ba5d67 __write 59 API calls 19345->19347 19348 2ba9e64 19346->19348 19350 2ba9dd9 19346->19350 19349 2ba9db3 19347->19349 19351 2ba5d67 __write 59 API calls 19348->19351 19352 2ba5d9b __recalloc 59 API calls 19349->19352 19353 2ba9e01 19350->19353 19354 2ba9df7 19350->19354 19355 2ba9dfc 19351->19355 19366 2ba9dba __CRT_INIT@12 19352->19366 19396 2bb0bc7 19353->19396 19356 2ba5d67 __write 59 API calls 19354->19356 19359 2ba5d9b __recalloc 59 API calls 19355->19359 19356->19355 19358 2ba9e07 19360 2ba9e1a 19358->19360 19361 2ba9e2d 19358->19361 19362 2ba9e70 19359->19362 19405 2ba9e84 19360->19405 19365 2ba5d9b __recalloc 59 API calls 19361->19365 19364 2ba4e35 __write 9 API calls 19362->19364 19364->19366 19368 2ba9e32 19365->19368 19366->19317 19367 2ba9e26 19464 2ba9e5c 19367->19464 19369 2ba5d67 __write 59 API calls 19368->19369 19369->19367 19372 2baf742 __CRT_INIT@12 19371->19372 19373 2baf753 19372->19373 19377 2baf76b 19372->19377 19374 2ba5d67 __write 59 API calls 19373->19374 19376 2baf758 19374->19376 19375 2baf810 19378 2ba5d67 __write 59 API calls 19375->19378 19379 2ba5d9b __recalloc 59 API calls 19376->19379 19377->19375 19380 2baf7a0 19377->19380 19381 2baf815 19378->19381 19390 2baf760 __CRT_INIT@12 19379->19390 19382 2bb0bc7 ___lock_fhandle 60 API calls 19380->19382 19383 2ba5d9b __recalloc 59 API calls 19381->19383 19384 2baf7a6 19382->19384 19385 2baf81d 19383->19385 19386 2baf7bc 19384->19386 19387 2baf7d4 19384->19387 19388 2ba4e35 __write 9 API calls 19385->19388 19389 2baf832 __lseeki64_nolock 61 API calls 19386->19389 19391 2ba5d9b __recalloc 59 API calls 19387->19391 19388->19390 19392 2baf7cb 19389->19392 19390->19317 19393 2baf7d9 19391->19393 19500 2baf808 19392->19500 19394 2ba5d67 __write 59 API calls 19393->19394 19394->19392 19397 2bb0bd3 __CRT_INIT@12 19396->19397 19398 2bb0c22 RtlEnterCriticalSection 19397->19398 19399 2ba882d __lock 59 API calls 19397->19399 19400 2bb0c48 __CRT_INIT@12 19398->19400 19401 2bb0bf8 19399->19401 19400->19358 19402 2bb0c10 19401->19402 19403 2ba914c __ioinit InitializeCriticalSectionAndSpinCount 19401->19403 19467 2bb0c4c 19402->19467 19403->19402 19406 2ba9e91 __write_nolock 19405->19406 19407 2ba9eef 19406->19407 19408 2ba9ed0 19406->19408 19439 2ba9ec5 19406->19439 19411 2ba9f47 19407->19411 19412 2ba9f2b 19407->19412 19410 2ba5d67 __write 59 API calls 19408->19410 19409 2ba448b __cftof_l 6 API calls 19413 2baa6e5 19409->19413 19414 2ba9ed5 19410->19414 19416 2ba9f60 19411->19416 19471 2baf832 19411->19471 19415 2ba5d67 __write 59 API calls 19412->19415 19413->19367 19417 2ba5d9b __recalloc 59 API calls 19414->19417 19418 2ba9f30 19415->19418 19421 2baf6e2 __flsbuf 59 API calls 19416->19421 19420 2ba9edc 19417->19420 19423 2ba5d9b __recalloc 59 API calls 19418->19423 19424 2ba4e35 __write 9 API calls 19420->19424 19422 2ba9f6e 19421->19422 19425 2baa2c7 19422->19425 19430 2ba5b9a CallCatchBlock 59 API calls 19422->19430 19426 2ba9f37 19423->19426 19424->19439 19427 2baa65a WriteFile 19425->19427 19428 2baa2e5 19425->19428 19429 2ba4e35 __write 9 API calls 19426->19429 19431 2baa2ba GetLastError 19427->19431 19438 2baa287 19427->19438 19432 2baa409 19428->19432 19442 2baa2fb 19428->19442 19429->19439 19433 2ba9f9a GetConsoleMode 19430->19433 19431->19438 19435 2baa4fe 19432->19435 19436 2baa414 19432->19436 19433->19425 19437 2ba9fd9 19433->19437 19434 2baa693 19434->19439 19443 2ba5d9b __recalloc 59 API calls 19434->19443 19435->19434 19435->19438 19449 2baa573 WideCharToMultiByte 19435->19449 19454 2baa5c2 WriteFile 19435->19454 19436->19434 19436->19438 19450 2baa479 WriteFile 19436->19450 19437->19425 19440 2ba9fe9 GetConsoleCP 19437->19440 19438->19434 19438->19439 19444 2baa3e7 19438->19444 19439->19409 19440->19434 19460 2baa018 19440->19460 19441 2baa36a WriteFile 19441->19431 19441->19442 19442->19434 19442->19438 19442->19441 19445 2baa6c1 19443->19445 19447 2baa68a 19444->19447 19448 2baa3f2 19444->19448 19446 2ba5d67 __write 59 API calls 19445->19446 19446->19439 19452 2ba5d7a __dosmaperr 59 API calls 19447->19452 19451 2ba5d9b __recalloc 59 API calls 19448->19451 19449->19431 19449->19435 19450->19431 19450->19436 19453 2baa3f7 19451->19453 19452->19439 19455 2ba5d67 __write 59 API calls 19453->19455 19454->19435 19457 2baa615 GetLastError 19454->19457 19455->19439 19457->19435 19458 2baff4a 61 API calls __write_nolock 19458->19460 19459 2bb0f93 WriteConsoleW CreateFileW __putwch_nolock 19459->19460 19460->19431 19460->19438 19460->19458 19460->19459 19461 2baa101 WideCharToMultiByte 19460->19461 19463 2baa196 WriteFile 19460->19463 19480 2badc88 19460->19480 19461->19438 19462 2baa13c WriteFile 19461->19462 19462->19431 19462->19460 19463->19431 19463->19460 19499 2bb0f6d RtlLeaveCriticalSection 19464->19499 19466 2ba9e62 19466->19366 19470 2ba8997 RtlLeaveCriticalSection 19467->19470 19469 2bb0c53 19469->19398 19470->19469 19483 2bb0e84 19471->19483 19473 2baf842 19474 2baf84a 19473->19474 19475 2baf85b SetFilePointerEx 19473->19475 19476 2ba5d9b __recalloc 59 API calls 19474->19476 19477 2baf873 GetLastError 19475->19477 19479 2baf84f 19475->19479 19476->19479 19478 2ba5d7a __dosmaperr 59 API calls 19477->19478 19478->19479 19479->19416 19496 2badc4e 19480->19496 19484 2bb0e8f 19483->19484 19486 2bb0ea4 19483->19486 19485 2ba5d67 __write 59 API calls 19484->19485 19488 2bb0e94 19485->19488 19487 2ba5d67 __write 59 API calls 19486->19487 19489 2bb0ec9 19486->19489 19490 2bb0ed3 19487->19490 19491 2ba5d9b __recalloc 59 API calls 19488->19491 19489->19473 19493 2ba5d9b __recalloc 59 API calls 19490->19493 19492 2bb0e9c 19491->19492 19492->19473 19494 2bb0edb 19493->19494 19495 2ba4e35 __write 9 API calls 19494->19495 19495->19492 19497 2ba21bb _LocaleUpdate::_LocaleUpdate 59 API calls 19496->19497 19498 2badc5f 19497->19498 19498->19460 19499->19466 19503 2bb0f6d RtlLeaveCriticalSection 19500->19503 19502 2baf80e 19502->19390 19503->19502 19504->17989 19506 2b9e26d __EH_prolog 19505->19506 19507 2ba3a8f _Allocate 60 API calls 19506->19507 19508 2b9e276 19507->19508 19509 2b91bfa RtlEnterCriticalSection 19508->19509 19511 2b9e484 19508->19511 19509->17994 19512 2b9e48e __EH_prolog 19511->19512 19515 2b926db RtlEnterCriticalSection 19512->19515 19514 2b9e4e4 19514->19509 19516 2b92728 CreateWaitableTimerA 19515->19516 19517 2b9277e 19515->19517 19519 2b92738 GetLastError 19516->19519 19520 2b9275b SetWaitableTimer 19516->19520 19518 2b927d5 RtlLeaveCriticalSection 19517->19518 19521 2ba3a8f _Allocate 60 API calls 19517->19521 19518->19514 19522 2ba0a50 Mailbox 68 API calls 19519->19522 19520->19517 19523 2b9278a 19521->19523 19524 2b92745 19522->19524 19526 2ba3a8f _Allocate 60 API calls 19523->19526 19527 2b927c8 19523->19527 19559 2b91712 19524->19559 19529 2b927a9 19526->19529 19565 2b97d36 19527->19565 19531 2b91cf8 CreateEventA 19529->19531 19532 2b91d23 GetLastError 19531->19532 19533 2b91d52 CreateEventA 19531->19533 19536 2b91d33 19532->19536 19534 2b91d6b GetLastError 19533->19534 19551 2b91d96 19533->19551 19539 2b91d7b 19534->19539 19535 2ba32fc __beginthreadex 201 API calls 19537 2b91db6 19535->19537 19538 2ba0a50 Mailbox 68 API calls 19536->19538 19540 2b91e0d 19537->19540 19541 2b91dc6 GetLastError 19537->19541 19542 2b91d3c 19538->19542 19543 2ba0a50 Mailbox 68 API calls 19539->19543 19546 2b91e1d 19540->19546 19547 2b91e11 WaitForSingleObject CloseHandle 19540->19547 19548 2b91dd8 19541->19548 19544 2b91712 60 API calls 19542->19544 19545 2b91d84 19543->19545 19549 2b91d4e 19544->19549 19550 2b91712 60 API calls 19545->19550 19546->19527 19547->19546 19552 2b91ddc CloseHandle 19548->19552 19553 2b91ddf 19548->19553 19549->19533 19550->19551 19551->19535 19552->19553 19554 2b91de9 CloseHandle 19553->19554 19555 2b91dee 19553->19555 19554->19555 19556 2ba0a50 Mailbox 68 API calls 19555->19556 19557 2b91dfb 19556->19557 19558 2b91712 60 API calls 19557->19558 19558->19540 19560 2b9171c __EH_prolog 19559->19560 19561 2b9173e 19560->19561 19562 2b91815 Mailbox 59 API calls 19560->19562 19561->19520 19563 2b91732 19562->19563 19568 2b9a3d5 19563->19568 19566 2b97d52 19565->19566 19567 2b97d43 CloseHandle 19565->19567 19566->19518 19567->19566 19569 2b9a3df __EH_prolog 19568->19569 19576 2b9c93a 19569->19576 19573 2b9a400 19574 2ba449a __CxxThrowException@8 RaiseException 19573->19574 19575 2b9a40e 19574->19575 19577 2b9b161 std::bad_exception::bad_exception 60 API calls 19576->19577 19578 2b9a3f2 19577->19578 19579 2b9c976 19578->19579 19580 2b9c980 __EH_prolog 19579->19580 19583 2b9b110 19580->19583 19582 2b9c9af Mailbox 19582->19573 19584 2b9b11a __EH_prolog 19583->19584 19585 2b9b161 std::bad_exception::bad_exception 60 API calls 19584->19585 19586 2b9b12b Mailbox 19585->19586 19586->19582 19598 2b930ae WSASetLastError 19587->19598 19590 2b930ae 71 API calls 19591 2b93c90 19590->19591 19592 2b916ae 19591->19592 19593 2b916b8 __EH_prolog 19592->19593 19594 2b91701 19593->19594 19595 2ba2413 std::exception::exception 59 API calls 19593->19595 19594->17876 19596 2b916dc 19595->19596 19597 2b9a3d5 60 API calls 19596->19597 19597->19594 19599 2b930ec WSAStringToAddressA 19598->19599 19600 2b930ce 19598->19600 19602 2b9a43c 69 API calls 19599->19602 19600->19599 19601 2b930d3 19600->19601 19603 2ba0a50 Mailbox 68 API calls 19601->19603 19604 2b93114 19602->19604 19613 2b930d8 19603->19613 19605 2b93154 19604->19605 19608 2b9311e _memcmp 19604->19608 19606 2b93135 19605->19606 19609 2ba0a50 Mailbox 68 API calls 19605->19609 19607 2b93193 19606->19607 19610 2ba0a50 Mailbox 68 API calls 19606->19610 19612 2ba0a50 Mailbox 68 API calls 19607->19612 19607->19613 19608->19606 19611 2ba0a50 Mailbox 68 API calls 19608->19611 19609->19606 19610->19607 19611->19606 19612->19613 19613->19590 19613->19591 19615 2b93bdd __EH_prolog 19614->19615 19616 2b93bfe htonl htonl 19615->19616 19626 2ba23f7 19615->19626 19616->18009 19621 2b93c20 __EH_prolog 19620->19621 19622 2b93c41 19621->19622 19623 2ba23f7 std::bad_exception::bad_exception 59 API calls 19621->19623 19622->18009 19624 2b93c35 19623->19624 19625 2b9a58a 60 API calls 19624->19625 19625->19622 19627 2ba2413 std::exception::exception 59 API calls 19626->19627 19628 2b93bf2 19627->19628 19629 2b9a58a 19628->19629 19630 2b9a594 __EH_prolog 19629->19630 19637 2b9caad 19630->19637 19634 2b9a5af 19635 2ba449a __CxxThrowException@8 RaiseException 19634->19635 19636 2b9a5bd 19635->19636 19644 2ba23dc 19637->19644 19640 2b9cae9 19641 2b9caf3 __EH_prolog 19640->19641 19647 2b9b47f 19641->19647 19643 2b9cb22 Mailbox 19643->19634 19645 2ba2453 std::exception::exception 59 API calls 19644->19645 19646 2b9a5a1 19645->19646 19646->19640 19648 2b9b489 __EH_prolog 19647->19648 19649 2ba23dc std::bad_exception::bad_exception 59 API calls 19648->19649 19650 2b9b49a Mailbox 19649->19650 19650->19643 19672 2b9353e 19651->19672 19655 2b92ae8 WSASetLastError connect 19654->19655 19656 2b92ad8 19654->19656 19657 2b9a43c 69 API calls 19655->19657 19658 2ba0a50 Mailbox 68 API calls 19656->19658 19660 2b92b07 19657->19660 19659 2b92add 19658->19659 19662 2ba0a50 Mailbox 68 API calls 19659->19662 19660->19659 19661 2ba0a50 Mailbox 68 API calls 19660->19661 19661->19659 19663 2b92b1b 19662->19663 19665 2ba0a50 Mailbox 68 API calls 19663->19665 19667 2b92b38 19663->19667 19665->19667 19668 2b92b87 19667->19668 19732 2b93027 19667->19732 19668->18015 19671 2ba0a50 Mailbox 68 API calls 19671->19668 19673 2b93548 __EH_prolog 19672->19673 19674 2b93557 19673->19674 19675 2b93576 19673->19675 19676 2b91996 68 API calls 19674->19676 19694 2b92edd WSASetLastError WSASocketA 19675->19694 19691 2b9355f 19676->19691 19679 2b935ad CreateIoCompletionPort 19680 2b935db 19679->19680 19681 2b935c5 GetLastError 19679->19681 19682 2ba0a50 Mailbox 68 API calls 19680->19682 19683 2ba0a50 Mailbox 68 API calls 19681->19683 19684 2b935d2 19682->19684 19683->19684 19685 2b935ef 19684->19685 19686 2b93626 19684->19686 19687 2ba0a50 Mailbox 68 API calls 19685->19687 19720 2b9de26 19686->19720 19688 2b93608 19687->19688 19702 2b929ee 19688->19702 19691->18011 19692 2b93659 19693 2ba0a50 Mailbox 68 API calls 19692->19693 19693->19691 19695 2ba0a50 Mailbox 68 API calls 19694->19695 19696 2b92f0a WSAGetLastError 19695->19696 19697 2b92f21 19696->19697 19701 2b92f41 19696->19701 19698 2b92f3c 19697->19698 19699 2b92f27 setsockopt 19697->19699 19700 2ba0a50 Mailbox 68 API calls 19698->19700 19699->19698 19700->19701 19701->19679 19701->19691 19703 2b92a0c 19702->19703 19719 2b92aad 19702->19719 19704 2b92a39 WSASetLastError closesocket 19703->19704 19709 2ba0a50 Mailbox 68 API calls 19703->19709 19706 2b9a43c 69 API calls 19704->19706 19705 2ba0a50 Mailbox 68 API calls 19707 2b92ab8 19705->19707 19708 2b92a51 19706->19708 19707->19691 19711 2ba0a50 Mailbox 68 API calls 19708->19711 19708->19719 19710 2b92a21 19709->19710 19724 2b92f50 19710->19724 19714 2b92a5c 19711->19714 19715 2b92a7b ioctlsocket WSASetLastError closesocket 19714->19715 19716 2ba0a50 Mailbox 68 API calls 19714->19716 19718 2b9a43c 69 API calls 19715->19718 19717 2b92a6e 19716->19717 19717->19715 19717->19719 19718->19719 19719->19705 19719->19707 19721 2b9de30 __EH_prolog 19720->19721 19722 2ba3a8f _Allocate 60 API calls 19721->19722 19723 2b9de44 19722->19723 19723->19692 19725 2b92f5b 19724->19725 19726 2b92f70 WSASetLastError setsockopt 19724->19726 19727 2ba0a50 Mailbox 68 API calls 19725->19727 19728 2b9a43c 69 API calls 19726->19728 19731 2b92a36 19727->19731 19729 2b92f9e 19728->19729 19730 2ba0a50 Mailbox 68 API calls 19729->19730 19729->19731 19730->19731 19731->19704 19733 2b9303b 19732->19733 19734 2b9304d WSASetLastError select 19732->19734 19735 2ba0a50 Mailbox 68 API calls 19733->19735 19736 2b9a43c 69 API calls 19734->19736 19739 2b92b59 19735->19739 19737 2b93095 19736->19737 19738 2ba0a50 Mailbox 68 API calls 19737->19738 19737->19739 19738->19739 19739->19668 19740 2b92fb4 19739->19740 19741 2b92fc0 19740->19741 19742 2b92fd5 WSASetLastError getsockopt 19740->19742 19743 2ba0a50 Mailbox 68 API calls 19741->19743 19744 2b9a43c 69 API calls 19742->19744 19746 2b92b7a 19743->19746 19745 2b9300f 19744->19745 19745->19746 19747 2ba0a50 Mailbox 68 API calls 19745->19747 19746->19668 19746->19671 19747->19746 19755 2bb5330 19748->19755 19750 2b932b5 RtlEnterCriticalSection 19751 2ba0a50 Mailbox 68 API calls 19750->19751 19752 2b932d6 19751->19752 19756 2b93307 19752->19756 19755->19750 19758 2b93311 __EH_prolog 19756->19758 19759 2b93350 19758->19759 19768 2b97db5 19758->19768 19772 2b9239d 19759->19772 19762 2b93390 19778 2b97d5e 19762->19778 19763 2ba0a50 Mailbox 68 API calls 19765 2b9337c 19763->19765 19767 2b92d39 71 API calls 19765->19767 19767->19762 19771 2b97dc3 19768->19771 19769 2b97e39 19769->19758 19771->19769 19782 2b9891a 19771->19782 19775 2b923ab 19772->19775 19773 2b92417 19773->19762 19773->19763 19774 2b923c1 PostQueuedCompletionStatus 19774->19775 19776 2b923da RtlEnterCriticalSection 19774->19776 19775->19773 19775->19774 19777 2b923f8 InterlockedExchange RtlLeaveCriticalSection 19775->19777 19776->19775 19777->19775 19779 2b97d63 19778->19779 19780 2b932ee RtlLeaveCriticalSection 19779->19780 19798 2b91e7f 19779->19798 19780->18030 19783 2b98944 19782->19783 19784 2b97d5e 68 API calls 19783->19784 19785 2b9898a 19784->19785 19786 2b989b1 19785->19786 19788 2b9a1a7 19785->19788 19786->19769 19789 2b9a1b1 19788->19789 19790 2b9a1c1 19788->19790 19789->19790 19793 2b9fa65 19789->19793 19790->19786 19794 2ba2413 std::exception::exception 59 API calls 19793->19794 19795 2b9fa7d 19794->19795 19796 2ba449a __CxxThrowException@8 RaiseException 19795->19796 19797 2b9fa92 19796->19797 19799 2ba0a50 Mailbox 68 API calls 19798->19799 19800 2b91e90 19799->19800 19800->19779 19802 2ba27cb 19801->19802 19803 2ba5d9b __recalloc 59 API calls 19802->19803 19806 2ba27db _strlen 19802->19806 19804 2ba27d0 19803->19804 19805 2ba4e35 __write 9 API calls 19804->19805 19805->19806 19806->18038 19808 2b9a645 GetProcessHeap HeapFree 19807->19808 19808->18051 19810 2b93770 19809->19810 19811 2b93755 InterlockedCompareExchange 19809->19811 19813 2ba0a50 Mailbox 68 API calls 19810->19813 19811->19810 19812 2b93765 19811->19812 19814 2b932ab 78 API calls 19812->19814 19815 2b93779 19813->19815 19814->19810 19816 2b929ee 76 API calls 19815->19816 19817 2b9378e 19816->19817 19817->18057 19847 2ba35f0 19818->19847 19820 2b953c8 19820->18067 19821 2ba3849 19820->19821 19822 2ba3855 __CRT_INIT@12 19821->19822 19823 2ba388b 19822->19823 19824 2ba3873 19822->19824 19826 2ba3883 __CRT_INIT@12 19822->19826 19989 2ba9732 19823->19989 19825 2ba5d9b __recalloc 59 API calls 19824->19825 19828 2ba3878 19825->19828 19826->18069 19830 2ba4e35 __write 9 API calls 19828->19830 19830->19826 19835 2ba39d3 __CRT_INIT@12 19834->19835 19836 2ba39e7 19835->19836 19838 2ba39ff 19835->19838 19837 2ba5d9b __recalloc 59 API calls 19836->19837 19839 2ba39ec 19837->19839 19840 2ba9732 __lock_file 60 API calls 19838->19840 19844 2ba39f7 __CRT_INIT@12 19838->19844 19842 2ba4e35 __write 9 API calls 19839->19842 19841 2ba3a11 19840->19841 20016 2ba395b 19841->20016 19842->19844 19844->18067 19850 2ba35fc __CRT_INIT@12 19847->19850 19848 2ba360e 19849 2ba5d9b __recalloc 59 API calls 19848->19849 19851 2ba3613 19849->19851 19850->19848 19852 2ba363b 19850->19852 19853 2ba4e35 __write 9 API calls 19851->19853 19866 2ba9808 19852->19866 19863 2ba361e @_EH4_CallFilterFunc@8 __CRT_INIT@12 19853->19863 19855 2ba3640 19856 2ba3649 19855->19856 19857 2ba3656 19855->19857 19860 2ba5d9b __recalloc 59 API calls 19856->19860 19858 2ba367f 19857->19858 19859 2ba365f 19857->19859 19881 2ba9927 19858->19881 19861 2ba5d9b __recalloc 59 API calls 19859->19861 19860->19863 19861->19863 19863->19820 19867 2ba9814 __CRT_INIT@12 19866->19867 19868 2ba882d __lock 59 API calls 19867->19868 19879 2ba9822 19868->19879 19869 2ba9896 19911 2ba991e 19869->19911 19870 2ba989d 19871 2ba89f4 __malloc_crt 59 API calls 19870->19871 19873 2ba98a4 19871->19873 19873->19869 19875 2ba914c __ioinit InitializeCriticalSectionAndSpinCount 19873->19875 19874 2ba9913 __CRT_INIT@12 19874->19855 19878 2ba98ca RtlEnterCriticalSection 19875->19878 19876 2ba88b5 __mtinitlocknum 59 API calls 19876->19879 19878->19869 19879->19869 19879->19870 19879->19876 19901 2ba9771 19879->19901 19906 2ba97db 19879->19906 19890 2ba9944 19881->19890 19882 2ba9958 19884 2ba5d9b __recalloc 59 API calls 19882->19884 19883 2ba9aff 19883->19882 19886 2ba9b5b 19883->19886 19885 2ba995d 19884->19885 19887 2ba4e35 __write 9 API calls 19885->19887 19922 2bb0770 19886->19922 19889 2ba368a 19887->19889 19898 2ba36ac 19889->19898 19890->19882 19890->19883 19916 2bb078e 19890->19916 19895 2bb08bd __openfile 59 API calls 19896 2ba9b17 19895->19896 19896->19883 19897 2bb08bd __openfile 59 API calls 19896->19897 19897->19883 19982 2ba97a1 19898->19982 19900 2ba36b2 19900->19863 19902 2ba977c 19901->19902 19903 2ba9792 RtlEnterCriticalSection 19901->19903 19904 2ba882d __lock 59 API calls 19902->19904 19903->19879 19905 2ba9785 19904->19905 19905->19879 19907 2ba97e9 19906->19907 19908 2ba97fc RtlLeaveCriticalSection 19906->19908 19914 2ba8997 RtlLeaveCriticalSection 19907->19914 19908->19879 19910 2ba97f9 19910->19879 19915 2ba8997 RtlLeaveCriticalSection 19911->19915 19913 2ba9925 19913->19874 19914->19910 19915->19913 19925 2bb07a6 19916->19925 19918 2ba9ac5 19918->19882 19919 2bb08bd 19918->19919 19933 2bb08d5 19919->19933 19921 2ba9af8 19921->19883 19921->19895 19940 2bb0659 19922->19940 19924 2bb0789 19924->19889 19926 2bb07bb 19925->19926 19929 2bb07b4 19925->19929 19927 2ba21bb _LocaleUpdate::_LocaleUpdate 59 API calls 19926->19927 19928 2bb07c8 19927->19928 19928->19929 19930 2ba5d9b __recalloc 59 API calls 19928->19930 19929->19918 19931 2bb07fb 19930->19931 19932 2ba4e35 __write 9 API calls 19931->19932 19932->19929 19934 2ba21bb _LocaleUpdate::_LocaleUpdate 59 API calls 19933->19934 19936 2bb08e8 19934->19936 19935 2bb08fd 19935->19921 19936->19935 19937 2ba5d9b __recalloc 59 API calls 19936->19937 19938 2bb0929 19937->19938 19939 2ba4e35 __write 9 API calls 19938->19939 19939->19935 19942 2bb0665 __CRT_INIT@12 19940->19942 19941 2bb067b 19943 2ba5d9b __recalloc 59 API calls 19941->19943 19942->19941 19945 2bb06b1 19942->19945 19944 2bb0680 19943->19944 19946 2ba4e35 __write 9 API calls 19944->19946 19951 2bb0722 19945->19951 19950 2bb068a __CRT_INIT@12 19946->19950 19950->19924 19960 2ba8176 19951->19960 19953 2bb0736 19954 2ba2eb4 _free 59 API calls 19953->19954 19955 2bb06cd 19953->19955 19954->19955 19956 2bb06f6 19955->19956 19957 2bb06fc 19956->19957 19959 2bb0720 19956->19959 19981 2bb0f6d RtlLeaveCriticalSection 19957->19981 19959->19950 19961 2ba8199 19960->19961 19962 2ba8183 19960->19962 19961->19962 19963 2ba81a0 ___crtIsPackagedApp 19961->19963 19964 2ba5d9b __recalloc 59 API calls 19962->19964 19967 2ba81a9 AreFileApisANSI 19963->19967 19968 2ba81b6 MultiByteToWideChar 19963->19968 19965 2ba8188 19964->19965 19966 2ba4e35 __write 9 API calls 19965->19966 19969 2ba8192 19966->19969 19967->19968 19970 2ba81b3 19967->19970 19971 2ba81d0 GetLastError 19968->19971 19972 2ba81e1 19968->19972 19969->19953 19970->19968 19973 2ba5d7a __dosmaperr 59 API calls 19971->19973 19974 2ba89f4 __malloc_crt 59 API calls 19972->19974 19973->19969 19975 2ba81e9 19974->19975 19975->19969 19976 2ba81f0 MultiByteToWideChar 19975->19976 19976->19969 19977 2ba8206 GetLastError 19976->19977 19978 2ba5d7a __dosmaperr 59 API calls 19977->19978 19979 2ba8212 19978->19979 19980 2ba2eb4 _free 59 API calls 19979->19980 19980->19969 19981->19959 19983 2ba97cf RtlLeaveCriticalSection 19982->19983 19984 2ba97b0 19982->19984 19983->19900 19984->19983 19985 2ba97b7 19984->19985 19988 2ba8997 RtlLeaveCriticalSection 19985->19988 19987 2ba97cc 19987->19900 19988->19987 19990 2ba9742 19989->19990 19991 2ba9764 RtlEnterCriticalSection 19989->19991 19990->19991 19992 2ba974a 19990->19992 19993 2ba3891 19991->19993 19994 2ba882d __lock 59 API calls 19992->19994 19995 2ba36f0 19993->19995 19994->19993 19998 2ba36ff 19995->19998 20002 2ba371d 19995->20002 19996 2ba370d 19997 2ba5d9b __recalloc 59 API calls 19996->19997 19999 2ba3712 19997->19999 19998->19996 19998->20002 20006 2ba3737 _memmove 19998->20006 20000 2ba4e35 __write 9 API calls 19999->20000 20000->20002 20001 2ba5e41 __flsbuf 79 API calls 20001->20006 20007 2ba38c3 20002->20007 20004 2ba9d71 __filbuf 59 API calls 20004->20006 20005 2ba9d95 __write 79 API calls 20005->20006 20006->20001 20006->20002 20006->20004 20006->20005 20010 2baa72f 20006->20010 20008 2ba97a1 __fsopen 2 API calls 20007->20008 20009 2ba38c9 20008->20009 20009->19826 20011 2baa766 20010->20011 20012 2baa742 20010->20012 20011->20006 20012->20011 20013 2ba9d71 __filbuf 59 API calls 20012->20013 20014 2baa75f 20013->20014 20015 2ba9d95 __write 79 API calls 20014->20015 20015->20011 20017 2ba396a 20016->20017 20018 2ba397e 20016->20018 20019 2ba5d9b __recalloc 59 API calls 20017->20019 20020 2baa72f __flush 79 API calls 20018->20020 20025 2ba397a 20018->20025 20021 2ba396f 20019->20021 20022 2ba398a 20020->20022 20023 2ba4e35 __write 9 API calls 20021->20023 20035 2bab1db 20022->20035 20023->20025 20032 2ba3a36 20025->20032 20027 2ba9d71 __filbuf 59 API calls 20028 2ba3998 20027->20028 20039 2bab066 20028->20039 20030 2ba399e 20030->20025 20031 2ba2eb4 _free 59 API calls 20030->20031 20031->20025 20033 2ba97a1 __fsopen 2 API calls 20032->20033 20034 2ba3a3c 20033->20034 20034->19844 20036 2ba3992 20035->20036 20037 2bab1e8 20035->20037 20036->20027 20037->20036 20038 2ba2eb4 _free 59 API calls 20037->20038 20038->20036 20040 2bab072 __CRT_INIT@12 20039->20040 20041 2bab07f 20040->20041 20042 2bab096 20040->20042 20044 2ba5d67 __write 59 API calls 20041->20044 20043 2bab121 20042->20043 20046 2bab0a6 20042->20046 20047 2ba5d67 __write 59 API calls 20043->20047 20045 2bab084 20044->20045 20048 2ba5d9b __recalloc 59 API calls 20045->20048 20049 2bab0ce 20046->20049 20050 2bab0c4 20046->20050 20051 2bab0c9 20047->20051 20062 2bab08b __CRT_INIT@12 20048->20062 20053 2bb0bc7 ___lock_fhandle 60 API calls 20049->20053 20052 2ba5d67 __write 59 API calls 20050->20052 20054 2ba5d9b __recalloc 59 API calls 20051->20054 20052->20051 20055 2bab0d4 20053->20055 20056 2bab12d 20054->20056 20057 2bab0f2 20055->20057 20058 2bab0e7 20055->20058 20060 2ba4e35 __write 9 API calls 20056->20060 20059 2ba5d9b __recalloc 59 API calls 20057->20059 20065 2bab141 20058->20065 20063 2bab0ed 20059->20063 20060->20062 20062->20030 20080 2bab119 20063->20080 20066 2bb0e84 __close_nolock 59 API calls 20065->20066 20067 2bab14f 20066->20067 20068 2bab1a5 20067->20068 20070 2bb0e84 __close_nolock 59 API calls 20067->20070 20079 2bab183 20067->20079 20083 2bb0dfe 20068->20083 20073 2bab17a 20070->20073 20071 2bb0e84 __close_nolock 59 API calls 20074 2bab18f CloseHandle 20071->20074 20076 2bb0e84 __close_nolock 59 API calls 20073->20076 20074->20068 20076->20079 20079->20068 20079->20071 20092 2bb0f6d RtlLeaveCriticalSection 20080->20092 20082 2bab11f 20082->20062 20084 2bb0e6a 20083->20084 20085 2bb0e0a 20083->20085 20085->20084 20092->20082 20094 2b98855 20093->20094 20095 2b99082 20093->20095 20098 2b9908d 20094->20098 20096 2b9fa93 std::bad_exception::bad_exception 60 API calls 20095->20096 20097 2b9908c 20096->20097 20099 2b99104 20098->20099 20102 2b9909e _memmove 20098->20102 20100 2b9fa93 std::bad_exception::bad_exception 60 API calls 20099->20100 20101 2b9910e 20100->20101 20102->18082 20104 2ba2413 std::exception::exception 59 API calls 20103->20104 20105 2b9faab 20104->20105 20106 2ba449a __CxxThrowException@8 RaiseException 20105->20106 20107 2b9fac0 20106->20107 20108 40b289 20109 40b5d2 20108->20109 20112 401f64 FindResourceA 20109->20112 20111 40b5d7 20113 401f86 GetLastError SizeofResource 20112->20113 20119 401f9f 20112->20119 20114 401fa6 LoadResource LockResource GlobalAlloc 20113->20114 20113->20119 20115 401fd2 20114->20115 20116 401ffb GetTickCount 20115->20116 20118 402005 GlobalAlloc 20116->20118 20118->20119 20119->20111 20120 40b4ca RegSetValueExA 20121 40b56b RegCloseKey 20120->20121 20122 40b571 20121->20122 20123 40258b RegCreateKeyExA 20124 402599 20123->20124 20459 2b9f7d6 CreateFileA 20460 2b9f8d2 20459->20460 20463 2b9f807 20459->20463 20461 2b9f81f DeviceIoControl 20461->20463 20462 2b9f8c8 CloseHandle 20462->20460 20463->20461 20463->20462 20464 2b9f894 GetLastError 20463->20464 20465 2ba3a8f _Allocate 60 API calls 20463->20465 20464->20462 20464->20463 20465->20463 20125 402212 20126 402286 LoadLibraryExA 20125->20126 20127 40b8b9 20126->20127 20466 40b1b2 RegCloseKey 20467 402573 20468 402578 lstrcmpiW 20467->20468 20470 40254c 20468->20470 20470->20470 20471 40b174 20472 40b211 OpenSCManagerA 20471->20472 20474 2b9104d 20475 2ba32e7 __cinit 68 API calls 20474->20475 20476 2b91057 20475->20476 20479 2b91aa9 InterlockedIncrement 20476->20479 20480 2b9105c 20479->20480 20481 2b91ac5 WSAStartup InterlockedExchange 20479->20481 20481->20480 20482 2c03737 20483 2c064f2 CreateFileA 20482->20483 20485 2c0bf0a 20483->20485 20485->20485 20130 40229b 20131 40b43d CreateDirectoryA 20130->20131 20486 40b5bd CopyFileA 20487 40b5cb 20486->20487 20488 4021cb 20486->20488 20491 2ba3c52 20488->20491 20492 2ba3c5b 20491->20492 20493 2ba3c60 20491->20493 20505 2bab821 20492->20505 20497 2ba3c75 20493->20497 20496 40b44f 20499 2ba3c81 __CRT_INIT@12 20497->20499 20498 2ba3ccf ___DllMainCRTStartup 20500 2ba3d2c __CRT_INIT@12 20498->20500 20502 2ba3d09 20498->20502 20504 2ba3ae0 __CRT_INIT@12 138 API calls 20498->20504 20499->20498 20499->20500 20509 2ba3ae0 20499->20509 20500->20496 20502->20500 20503 2ba3ae0 __CRT_INIT@12 138 API calls 20502->20503 20503->20500 20504->20502 20506 2bab851 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 20505->20506 20507 2bab844 20505->20507 20508 2bab848 20506->20508 20507->20506 20507->20508 20508->20493 20510 2ba3aec __CRT_INIT@12 20509->20510 20511 2ba3b6e 20510->20511 20512 2ba3af4 20510->20512 20514 2ba3b72 20511->20514 20515 2ba3bd7 20511->20515 20557 2ba8126 GetProcessHeap 20512->20557 20519 2ba3b93 20514->20519 20550 2ba3afd __CRT_INIT@12 20514->20550 20658 2ba839b 20514->20658 20517 2ba3c3a 20515->20517 20518 2ba3bdc 20515->20518 20516 2ba3af9 20516->20550 20558 2ba5cd4 20516->20558 20521 2ba5b64 __freeptd 59 API calls 20517->20521 20517->20550 20520 2ba910b __CRT_INIT@12 TlsGetValue 20518->20520 20661 2ba8272 RtlDecodePointer 20519->20661 20524 2ba3be7 20520->20524 20521->20550 20528 2ba89ac __calloc_crt 59 API calls 20524->20528 20524->20550 20526 2ba3b09 __RTC_Initialize 20534 2ba3b19 GetCommandLineA 20526->20534 20526->20550 20531 2ba3bf8 20528->20531 20529 2ba3ba9 __CRT_INIT@12 20685 2ba3bc2 20529->20685 20537 2ba912a __CRT_INIT@12 TlsSetValue 20531->20537 20531->20550 20532 2bab4bf __ioterm 60 API calls 20533 2ba3ba4 20532->20533 20535 2ba5d4a __mtterm 62 API calls 20533->20535 20579 2bab8bd GetEnvironmentStringsW 20534->20579 20535->20529 20538 2ba3c10 20537->20538 20540 2ba3c2e 20538->20540 20541 2ba3c16 20538->20541 20544 2ba2eb4 _free 59 API calls 20540->20544 20543 2ba5c21 __initptd 59 API calls 20541->20543 20546 2ba3c1e GetCurrentThreadId 20543->20546 20544->20550 20545 2ba3b33 20547 2ba3b37 20545->20547 20611 2bab511 20545->20611 20546->20550 20644 2ba5d4a 20547->20644 20550->20498 20552 2ba3b57 20552->20550 20557->20516 20689 2ba8442 RtlEncodePointer 20558->20689 20560 2ba5cd9 20694 2ba895e 20560->20694 20563 2ba5ce2 20565 2ba5d4a __mtterm 62 API calls 20563->20565 20566 2ba5ce7 20565->20566 20566->20526 20568 2ba5cff 20569 2ba89ac __calloc_crt 59 API calls 20568->20569 20570 2ba5d0c 20569->20570 20571 2ba5d41 20570->20571 20572 2ba912a __CRT_INIT@12 TlsSetValue 20570->20572 20573 2ba5d4a __mtterm 62 API calls 20571->20573 20574 2ba5d20 20572->20574 20575 2ba5d46 20573->20575 20574->20571 20576 2ba5d26 20574->20576 20575->20526 20577 2ba5c21 __initptd 59 API calls 20576->20577 20578 2ba5d2e GetCurrentThreadId 20577->20578 20578->20526 20580 2bab8d0 WideCharToMultiByte 20579->20580 20581 2ba3b29 20579->20581 20583 2bab93a FreeEnvironmentStringsW 20580->20583 20584 2bab903 20580->20584 20592 2bab20b 20581->20592 20583->20581 20585 2ba89f4 __malloc_crt 59 API calls 20584->20585 20586 2bab909 20585->20586 20586->20583 20587 2bab910 WideCharToMultiByte 20586->20587 20588 2bab92f FreeEnvironmentStringsW 20587->20588 20589 2bab926 20587->20589 20588->20581 20590 2ba2eb4 _free 59 API calls 20589->20590 20591 2bab92c 20590->20591 20591->20588 20593 2bab217 __CRT_INIT@12 20592->20593 20594 2ba882d __lock 59 API calls 20593->20594 20595 2bab21e 20594->20595 20596 2ba89ac __calloc_crt 59 API calls 20595->20596 20598 2bab22f 20596->20598 20597 2bab29a GetStartupInfoW 20605 2bab2af 20597->20605 20608 2bab3de 20597->20608 20598->20597 20599 2bab23a @_EH4_CallFilterFunc@8 __CRT_INIT@12 20598->20599 20599->20545 20600 2bab4a6 20702 2bab4b6 20600->20702 20602 2ba89ac __calloc_crt 59 API calls 20602->20605 20603 2bab42b GetStdHandle 20603->20608 20604 2bab43e GetFileType 20604->20608 20605->20602 20606 2bab2fd 20605->20606 20605->20608 20607 2bab331 GetFileType 20606->20607 20606->20608 20609 2ba914c __ioinit InitializeCriticalSectionAndSpinCount 20606->20609 20607->20606 20608->20600 20608->20603 20608->20604 20610 2ba914c __ioinit InitializeCriticalSectionAndSpinCount 20608->20610 20609->20606 20610->20608 20612 2bab51f 20611->20612 20613 2bab524 GetModuleFileNameA 20611->20613 20712 2ba51ca 20612->20712 20615 2bab551 20613->20615 20706 2bab5c4 20615->20706 20617 2ba3b43 20617->20552 20622 2bab740 20617->20622 20619 2ba89f4 __malloc_crt 59 API calls 20620 2bab58a 20619->20620 20620->20617 20645 2ba5d54 20644->20645 20647 2ba5d5a 20644->20647 20838 2ba90ec 20645->20838 20648 2ba8877 RtlDeleteCriticalSection 20647->20648 20650 2ba8893 20647->20650 20649 2ba2eb4 _free 59 API calls 20648->20649 20649->20647 20651 2ba88b2 20650->20651 20652 2ba889f RtlDeleteCriticalSection 20650->20652 20651->20550 20652->20650 20659 2ba84e4 _doexit 59 API calls 20658->20659 20660 2ba83a6 20659->20660 20660->20519 20662 2ba828c 20661->20662 20663 2ba829e 20661->20663 20662->20663 20666 2ba2eb4 _free 59 API calls 20662->20666 20664 2ba2eb4 _free 59 API calls 20663->20664 20665 2ba82ab 20664->20665 20667 2ba82cf 20665->20667 20669 2ba2eb4 _free 59 API calls 20665->20669 20666->20662 20668 2ba2eb4 _free 59 API calls 20667->20668 20670 2ba82db 20668->20670 20669->20665 20671 2ba2eb4 _free 59 API calls 20670->20671 20672 2ba82ec 20671->20672 20673 2ba2eb4 _free 59 API calls 20672->20673 20674 2ba82f7 20673->20674 20675 2ba831c RtlEncodePointer 20674->20675 20678 2ba2eb4 _free 59 API calls 20674->20678 20676 2ba8337 20675->20676 20677 2ba8331 20675->20677 20680 2ba834d 20676->20680 20682 2ba2eb4 _free 59 API calls 20676->20682 20679 2ba2eb4 _free 59 API calls 20677->20679 20681 2ba831b 20678->20681 20679->20676 20683 2ba3b98 20680->20683 20684 2ba2eb4 _free 59 API calls 20680->20684 20681->20675 20682->20680 20683->20529 20683->20532 20684->20683 20686 2ba3bc6 20685->20686 20687 2ba3bd4 20685->20687 20686->20687 20688 2ba5d4a __mtterm 62 API calls 20686->20688 20687->20550 20688->20687 20690 2ba8453 __init_pointers __initp_misc_winsig 20689->20690 20701 2ba394a RtlEncodePointer 20690->20701 20692 2ba846b __init_pointers 20693 2ba91ba 34 API calls 20692->20693 20693->20560 20695 2ba896a 20694->20695 20696 2ba914c __ioinit InitializeCriticalSectionAndSpinCount 20695->20696 20697 2ba5cde 20695->20697 20696->20695 20697->20563 20698 2ba90ce 20697->20698 20699 2ba5cf4 20698->20699 20700 2ba90e5 TlsAlloc 20698->20700 20699->20563 20699->20568 20701->20692 20705 2ba8997 RtlLeaveCriticalSection 20702->20705 20704 2bab4bd 20704->20599 20705->20704 20708 2bab5e6 20706->20708 20711 2bab64a 20708->20711 20716 2bb1516 20708->20716 20709 2bab567 20709->20617 20709->20619 20710 2bb1516 _parse_cmdline 59 API calls 20710->20711 20711->20709 20711->20710 20713 2ba51d3 20712->20713 20714 2ba51da 20712->20714 20722 2ba5527 20713->20722 20714->20613 20719 2bb14bc 20716->20719 20720 2ba21bb _LocaleUpdate::_LocaleUpdate 59 API calls 20719->20720 20721 2bb14ce 20720->20721 20721->20708 20723 2ba5533 __CRT_INIT@12 20722->20723 20724 2ba5b9a CallCatchBlock 59 API calls 20723->20724 20725 2ba553b 20724->20725 20726 2ba5481 __setmbcp 59 API calls 20725->20726 20839 2ba90ff 20838->20839 20840 2ba9103 TlsFree 20838->20840 20839->20647 20840->20647 20841 2b96487 20842 2b964a9 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 20841->20842 20920 2b942c7 20842->20920 20921 4024fe 20922 402507 CommandLineToArgvW 20921->20922 20924 40b4f3 GetLocalTime 20922->20924 20927 401f27 20924->20927 20928 401f3c 20927->20928 20931 401a1d 20928->20931 20930 401f45 20932 401a2c 20931->20932 20937 401a4f CreateFileA 20932->20937 20936 401a3e 20936->20930 20938 401a35 20937->20938 20942 401a7d 20937->20942 20945 401b4b LoadLibraryA 20938->20945 20939 401a98 DeviceIoControl 20939->20942 20941 401b3a CloseHandle 20941->20938 20942->20939 20942->20941 20943 401b0e GetLastError 20942->20943 20954 402ba6 20942->20954 20957 402b98 20942->20957 20943->20941 20943->20942 20946 401c21 20945->20946 20947 401b6e GetProcAddress 20945->20947 20946->20936 20948 401c18 FreeLibrary 20947->20948 20950 401b85 20947->20950 20948->20946 20949 401b95 GetAdaptersInfo 20949->20950 20950->20949 20951 402ba6 7 API calls 20950->20951 20952 401c15 20950->20952 20953 402b98 12 API calls 20950->20953 20951->20950 20952->20948 20953->20950 20955 402f51 7 API calls 20954->20955 20956 402baf 20955->20956 20956->20942 20958 402eb1 12 API calls 20957->20958 20959 402ba3 20958->20959 20959->20942 20960 2bd2e02 20961 2bfe2a0 WriteFile 20960->20961 20962 2c08f96 20961->20962

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 2b972a7-2b972bf InternetOpenA 1 2b97385-2b9738b 0->1 2 2b972c5-2b9733c InternetSetOptionA * 3 call 2ba4a30 InternetOpenUrlA 0->2 3 2b9738d-2b97393 1->3 4 2b973a7-2b973b5 1->4 15 2b9737e-2b9737f InternetCloseHandle 2->15 16 2b9733e 2->16 6 2b97399-2b973a6 call 2b953ec 3->6 7 2b97395-2b97397 3->7 8 2b973bb-2b973df call 2ba4a30 call 2b9439c 4->8 9 2b966f0-2b966f2 4->9 6->4 7->4 8->9 33 2b973e5-2b97413 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba227c 8->33 13 2b966fb-2b966fd 9->13 14 2b966f4-2b966f9 9->14 18 2b9670a-2b9673e RtlEnterCriticalSection RtlLeaveCriticalSection 13->18 19 2b966ff 13->19 21 2b96704 Sleep 14->21 15->1 22 2b97342-2b97368 InternetReadFile 16->22 23 2b9678e 18->23 24 2b96740-2b9674c 18->24 19->21 21->18 26 2b9736a-2b97371 22->26 27 2b97373-2b9737a InternetCloseHandle 22->27 29 2b96792 23->29 24->23 28 2b9674e-2b9675b 24->28 26->22 27->15 31 2b9675d-2b96761 28->31 32 2b96763-2b96764 28->32 29->0 34 2b96768-2b9678c call 2ba4a30 * 2 31->34 32->34 38 2b97469-2b97484 call 2ba227c 33->38 39 2b97415-2b97427 call 2ba227c 33->39 34->29 47 2b9748a-2b9748c 38->47 48 2b9773e-2b97750 call 2ba227c 38->48 39->38 49 2b97429-2b9743b call 2ba227c 39->49 47->48 50 2b97492-2b97544 call 2ba2eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba4a30 * 5 call 2b9439c * 2 47->50 57 2b97799-2b977ab call 2ba227c 48->57 58 2b97752-2b97754 48->58 49->38 59 2b9743d-2b9744f call 2ba227c 49->59 112 2b97581 50->112 113 2b97546-2b97548 50->113 70 2b977ad-2b977c7 call 2b961f1 call 2b962ff call 2b9640a 57->70 71 2b977cc-2b977de call 2ba227c 57->71 58->57 61 2b97756-2b97794 call 2ba4a30 RtlEnterCriticalSection RtlLeaveCriticalSection 58->61 59->38 72 2b97451-2b97463 call 2ba227c 59->72 61->9 70->9 81 2b97afc-2b97b0e call 2ba227c 71->81 82 2b977e4-2b977e6 71->82 72->9 72->38 81->9 94 2b97b14-2b97b42 call 2ba2eec call 2ba4a30 call 2b9439c 81->94 82->81 86 2b977ec-2b97803 call 2b9439c 82->86 86->9 98 2b97809-2b978d7 call 2ba2358 call 2b91ba7 86->98 120 2b97b4b-2b97b52 call 2ba2eb4 94->120 121 2b97b44-2b97b46 call 2b9534d 94->121 115 2b978d9 call 2b9143f 98->115 116 2b978de-2b978ff RtlEnterCriticalSection 98->116 122 2b97585-2b975b3 call 2ba2eec call 2ba4a30 call 2b9439c 112->122 113->112 119 2b9754a-2b9755c call 2ba227c 113->119 115->116 117 2b9790b-2b9796f RtlLeaveCriticalSection call 2b93c67 call 2b93d7e call 2b9826e 116->117 118 2b97901-2b97908 116->118 146 2b97ae3-2b97af7 call 2b98f36 117->146 147 2b97975-2b979bd call 2b9a658 117->147 118->117 119->112 134 2b9755e-2b9757f call 2b9439c 119->134 120->9 121->120 144 2b975b5-2b975c4 call 2ba3529 122->144 145 2b975f4-2b975fd call 2ba2eb4 122->145 134->122 144->145 156 2b975c6 144->156 159 2b97603-2b9761b call 2ba3a8f 145->159 160 2b97734-2b97737 145->160 146->9 157 2b97aad-2b97ade call 2b9831d call 2b933b2 147->157 158 2b979c3-2b979ca 147->158 162 2b975cb-2b975dd call 2ba2790 156->162 157->146 164 2b979cd-2b979d2 158->164 169 2b9761d-2b97625 call 2b9966a 159->169 170 2b97627 159->170 160->48 176 2b975df 162->176 177 2b975e2-2b975f2 call 2ba3529 162->177 164->164 168 2b979d4-2b97a1f call 2b9a658 164->168 168->157 179 2b97a25-2b97a2b 168->179 175 2b97629-2b976e1 call 2b9a782 call 2b93863 call 2b95119 call 2b93863 call 2b9aa28 call 2b9ab42 169->175 170->175 202 2b976e8-2b97713 Sleep call 2ba1830 175->202 203 2b976e3 call 2b9380b 175->203 176->177 177->145 177->162 183 2b97a2e-2b97a33 179->183 183->183 186 2b97a35-2b97a70 call 2b9a658 183->186 186->157 192 2b97a72-2b97aac call 2b9d04a 186->192 192->157 207 2b9771f-2b9772d 202->207 208 2b97715-2b9771e call 2b94100 202->208 203->202 207->160 210 2b9772f call 2b9380b 207->210 208->207 210->160
                                                    APIs
                                                    • Sleep.KERNELBASE(0000EA60), ref: 02B96704
                                                    • RtlEnterCriticalSection.NTDLL(02BC71B8), ref: 02B9670F
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71B8), ref: 02B96720
                                                    • InternetOpenA.WININET(?), ref: 02B972B1
                                                    • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02B972D9
                                                    • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02B972F1
                                                    • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02B97309
                                                    • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02B97332
                                                    • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02B97354
                                                    • InternetCloseHandle.WININET(00000000), ref: 02B97374
                                                    • InternetCloseHandle.WININET(00000000), ref: 02B9737F
                                                    • RtlEnterCriticalSection.NTDLL(02BC71B8), ref: 02B973EA
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71B8), ref: 02B973FB
                                                    • _malloc.LIBCMT ref: 02B97494
                                                    • RtlEnterCriticalSection.NTDLL(02BC71B8), ref: 02B974A6
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71B8), ref: 02B974B2
                                                    • _malloc.LIBCMT ref: 02B9758A
                                                    • _strtok.LIBCMT ref: 02B975BB
                                                    • _swscanf.LIBCMT ref: 02B975D2
                                                    • _strtok.LIBCMT ref: 02B975E9
                                                    • _free.LIBCMT ref: 02B975F5
                                                    • Sleep.KERNEL32(000007D0), ref: 02B976ED
                                                    • RtlEnterCriticalSection.NTDLL(02BC71B8), ref: 02B9776E
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71B8), ref: 02B97780
                                                    • _sprintf.LIBCMT ref: 02B9781E
                                                    • RtlEnterCriticalSection.NTDLL(00000020), ref: 02B978E2
                                                    • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02B97916
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                    • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                    • API String ID: 1657546717-1839899575
                                                    • Opcode ID: 677227f20f45c71f5fa50f85da813447a805142baa60e50c6bfc4d2b73ffdbc5
                                                    • Instruction ID: 0551da6a26034a8c390855e9828fbb1f14718c2140f2241857eab1ca8d4159a5
                                                    • Opcode Fuzzy Hash: 677227f20f45c71f5fa50f85da813447a805142baa60e50c6bfc4d2b73ffdbc5
                                                    • Instruction Fuzzy Hash: 6132017254C3819FEB35AB24D850BAFBBE6EF85310F1408ADF58997291EBB09404CF52

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 475 2b96487-2b966ed RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2b942c7 GetTickCount call 2b9605a GetVersionExA call 2ba4a30 call 2ba2eec * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2ba4a30 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba2eec * 4 QueryPerformanceCounter Sleep call 2ba2eec * 2 call 2ba4a30 * 2 521 2b966f0-2b966f2 475->521 522 2b966fb-2b966fd 521->522 523 2b966f4-2b966f9 521->523 524 2b9670a-2b9673e RtlEnterCriticalSection RtlLeaveCriticalSection 522->524 525 2b966ff 522->525 526 2b96704 Sleep 523->526 527 2b9678e 524->527 528 2b96740-2b9674c 524->528 525->526 526->524 530 2b96792-2b972bf InternetOpenA 527->530 528->527 529 2b9674e-2b9675b 528->529 531 2b9675d-2b96761 529->531 532 2b96763-2b96764 529->532 535 2b97385-2b9738b 530->535 536 2b972c5-2b9733c InternetSetOptionA * 3 call 2ba4a30 InternetOpenUrlA 530->536 534 2b96768-2b9678c call 2ba4a30 * 2 531->534 532->534 534->530 537 2b9738d-2b97393 535->537 538 2b973a7-2b973b5 535->538 549 2b9737e-2b9737f InternetCloseHandle 536->549 550 2b9733e 536->550 541 2b97399-2b973a6 call 2b953ec 537->541 542 2b97395-2b97397 537->542 538->521 544 2b973bb-2b973df call 2ba4a30 call 2b9439c 538->544 541->538 542->538 544->521 559 2b973e5-2b97413 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba227c 544->559 549->535 554 2b97342-2b97368 InternetReadFile 550->554 556 2b9736a-2b97371 554->556 557 2b97373-2b9737a InternetCloseHandle 554->557 556->554 557->549 562 2b97469-2b97484 call 2ba227c 559->562 563 2b97415-2b97427 call 2ba227c 559->563 568 2b9748a-2b9748c 562->568 569 2b9773e-2b97750 call 2ba227c 562->569 563->562 570 2b97429-2b9743b call 2ba227c 563->570 568->569 571 2b97492-2b97544 call 2ba2eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba4a30 * 5 call 2b9439c * 2 568->571 578 2b97799-2b977ab call 2ba227c 569->578 579 2b97752-2b97754 569->579 570->562 580 2b9743d-2b9744f call 2ba227c 570->580 633 2b97581 571->633 634 2b97546-2b97548 571->634 591 2b977ad-2b977bb call 2b961f1 call 2b962ff 578->591 592 2b977cc-2b977de call 2ba227c 578->592 579->578 582 2b97756-2b97794 call 2ba4a30 RtlEnterCriticalSection RtlLeaveCriticalSection 579->582 580->562 593 2b97451-2b97463 call 2ba227c 580->593 582->521 609 2b977c0-2b977c7 call 2b9640a 591->609 602 2b97afc-2b97b0e call 2ba227c 592->602 603 2b977e4-2b977e6 592->603 593->521 593->562 602->521 615 2b97b14-2b97b42 call 2ba2eec call 2ba4a30 call 2b9439c 602->615 603->602 607 2b977ec-2b97803 call 2b9439c 603->607 607->521 619 2b97809-2b978d7 call 2ba2358 call 2b91ba7 607->619 609->521 641 2b97b4b-2b97b52 call 2ba2eb4 615->641 642 2b97b44-2b97b46 call 2b9534d 615->642 636 2b978d9 call 2b9143f 619->636 637 2b978de-2b978ff RtlEnterCriticalSection 619->637 643 2b97585-2b975b3 call 2ba2eec call 2ba4a30 call 2b9439c 633->643 634->633 640 2b9754a-2b9755c call 2ba227c 634->640 636->637 638 2b9790b-2b9796f RtlLeaveCriticalSection call 2b93c67 call 2b93d7e call 2b9826e 637->638 639 2b97901-2b97908 637->639 667 2b97ae3-2b97af7 call 2b98f36 638->667 668 2b97975-2b979bd call 2b9a658 638->668 639->638 640->633 655 2b9755e-2b9757f call 2b9439c 640->655 641->521 642->641 665 2b975b5-2b975c4 call 2ba3529 643->665 666 2b975f4-2b975fd call 2ba2eb4 643->666 655->643 665->666 677 2b975c6 665->677 680 2b97603-2b9761b call 2ba3a8f 666->680 681 2b97734-2b97737 666->681 667->521 678 2b97aad-2b97ade call 2b9831d call 2b933b2 668->678 679 2b979c3-2b979ca 668->679 683 2b975cb-2b975dd call 2ba2790 677->683 678->667 685 2b979cd-2b979d2 679->685 690 2b9761d-2b97625 call 2b9966a 680->690 691 2b97627 680->691 681->569 697 2b975df 683->697 698 2b975e2-2b975f2 call 2ba3529 683->698 685->685 689 2b979d4-2b97a1f call 2b9a658 685->689 689->678 700 2b97a25-2b97a2b 689->700 696 2b97629-2b976cb call 2b9a782 call 2b93863 call 2b95119 call 2b93863 call 2b9aa28 call 2b9ab42 690->696 691->696 722 2b976d0-2b976e1 696->722 697->698 698->666 698->683 704 2b97a2e-2b97a33 700->704 704->704 707 2b97a35-2b97a70 call 2b9a658 704->707 707->678 713 2b97a72-2b97aa6 call 2b9d04a 707->713 717 2b97aab-2b97aac 713->717 717->678 723 2b976e8-2b97713 Sleep call 2ba1830 722->723 724 2b976e3 call 2b9380b 722->724 728 2b9771f-2b9772d 723->728 729 2b97715-2b9771e call 2b94100 723->729 724->723 728->681 731 2b9772f call 2b9380b 728->731 729->728 731->681
                                                    APIs
                                                    • RtlInitializeCriticalSection.NTDLL(02BC71B8), ref: 02B964B6
                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02B964CD
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02B964D6
                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02B964E5
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02B964E8
                                                    • GetTickCount.KERNEL32 ref: 02B964F4
                                                      • Part of subcall function 02B9605A: _malloc.LIBCMT ref: 02B96068
                                                    • GetVersionExA.KERNEL32(02BC7010), ref: 02B96521
                                                    • _malloc.LIBCMT ref: 02B9654D
                                                      • Part of subcall function 02BA2EEC: __FF_MSGBANNER.LIBCMT ref: 02BA2F03
                                                      • Part of subcall function 02BA2EEC: __NMSG_WRITE.LIBCMT ref: 02BA2F0A
                                                      • Part of subcall function 02BA2EEC: RtlAllocateHeap.NTDLL(007F0000,00000000,00000001), ref: 02BA2F2F
                                                    • _malloc.LIBCMT ref: 02B9655D
                                                    • _malloc.LIBCMT ref: 02B96568
                                                    • _malloc.LIBCMT ref: 02B96573
                                                    • _malloc.LIBCMT ref: 02B9657E
                                                    • _malloc.LIBCMT ref: 02B96589
                                                    • _malloc.LIBCMT ref: 02B96594
                                                    • _malloc.LIBCMT ref: 02B965A3
                                                    • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02B965BA
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B965C3
                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02B965D2
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B965D5
                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02B965E0
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B965E3
                                                    • RtlEnterCriticalSection.NTDLL(02BC71B8), ref: 02B9661D
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71B8), ref: 02B9662A
                                                    • _malloc.LIBCMT ref: 02B9664E
                                                    • _malloc.LIBCMT ref: 02B9665C
                                                    • _malloc.LIBCMT ref: 02B96663
                                                    • _malloc.LIBCMT ref: 02B96689
                                                    • QueryPerformanceCounter.KERNEL32(00000200), ref: 02B9669C
                                                    • Sleep.KERNELBASE ref: 02B966AA
                                                    • _malloc.LIBCMT ref: 02B966B6
                                                    • _malloc.LIBCMT ref: 02B966C3
                                                    • Sleep.KERNELBASE(0000EA60), ref: 02B96704
                                                    • RtlEnterCriticalSection.NTDLL(02BC71B8), ref: 02B9670F
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71B8), ref: 02B96720
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _malloc$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                    • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                    • API String ID: 4273019447-2678694477
                                                    • Opcode ID: 2efaf08780b526f6c5ec132e46b21685d7701ad3832ab3654ea465580e6a337c
                                                    • Instruction ID: b714ec7bbc54e2215615149394d639e156b7a60aa8b259af4de288f4b5b98708
                                                    • Opcode Fuzzy Hash: 2efaf08780b526f6c5ec132e46b21685d7701ad3832ab3654ea465580e6a337c
                                                    • Instruction Fuzzy Hash: AE71B6B1D48340AFE311AF349C49B6BBBECAF85750F10086EF99597290DBB45840DF96

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 835 401b4b-401b68 LoadLibraryA 836 401c21-401c25 835->836 837 401b6e-401b7f GetProcAddress 835->837 838 401b85-401b8e 837->838 839 401c18-401c1b FreeLibrary 837->839 840 401b95-401ba5 GetAdaptersInfo 838->840 839->836 841 401ba7-401bb0 840->841 842 401bdb-401be3 840->842 843 401bc1-401bd7 call 402bc0 call 4018cc 841->843 844 401bb2-401bb6 841->844 845 401be5-401beb call 402ba6 842->845 846 401bec-401bf0 842->846 843->842 844->842 850 401bb8-401bbf 844->850 845->846 848 401bf2-401bf6 846->848 849 401c15-401c17 846->849 848->849 853 401bf8-401bfb 848->853 849->839 850->843 850->844 855 401c06-401c13 call 402b98 853->855 856 401bfd-401c03 853->856 855->840 855->849 856->855
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B5D
                                                    • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                    • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                    • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                    • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                    • API String ID: 514930453-3667123677
                                                    • Opcode ID: 4786119c2dd8152e4b47b2a924d6ecb004799f19bdb0843ab8028876a5fcac46
                                                    • Instruction ID: 9300e3b8f0653b0f10764aaa79a1f2494f67c894d04353eb45b18fdb2f867aae
                                                    • Opcode Fuzzy Hash: 4786119c2dd8152e4b47b2a924d6ecb004799f19bdb0843ab8028876a5fcac46
                                                    • Instruction Fuzzy Hash: 9621B870944109AFEF11DF65C944BEF7BB8EF41344F1440BAE504B22E1E778A985CB69

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 909 2b9f8da-2b9f8fd LoadLibraryA 910 2b9f9bd-2b9f9c4 909->910 911 2b9f903-2b9f911 GetProcAddress 909->911 912 2b9f917-2b9f927 911->912 913 2b9f9b6-2b9f9b7 FreeLibrary 911->913 914 2b9f929-2b9f935 GetAdaptersInfo 912->914 913->910 915 2b9f96d-2b9f975 914->915 916 2b9f937 914->916 917 2b9f97e-2b9f983 915->917 918 2b9f977-2b9f97d call 2ba36eb 915->918 919 2b9f939-2b9f940 916->919 921 2b9f9b1-2b9f9b5 917->921 922 2b9f985-2b9f988 917->922 918->917 923 2b9f94a-2b9f952 919->923 924 2b9f942-2b9f946 919->924 921->913 922->921 926 2b9f98a-2b9f98f 922->926 928 2b9f955-2b9f95a 923->928 924->919 927 2b9f948 924->927 929 2b9f99c-2b9f9a7 call 2ba3a8f 926->929 930 2b9f991-2b9f999 926->930 927->915 928->928 931 2b9f95c-2b9f969 call 2b9f629 928->931 929->921 936 2b9f9a9-2b9f9ac 929->936 930->929 931->915 936->914
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02B9F8F0
                                                    • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02B9F909
                                                    • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02B9F92E
                                                    • FreeLibrary.KERNEL32(00000000), ref: 02B9F9B7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                    • String ID: GetAdaptersInfo$iphlpapi.dll
                                                    • API String ID: 514930453-3114217049
                                                    • Opcode ID: e5731173e54242786d6c1f802ce637a2fef827ad7bcce2ebe6359edc5abd0bb6
                                                    • Instruction ID: 982d12ec63111985e58afcd08603791e5653cb5db61ab4c443b4825e5178048f
                                                    • Opcode Fuzzy Hash: e5731173e54242786d6c1f802ce637a2fef827ad7bcce2ebe6359edc5abd0bb6
                                                    • Instruction Fuzzy Hash: 1E21C131E04209AFDF11CAB8D8806FEBBB8EF05364F0440FAEA44E7601D730C945CAA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1217 2b9f7d6-2b9f801 CreateFileA 1218 2b9f8d2-2b9f8d9 1217->1218 1219 2b9f807-2b9f81c 1217->1219 1220 2b9f81f-2b9f841 DeviceIoControl 1219->1220 1221 2b9f87a-2b9f882 1220->1221 1222 2b9f843-2b9f84b 1220->1222 1225 2b9f88b-2b9f88d 1221->1225 1226 2b9f884-2b9f88a call 2ba36eb 1221->1226 1223 2b9f84d-2b9f852 1222->1223 1224 2b9f854-2b9f859 1222->1224 1223->1221 1224->1221 1229 2b9f85b-2b9f863 1224->1229 1227 2b9f8c8-2b9f8d1 CloseHandle 1225->1227 1228 2b9f88f-2b9f892 1225->1228 1226->1225 1227->1218 1231 2b9f8ae-2b9f8bb call 2ba3a8f 1228->1231 1232 2b9f894-2b9f89d GetLastError 1228->1232 1233 2b9f866-2b9f86b 1229->1233 1231->1227 1241 2b9f8bd-2b9f8c3 1231->1241 1232->1227 1235 2b9f89f-2b9f8a2 1232->1235 1233->1233 1237 2b9f86d-2b9f879 call 2b9f629 1233->1237 1235->1231 1238 2b9f8a4-2b9f8ab 1235->1238 1237->1221 1238->1231 1241->1220
                                                    APIs
                                                    • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02B9F7F5
                                                    • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02B9F833
                                                    • GetLastError.KERNEL32 ref: 02B9F894
                                                    • CloseHandle.KERNELBASE(?), ref: 02B9F8CB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                    • String ID: \\.\PhysicalDrive0
                                                    • API String ID: 4026078076-1180397377
                                                    • Opcode ID: 89083aa53291acbbc4ba0b4b0658ffd3600724a50b21e2330b8bfc4338123a59
                                                    • Instruction ID: 9b2353eb7488f5a69581d9bab6d86751c107fdcff490061a2c3de741592e261c
                                                    • Opcode Fuzzy Hash: 89083aa53291acbbc4ba0b4b0658ffd3600724a50b21e2330b8bfc4338123a59
                                                    • Instruction Fuzzy Hash: 9B31C071D0021AEBDF14CF94D894BBEBBB8EF45764F2041BAE504E3680D7706A01CB90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1243 401a4f-401a77 CreateFileA 1244 401b45-401b4a 1243->1244 1245 401a7d-401a91 1243->1245 1246 401a98-401ac0 DeviceIoControl 1245->1246 1247 401ac2-401aca 1246->1247 1248 401af3-401afb 1246->1248 1251 401ad4-401ad9 1247->1251 1252 401acc-401ad2 1247->1252 1249 401b04-401b07 1248->1249 1250 401afd-401b03 call 402ba6 1248->1250 1254 401b09-401b0c 1249->1254 1255 401b3a-401b44 CloseHandle 1249->1255 1250->1249 1251->1248 1256 401adb-401af1 call 402bc0 call 4018cc 1251->1256 1252->1248 1258 401b27-401b34 call 402b98 1254->1258 1259 401b0e-401b17 GetLastError 1254->1259 1255->1244 1256->1248 1258->1246 1258->1255 1259->1255 1262 401b19-401b1c 1259->1262 1262->1258 1265 401b1e-401b24 1262->1265 1265->1258
                                                    APIs
                                                    • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                    • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                    • GetLastError.KERNEL32 ref: 00401B0E
                                                    • CloseHandle.KERNELBASE(?), ref: 00401B3D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                    • String ID: \\.\PhysicalDrive0
                                                    • API String ID: 4026078076-1180397377
                                                    • Opcode ID: a2e68a95d94bbc6a40bee8a11280b17da373fae52957672b226b91710cefcd17
                                                    • Instruction ID: c07866d4b4e887281577b2397114bebd63d98cfae9bba907e2345ee80fd6f57b
                                                    • Opcode Fuzzy Hash: a2e68a95d94bbc6a40bee8a11280b17da373fae52957672b226b91710cefcd17
                                                    • Instruction Fuzzy Hash: 00316D71D01118EACB21EFA5CD849EFBBB9FF41750F20417AE515B22A0E3786E45CB98

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 213 2b9641d-2b96451 215 2b96453-2b96454 213->215 216 2b96455-2b966ed RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2b942c7 GetTickCount call 2b9605a GetVersionExA call 2ba4a30 call 2ba2eec * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2ba4a30 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba2eec * 4 QueryPerformanceCounter Sleep call 2ba2eec * 2 call 2ba4a30 * 2 213->216 215->216 262 2b966f0-2b966f2 216->262 263 2b966fb-2b966fd 262->263 264 2b966f4-2b966f9 262->264 265 2b9670a-2b9673e RtlEnterCriticalSection RtlLeaveCriticalSection 263->265 266 2b966ff 263->266 267 2b96704 Sleep 264->267 268 2b9678e 265->268 269 2b96740-2b9674c 265->269 266->267 267->265 271 2b96792-2b972bf InternetOpenA 268->271 269->268 270 2b9674e-2b9675b 269->270 272 2b9675d-2b96761 270->272 273 2b96763-2b96764 270->273 276 2b97385-2b9738b 271->276 277 2b972c5-2b9733c InternetSetOptionA * 3 call 2ba4a30 InternetOpenUrlA 271->277 275 2b96768-2b9678c call 2ba4a30 * 2 272->275 273->275 275->271 278 2b9738d-2b97393 276->278 279 2b973a7-2b973b5 276->279 290 2b9737e-2b9737f InternetCloseHandle 277->290 291 2b9733e 277->291 282 2b97399-2b973a6 call 2b953ec 278->282 283 2b97395-2b97397 278->283 279->262 285 2b973bb-2b973df call 2ba4a30 call 2b9439c 279->285 282->279 283->279 285->262 300 2b973e5-2b97413 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba227c 285->300 290->276 295 2b97342-2b97368 InternetReadFile 291->295 297 2b9736a-2b97371 295->297 298 2b97373-2b9737a InternetCloseHandle 295->298 297->295 298->290 303 2b97469-2b97484 call 2ba227c 300->303 304 2b97415-2b97427 call 2ba227c 300->304 309 2b9748a-2b9748c 303->309 310 2b9773e-2b97750 call 2ba227c 303->310 304->303 311 2b97429-2b9743b call 2ba227c 304->311 309->310 312 2b97492-2b97544 call 2ba2eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba4a30 * 5 call 2b9439c * 2 309->312 319 2b97799-2b977ab call 2ba227c 310->319 320 2b97752-2b97754 310->320 311->303 321 2b9743d-2b9744f call 2ba227c 311->321 374 2b97581 312->374 375 2b97546-2b97548 312->375 332 2b977ad-2b977c7 call 2b961f1 call 2b962ff call 2b9640a 319->332 333 2b977cc-2b977de call 2ba227c 319->333 320->319 323 2b97756-2b97794 call 2ba4a30 RtlEnterCriticalSection RtlLeaveCriticalSection 320->323 321->303 334 2b97451-2b97463 call 2ba227c 321->334 323->262 332->262 343 2b97afc-2b97b0e call 2ba227c 333->343 344 2b977e4-2b977e6 333->344 334->262 334->303 343->262 356 2b97b14-2b97b42 call 2ba2eec call 2ba4a30 call 2b9439c 343->356 344->343 348 2b977ec-2b97803 call 2b9439c 344->348 348->262 360 2b97809-2b978d7 call 2ba2358 call 2b91ba7 348->360 382 2b97b4b-2b97b52 call 2ba2eb4 356->382 383 2b97b44-2b97b46 call 2b9534d 356->383 377 2b978d9 call 2b9143f 360->377 378 2b978de-2b978ff RtlEnterCriticalSection 360->378 384 2b97585-2b975b3 call 2ba2eec call 2ba4a30 call 2b9439c 374->384 375->374 381 2b9754a-2b9755c call 2ba227c 375->381 377->378 379 2b9790b-2b9796f RtlLeaveCriticalSection call 2b93c67 call 2b93d7e call 2b9826e 378->379 380 2b97901-2b97908 378->380 408 2b97ae3-2b97af7 call 2b98f36 379->408 409 2b97975-2b979bd call 2b9a658 379->409 380->379 381->374 396 2b9755e-2b9757f call 2b9439c 381->396 382->262 383->382 406 2b975b5-2b975c4 call 2ba3529 384->406 407 2b975f4-2b975fd call 2ba2eb4 384->407 396->384 406->407 418 2b975c6 406->418 421 2b97603-2b9761b call 2ba3a8f 407->421 422 2b97734-2b97737 407->422 408->262 419 2b97aad-2b97ade call 2b9831d call 2b933b2 409->419 420 2b979c3-2b979ca 409->420 424 2b975cb-2b975dd call 2ba2790 418->424 419->408 426 2b979cd-2b979d2 420->426 431 2b9761d-2b97625 call 2b9966a 421->431 432 2b97627 421->432 422->310 438 2b975df 424->438 439 2b975e2-2b975f2 call 2ba3529 424->439 426->426 430 2b979d4-2b97a1f call 2b9a658 426->430 430->419 441 2b97a25-2b97a2b 430->441 437 2b97629-2b976e1 call 2b9a782 call 2b93863 call 2b95119 call 2b93863 call 2b9aa28 call 2b9ab42 431->437 432->437 464 2b976e8-2b97713 Sleep call 2ba1830 437->464 465 2b976e3 call 2b9380b 437->465 438->439 439->407 439->424 445 2b97a2e-2b97a33 441->445 445->445 448 2b97a35-2b97a70 call 2b9a658 445->448 448->419 454 2b97a72-2b97aac call 2b9d04a 448->454 454->419 469 2b9771f-2b9772d 464->469 470 2b97715-2b9771e call 2b94100 464->470 465->464 469->422 472 2b9772f call 2b9380b 469->472 470->469 472->422
                                                    APIs
                                                    • RtlInitializeCriticalSection.NTDLL(02BC71B8), ref: 02B964B6
                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02B964CD
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02B964D6
                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02B964E5
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02B964E8
                                                    • GetTickCount.KERNEL32 ref: 02B964F4
                                                    • GetVersionExA.KERNEL32(02BC7010), ref: 02B96521
                                                    • _malloc.LIBCMT ref: 02B9654D
                                                    • _malloc.LIBCMT ref: 02B9655D
                                                    • _malloc.LIBCMT ref: 02B96568
                                                    • _malloc.LIBCMT ref: 02B96573
                                                    • _malloc.LIBCMT ref: 02B9657E
                                                    • _malloc.LIBCMT ref: 02B96589
                                                    • _malloc.LIBCMT ref: 02B96594
                                                    • _malloc.LIBCMT ref: 02B965A3
                                                    • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02B965BA
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B965C3
                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02B965D2
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B965D5
                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02B965E0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _malloc$Heap$Process$AddressAllocateHandleModuleProc$CountCriticalInitializeSectionTickVersion
                                                    • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                    • API String ID: 11946493-2678694477
                                                    • Opcode ID: bc92efed56dc959cd2e9a97fff9293c16bfdd8469946e58d69a26d024852ba6d
                                                    • Instruction ID: 84f3636328f2885edfefbd1219cba9f9b9669506a4f034c03e0b1003e1743d90
                                                    • Opcode Fuzzy Hash: bc92efed56dc959cd2e9a97fff9293c16bfdd8469946e58d69a26d024852ba6d
                                                    • Instruction Fuzzy Hash: A281D572D48300AFE311AF709C48B6BBBE9AF85750F1008AEF59597280DBB49840DF96

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02B91D11
                                                    • GetLastError.KERNEL32 ref: 02B91D23
                                                      • Part of subcall function 02B91712: __EH_prolog.LIBCMT ref: 02B91717
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02B91D59
                                                    • GetLastError.KERNEL32 ref: 02B91D6B
                                                    • __beginthreadex.LIBCMT ref: 02B91DB1
                                                    • GetLastError.KERNEL32 ref: 02B91DC6
                                                    • CloseHandle.KERNEL32(00000000), ref: 02B91DDD
                                                    • CloseHandle.KERNEL32(00000000), ref: 02B91DEC
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02B91E14
                                                    • CloseHandle.KERNELBASE(00000000), ref: 02B91E1B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                    • String ID: thread$thread.entry_event$thread.exit_event
                                                    • API String ID: 831262434-3017686385
                                                    • Opcode ID: e8bd0bfee32ee87fbc5ea08ae61b304e6381b449599b6c1167ad5305345eed4a
                                                    • Instruction ID: 879502e411e07b799a98659fa080de3c5cdc726f455b18472ac5b09a8c2352ee
                                                    • Opcode Fuzzy Hash: e8bd0bfee32ee87fbc5ea08ae61b304e6381b449599b6c1167ad5305345eed4a
                                                    • Instruction Fuzzy Hash: F0319272A043019FDB01EF28C848B2BBBE5FF84754F1049AEF95997290DB709849DF92

                                                    Control-flow Graph

                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B94D8B
                                                    • RtlEnterCriticalSection.NTDLL(02BC71B8), ref: 02B94DB7
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71B8), ref: 02B94DC3
                                                      • Part of subcall function 02B94BED: __EH_prolog.LIBCMT ref: 02B94BF2
                                                      • Part of subcall function 02B94BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02B94CF2
                                                    • RtlEnterCriticalSection.NTDLL(02BC71B8), ref: 02B94E93
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71B8), ref: 02B94E99
                                                    • RtlEnterCriticalSection.NTDLL(02BC71B8), ref: 02B94EA0
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71B8), ref: 02B94EA6
                                                    • RtlEnterCriticalSection.NTDLL(02BC71B8), ref: 02B950A7
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71B8), ref: 02B950AD
                                                    • RtlEnterCriticalSection.NTDLL(02BC71B8), ref: 02B950B8
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71B8), ref: 02B950C1
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                    • String ID:
                                                    • API String ID: 2062355503-0
                                                    • Opcode ID: ddcdc976a19ec6e41fc414bfafb5338655ce581ebcfc0ebd68f2cb54cf0053cf
                                                    • Instruction ID: 14ece2cced9da6fccff57a59b4c1be11af13677dc8835bfdfa0dc8b858d888ad
                                                    • Opcode Fuzzy Hash: ddcdc976a19ec6e41fc414bfafb5338655ce581ebcfc0ebd68f2cb54cf0053cf
                                                    • Instruction Fuzzy Hash: 1CB12B71D0425DDFEF25DFA0C844BEEBBB9EF05314F1440AAE80566290DBB46A49CFA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 861 401f64-401f84 FindResourceA 862 401f86-401f9d GetLastError SizeofResource 861->862 863 401f9f-401fa1 861->863 862->863 864 401fa6-401fec LoadResource LockResource GlobalAlloc call 402800 * 2 862->864 865 402096-40209a 863->865 870 401fee-401ff9 864->870 870->870 871 401ffb-402003 GetTickCount 870->871 872 402032-402038 871->872 873 402005-402007 871->873 874 402053-402083 GlobalAlloc call 401c26 872->874 875 40203a-40204a 872->875 873->874 876 402009-40200f 873->876 881 402088-402093 874->881 877 40204c 875->877 878 40204e-402051 875->878 876->874 880 402011-402023 876->880 877->878 878->874 878->875 882 402025 880->882 883 402027-40202a 880->883 881->865 882->883 883->880 884 40202c-40202e 883->884 884->876 885 402030 884->885 885->874
                                                    APIs
                                                    • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                    • GetLastError.KERNEL32 ref: 00401F86
                                                    • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                    • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                    • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                    • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 00401FBF
                                                    • GetTickCount.KERNEL32 ref: 00401FFB
                                                    • GlobalAlloc.KERNELBASE(00000040,?), ref: 00402061
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                    • String ID:
                                                    • API String ID: 564119183-0
                                                    • Opcode ID: c339dbb3d4f54c4bfe23240511e1faf338c1a50a53de60f6f0a2310917010a4d
                                                    • Instruction ID: 3f373f2fe47a9e58058ec223940fe379f908771e1a31376a549d0366c6000c22
                                                    • Opcode Fuzzy Hash: c339dbb3d4f54c4bfe23240511e1faf338c1a50a53de60f6f0a2310917010a4d
                                                    • Instruction Fuzzy Hash: D0314C32A402516FDB109FB99E889AF7FB8EF45344B10807AFA46F7291D6748841C7A8

                                                    Control-flow Graph

                                                    APIs
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B92706
                                                    • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02B9272B
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02BB5A93), ref: 02B92738
                                                      • Part of subcall function 02B91712: __EH_prolog.LIBCMT ref: 02B91717
                                                    • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02B92778
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B927D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                    • String ID: timer
                                                    • API String ID: 4293676635-1792073242
                                                    • Opcode ID: bd520891444b4ff417fa8a947928a2db05b6d47246f15e548a390f15f5349a7d
                                                    • Instruction ID: d511f57403a7f003239ff2fa76dd3a43ffb4baf17277960dab5f073318687f01
                                                    • Opcode Fuzzy Hash: bd520891444b4ff417fa8a947928a2db05b6d47246f15e548a390f15f5349a7d
                                                    • Instruction Fuzzy Hash: DE31C0B2904702AFD711DF25C944B66BBE8FF48764F004AAEF85593680DB74E800CF91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 937 2b92b95-2b92baf 938 2b92bb1-2b92bb9 call 2ba0a50 937->938 939 2b92bc7-2b92bcb 937->939 948 2b92bbf-2b92bc2 938->948 940 2b92bcd-2b92bd0 939->940 941 2b92bdf 939->941 940->941 943 2b92bd2-2b92bdd call 2ba0a50 940->943 944 2b92be2-2b92c11 WSASetLastError WSARecv call 2b9a43c 941->944 943->948 951 2b92c16-2b92c1d 944->951 949 2b92d30 948->949 952 2b92d32-2b92d38 949->952 953 2b92c2c-2b92c32 951->953 954 2b92c1f-2b92c2a call 2ba0a50 951->954 956 2b92c34-2b92c39 call 2ba0a50 953->956 957 2b92c46-2b92c48 953->957 964 2b92c3f-2b92c42 954->964 956->964 958 2b92c4a-2b92c4d 957->958 959 2b92c4f-2b92c60 call 2ba0a50 957->959 962 2b92c66-2b92c69 958->962 959->952 959->962 967 2b92c6b-2b92c6d 962->967 968 2b92c73-2b92c76 962->968 964->957 967->968 969 2b92d22-2b92d2d call 2b91996 967->969 968->949 970 2b92c7c-2b92c9a call 2ba0a50 call 2b9166f 968->970 969->949 977 2b92cbc-2b92cfa WSASetLastError select call 2b9a43c 970->977 978 2b92c9c-2b92cba call 2ba0a50 call 2b9166f 970->978 984 2b92d08 977->984 985 2b92cfc-2b92d06 call 2ba0a50 977->985 978->949 978->977 988 2b92d0a-2b92d12 call 2ba0a50 984->988 989 2b92d15-2b92d17 984->989 992 2b92d19-2b92d1d 985->992 988->989 989->949 989->992 992->944
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B92BE4
                                                    • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02B92C07
                                                      • Part of subcall function 02B9A43C: WSAGetLastError.WS2_32(00000000,?,?,02B92A51), ref: 02B9A44A
                                                    • WSASetLastError.WS2_32 ref: 02B92CD3
                                                    • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02B92CE7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Recvselect
                                                    • String ID: 3'
                                                    • API String ID: 886190287-280543908
                                                    • Opcode ID: da4c6d9ee725fbb34507e06e8919714a6ebf3172fdacf08735629608de0a753a
                                                    • Instruction ID: 8aa5db4da36ac70effb5de8a79681e3e0a01717f9b2247f55c34f3d03551c38d
                                                    • Opcode Fuzzy Hash: da4c6d9ee725fbb34507e06e8919714a6ebf3172fdacf08735629608de0a753a
                                                    • Instruction Fuzzy Hash: 1A412CB1909301AFDB10AF68C51476BBBE9EF85354F104DAEE89A87280EB74D540CF91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 994 2b97b7f-2b97b83 995 2b97b3f-2b97b42 994->995 996 2b97b85-2b97b89 994->996 999 2b97b4b-2b97b52 call 2ba2eb4 995->999 1000 2b97b44-2b97b46 call 2b9534d 995->1000 997 2b97b8b-2b97bae 996->997 998 2b97bf0-2b97bf9 996->998 1001 2b97baf-2b97bc2 997->1001 998->1001 1004 2b97bfb-2b97c2e 998->1004 1009 2b966f0-2b966f2 999->1009 1000->999 1005 2b97c38-2b97c54 call 2b9882b 1001->1005 1006 2b97bc4-2b97bca 1001->1006 1006->998 1011 2b966fb-2b966fd 1009->1011 1012 2b966f4-2b966f9 1009->1012 1013 2b9670a-2b9673e RtlEnterCriticalSection RtlLeaveCriticalSection 1011->1013 1014 2b966ff 1011->1014 1015 2b96704 Sleep 1012->1015 1016 2b9678e 1013->1016 1017 2b96740-2b9674c 1013->1017 1014->1015 1015->1013 1019 2b96792-2b972bf InternetOpenA 1016->1019 1017->1016 1018 2b9674e-2b9675b 1017->1018 1020 2b9675d-2b96761 1018->1020 1021 2b96763-2b96764 1018->1021 1024 2b97385-2b9738b 1019->1024 1025 2b972c5-2b9733c InternetSetOptionA * 3 call 2ba4a30 InternetOpenUrlA 1019->1025 1023 2b96768-2b9678c call 2ba4a30 * 2 1020->1023 1021->1023 1023->1019 1026 2b9738d-2b97393 1024->1026 1027 2b973a7-2b973b5 1024->1027 1038 2b9737e-2b9737f InternetCloseHandle 1025->1038 1039 2b9733e 1025->1039 1030 2b97399-2b973a6 call 2b953ec 1026->1030 1031 2b97395-2b97397 1026->1031 1027->1009 1033 2b973bb-2b973df call 2ba4a30 call 2b9439c 1027->1033 1030->1027 1031->1027 1033->1009 1048 2b973e5-2b97413 RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba227c 1033->1048 1038->1024 1043 2b97342-2b97368 InternetReadFile 1039->1043 1045 2b9736a-2b97371 1043->1045 1046 2b97373-2b9737a InternetCloseHandle 1043->1046 1045->1043 1046->1038 1051 2b97469-2b97484 call 2ba227c 1048->1051 1052 2b97415-2b97427 call 2ba227c 1048->1052 1057 2b9748a-2b9748c 1051->1057 1058 2b9773e-2b97750 call 2ba227c 1051->1058 1052->1051 1059 2b97429-2b9743b call 2ba227c 1052->1059 1057->1058 1060 2b97492-2b97544 call 2ba2eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2ba4a30 * 5 call 2b9439c * 2 1057->1060 1067 2b97799-2b977ab call 2ba227c 1058->1067 1068 2b97752-2b97754 1058->1068 1059->1051 1069 2b9743d-2b9744f call 2ba227c 1059->1069 1122 2b97581 1060->1122 1123 2b97546-2b97548 1060->1123 1080 2b977ad-2b977bb call 2b961f1 call 2b962ff 1067->1080 1081 2b977cc-2b977de call 2ba227c 1067->1081 1068->1067 1071 2b97756-2b97794 call 2ba4a30 RtlEnterCriticalSection RtlLeaveCriticalSection 1068->1071 1069->1051 1082 2b97451-2b97463 call 2ba227c 1069->1082 1071->1009 1098 2b977c0-2b977c7 call 2b9640a 1080->1098 1091 2b97afc-2b97b0e call 2ba227c 1081->1091 1092 2b977e4-2b977e6 1081->1092 1082->1009 1082->1051 1091->1009 1104 2b97b14-2b97b3a call 2ba2eec call 2ba4a30 call 2b9439c 1091->1104 1092->1091 1096 2b977ec-2b97803 call 2b9439c 1092->1096 1096->1009 1108 2b97809-2b978d7 call 2ba2358 call 2b91ba7 1096->1108 1098->1009 1104->995 1124 2b978d9 call 2b9143f 1108->1124 1125 2b978de-2b978ff RtlEnterCriticalSection 1108->1125 1129 2b97585-2b975b3 call 2ba2eec call 2ba4a30 call 2b9439c 1122->1129 1123->1122 1128 2b9754a-2b9755c call 2ba227c 1123->1128 1124->1125 1126 2b9790b-2b9796f RtlLeaveCriticalSection call 2b93c67 call 2b93d7e call 2b9826e 1125->1126 1127 2b97901-2b97908 1125->1127 1150 2b97ae3-2b97af7 call 2b98f36 1126->1150 1151 2b97975-2b979bd call 2b9a658 1126->1151 1127->1126 1128->1122 1138 2b9755e-2b9757f call 2b9439c 1128->1138 1148 2b975b5-2b975c4 call 2ba3529 1129->1148 1149 2b975f4-2b975fd call 2ba2eb4 1129->1149 1138->1129 1148->1149 1160 2b975c6 1148->1160 1163 2b97603-2b9761b call 2ba3a8f 1149->1163 1164 2b97734-2b97737 1149->1164 1150->1009 1161 2b97aad-2b97ade call 2b9831d call 2b933b2 1151->1161 1162 2b979c3-2b979ca 1151->1162 1166 2b975cb-2b975dd call 2ba2790 1160->1166 1161->1150 1168 2b979cd-2b979d2 1162->1168 1173 2b9761d-2b97625 call 2b9966a 1163->1173 1174 2b97627 1163->1174 1164->1058 1180 2b975df 1166->1180 1181 2b975e2-2b975f2 call 2ba3529 1166->1181 1168->1168 1172 2b979d4-2b97a1f call 2b9a658 1168->1172 1172->1161 1183 2b97a25-2b97a2b 1172->1183 1179 2b97629-2b976cb call 2b9a782 call 2b93863 call 2b95119 call 2b93863 call 2b9aa28 call 2b9ab42 1173->1179 1174->1179 1205 2b976d0-2b976e1 1179->1205 1180->1181 1181->1149 1181->1166 1187 2b97a2e-2b97a33 1183->1187 1187->1187 1190 2b97a35-2b97a70 call 2b9a658 1187->1190 1190->1161 1196 2b97a72-2b97aa6 call 2b9d04a 1190->1196 1200 2b97aab-2b97aac 1196->1200 1200->1161 1206 2b976e8-2b97713 Sleep call 2ba1830 1205->1206 1207 2b976e3 call 2b9380b 1205->1207 1211 2b9771f-2b9772d 1206->1211 1212 2b97715-2b9771e call 2b94100 1206->1212 1207->1206 1211->1164 1214 2b9772f call 2b9380b 1211->1214 1212->1211 1214->1164
                                                    APIs
                                                    • Sleep.KERNELBASE(0000EA60), ref: 02B96704
                                                    • RtlEnterCriticalSection.NTDLL(02BC71B8), ref: 02B9670F
                                                    • RtlLeaveCriticalSection.NTDLL(02BC71B8), ref: 02B96720
                                                    • _free.LIBCMT ref: 02B97B4C
                                                    Strings
                                                    • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 02B96735
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeaveSleep_free
                                                    • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    • API String ID: 2653569029-1923541051
                                                    • Opcode ID: 3551caca6829bea6b1a8efbc4a708637a8167c0a12ad061fdd663b390238d155
                                                    • Instruction ID: fc231506065d67d79e187bf5a142539844fe4d779eda72f711cf94d2d93b15ed
                                                    • Opcode Fuzzy Hash: 3551caca6829bea6b1a8efbc4a708637a8167c0a12ad061fdd663b390238d155
                                                    • Instruction Fuzzy Hash: BB316C726083048FD720EF28D84475EFBE6EF4A710F5009BAE542DB251EB719814D782

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1268 2b929ee-2b92a06 1269 2b92a0c-2b92a10 1268->1269 1270 2b92ab3-2b92abb call 2ba0a50 1268->1270 1271 2b92a39-2b92a4c WSASetLastError closesocket call 2b9a43c 1269->1271 1272 2b92a12-2b92a15 1269->1272 1278 2b92abe-2b92ac6 1270->1278 1277 2b92a51-2b92a55 1271->1277 1272->1271 1276 2b92a17-2b92a36 call 2ba0a50 call 2b92f50 1272->1276 1276->1271 1277->1270 1280 2b92a57-2b92a5f call 2ba0a50 1277->1280 1286 2b92a69-2b92a71 call 2ba0a50 1280->1286 1287 2b92a61-2b92a67 1280->1287 1292 2b92aaf-2b92ab1 1286->1292 1293 2b92a73-2b92a79 1286->1293 1287->1286 1288 2b92a7b-2b92aad ioctlsocket WSASetLastError closesocket call 2b9a43c 1287->1288 1288->1292 1292->1270 1292->1278 1293->1288 1293->1292
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B92A3B
                                                    • closesocket.WS2_32 ref: 02B92A42
                                                    • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02B92A89
                                                    • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02B92A97
                                                    • closesocket.WS2_32 ref: 02B92A9E
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastclosesocket$ioctlsocket
                                                    • String ID:
                                                    • API String ID: 1561005644-0
                                                    • Opcode ID: 2e39c8938ecca1306d411045bc97946ad25e3a9978ebf28ad9acafb09d561b32
                                                    • Instruction ID: 1a7b3beb431a2ce5a676ec741371be6593e2874ada2ed246eb55c172c7e078e0
                                                    • Opcode Fuzzy Hash: 2e39c8938ecca1306d411045bc97946ad25e3a9978ebf28ad9acafb09d561b32
                                                    • Instruction Fuzzy Hash: D1210877E00205BBEF20ABB8D904B6AB6E9EF44315F1449F9EC65C3240EF70D9408B50

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1295 2b91ba7-2b91bcf call 2bb5330 RtlEnterCriticalSection 1298 2b91be9-2b91bf7 RtlLeaveCriticalSection call 2b9e263 1295->1298 1299 2b91bd1 1295->1299 1302 2b91bfa-2b91c20 RtlEnterCriticalSection 1298->1302 1300 2b91bd4-2b91be0 call 2b91b79 1299->1300 1305 2b91be2-2b91be7 1300->1305 1306 2b91c55-2b91c6e RtlLeaveCriticalSection 1300->1306 1304 2b91c34-2b91c36 1302->1304 1307 2b91c38-2b91c43 1304->1307 1308 2b91c22-2b91c2f call 2b91b79 1304->1308 1305->1298 1305->1300 1310 2b91c45-2b91c4b 1307->1310 1308->1310 1313 2b91c31 1308->1313 1310->1306 1312 2b91c4d-2b91c51 1310->1312 1312->1306 1313->1304
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B91BAC
                                                    • RtlEnterCriticalSection.NTDLL ref: 02B91BBC
                                                    • RtlLeaveCriticalSection.NTDLL ref: 02B91BEA
                                                    • RtlEnterCriticalSection.NTDLL ref: 02B91C13
                                                    • RtlLeaveCriticalSection.NTDLL ref: 02B91C56
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$H_prolog
                                                    • String ID:
                                                    • API String ID: 1633115879-0
                                                    • Opcode ID: 8cb9e422162c8bebf4ee60e0595f9c7f7fb58baf0520d380a81f0ac3361dd661
                                                    • Instruction ID: 2f8ea519cde7997ca84ff1653412c3ba866dab47580e88aee29fd8864c72a609
                                                    • Opcode Fuzzy Hash: 8cb9e422162c8bebf4ee60e0595f9c7f7fb58baf0520d380a81f0ac3361dd661
                                                    • Instruction Fuzzy Hash: CA219C76A14205EFCF15CF68C4447AABBB5FF88714F10859AE8599B301DBB4E901DBE0
                                                    APIs
                                                    • GetVersion.KERNEL32 ref: 00402D86
                                                      • Part of subcall function 004039F0: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402DBF,00000000), ref: 00403A01
                                                      • Part of subcall function 004039F0: HeapDestroy.KERNEL32 ref: 00403A40
                                                    • GetCommandLineA.KERNEL32 ref: 00402DD4
                                                    • GetStartupInfoA.KERNEL32(?), ref: 00402DFF
                                                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402E22
                                                      • Part of subcall function 00402E7B: ExitProcess.KERNEL32 ref: 00402E98
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                    • String ID:
                                                    • API String ID: 2057626494-0
                                                    • Opcode ID: 9e286e5f9a377e3797ece88135c359dedbbb575cc14907a13f37508a60b21901
                                                    • Instruction ID: f31f1ce04d2051e6b9e8acf883bbbbaa5bd69f55a1c9941ff1c46623f1a3e60c
                                                    • Opcode Fuzzy Hash: 9e286e5f9a377e3797ece88135c359dedbbb575cc14907a13f37508a60b21901
                                                    • Instruction Fuzzy Hash: AD219FB0840715AADB04EFA6DE09A6E7BB8EB04704F10413FF502B72E2DB388510CB59
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B92EEE
                                                    • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02B92EFD
                                                    • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02B92F0C
                                                    • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02B92F36
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Socketsetsockopt
                                                    • String ID:
                                                    • API String ID: 2093263913-0
                                                    • Opcode ID: 031e3b426f53a251250ab9eadf52a6d5289330edfd9e05646373a241953d970b
                                                    • Instruction ID: 9e3506ed090b1c99128e822ff832c5a1d1d683a5613729dc68981aa04353c054
                                                    • Opcode Fuzzy Hash: 031e3b426f53a251250ab9eadf52a6d5289330edfd9e05646373a241953d970b
                                                    • Instruction Fuzzy Hash: 02018D72E40204BBDB205F65DC48F5ABBA9EBC5761F008565F919C7181D77088008B70
                                                    APIs
                                                      • Part of subcall function 02B92D39: WSASetLastError.WS2_32(00000000), ref: 02B92D47
                                                      • Part of subcall function 02B92D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02B92D5C
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B92E6D
                                                    • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02B92E83
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Sendselect
                                                    • String ID: 3'
                                                    • API String ID: 2958345159-280543908
                                                    • Opcode ID: a3273c85e725a0accfd5e792fdf4886f7b2d2e4ee6a4ec1ac56f8fed91490283
                                                    • Instruction ID: c096730f3bab182218c7e0dc1c28e020471d9dc925f57722ee3e9da05fb18b91
                                                    • Opcode Fuzzy Hash: a3273c85e725a0accfd5e792fdf4886f7b2d2e4ee6a4ec1ac56f8fed91490283
                                                    • Instruction Fuzzy Hash: 2E31C1B1E00205AFDF10EF68C854BEE7BAAEF45354F0045EAEC1997240EB70A554CFA0
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B92AEA
                                                    • connect.WS2_32(?,?,?), ref: 02B92AF5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastconnect
                                                    • String ID: 3'
                                                    • API String ID: 374722065-280543908
                                                    • Opcode ID: 7c39ec89f9ce877c2c72abf6f89327c1f238c16f52e768252998d0f9ca948e1c
                                                    • Instruction ID: e97377929788cfb93d247cae5e13de40898f1f612e60d0808cb4a7ee6c11129c
                                                    • Opcode Fuzzy Hash: 7c39ec89f9ce877c2c72abf6f89327c1f238c16f52e768252998d0f9ca948e1c
                                                    • Instruction Fuzzy Hash: 8321A471E04204ABDF14BFB8D414BAEBBFAEF45324F0085E9DD2993280DB7456059FA1
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: e4be12c28cf47046886606c2bb1df0c79fdfbcf32139d13635301a8fe41924a8
                                                    • Instruction ID: d0ea02d34418ee9bd6ebb371a609072965a8782e5a799dd801df73d87dcce350
                                                    • Opcode Fuzzy Hash: e4be12c28cf47046886606c2bb1df0c79fdfbcf32139d13635301a8fe41924a8
                                                    • Instruction Fuzzy Hash: A8512DB1904216DFCF15DF68D544AAABBF1FF08310F1481AEE8299B391D774A911CFA1
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(?), ref: 02B936A7
                                                      • Part of subcall function 02B92420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02B92432
                                                      • Part of subcall function 02B92420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02B92445
                                                      • Part of subcall function 02B92420: RtlEnterCriticalSection.NTDLL(?), ref: 02B92454
                                                      • Part of subcall function 02B92420: InterlockedExchange.KERNEL32(?,00000001), ref: 02B92469
                                                      • Part of subcall function 02B92420: RtlLeaveCriticalSection.NTDLL(?), ref: 02B92470
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 1601054111-0
                                                    • Opcode ID: f5db7fff1f59ac6fdb5fa5220579f2e8b77bd532182899a30542385dc4e774fe
                                                    • Instruction ID: 8bcd130965a077c49fb01c24808e9fddfd5bcac9e3de63b8c7349f5765219739
                                                    • Opcode Fuzzy Hash: f5db7fff1f59ac6fdb5fa5220579f2e8b77bd532182899a30542385dc4e774fe
                                                    • Instruction Fuzzy Hash: DA1127B6504208ABDF218F14CC85FAA3BAAEF40354F0044A6FE12C72D0CB79D860CB94
                                                    APIs
                                                    • __beginthreadex.LIBCMT ref: 02BA2046
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02B9A8BC,00000000), ref: 02BA2077
                                                    • ResumeThread.KERNELBASE(?,?,?,?,?,00000002,02B9A8BC,00000000), ref: 02BA2085
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandleResumeThread__beginthreadex
                                                    • String ID:
                                                    • API String ID: 1685284544-0
                                                    • Opcode ID: 2f485ee2f1d4c73ee05f468c9634e27ab142c36866e43b875ceeadb6e966bf6f
                                                    • Instruction ID: a43becbbcd993bcfa9ee3f775826fc6d325ddb0e3beb6c9753fde63416bdaaeb
                                                    • Opcode Fuzzy Hash: 2f485ee2f1d4c73ee05f468c9634e27ab142c36866e43b875ceeadb6e966bf6f
                                                    • Instruction Fuzzy Hash: E9F0F6716402006FE7309F6CDC91F91B3E8EF88324F2405AAF948D7290C7B1E892DB90
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(02BC727C), ref: 02B91ABA
                                                    • WSAStartup.WS2_32(00000002,00000000), ref: 02B91ACB
                                                    • InterlockedExchange.KERNEL32(02BC7280,00000000), ref: 02B91AD7
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$ExchangeIncrementStartup
                                                    • String ID:
                                                    • API String ID: 1856147945-0
                                                    • Opcode ID: 790d1c9fcd1ae90f934d69c705acf2cf3d060c9381bb599e3aa4f039e9b19bcd
                                                    • Instruction ID: 3baa3fb6da9d53b90d76e5bf48d043a8ed2b1604c91cb976735dfba2378f81cc
                                                    • Opcode Fuzzy Hash: 790d1c9fcd1ae90f934d69c705acf2cf3d060c9381bb599e3aa4f039e9b19bcd
                                                    • Instruction Fuzzy Hash: 83D05E329902045BE62166A4AD0EB78F72CE74A651F500696FCBAC20C4EF915920A9B6
                                                    APIs
                                                    • GetCommandLineW.KERNEL32 ref: 004021DD
                                                    • CommandLineToArgvW.SHELL32(00000000), ref: 0040250F
                                                    • GetLocalTime.KERNEL32(00409F90), ref: 0040B4F3
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: CommandLine$ArgvLocalTime
                                                    • String ID:
                                                    • API String ID: 3768950922-0
                                                    • Opcode ID: ce613c528f85bf1f8ae63e2b126ce99c0089d08e88e538149f52549d84c6bc25
                                                    • Instruction ID: 557ed025c40070bc94a2d9cea719a0dc8cab96cbb87e5a9995fc30fd065bcd82
                                                    • Opcode Fuzzy Hash: ce613c528f85bf1f8ae63e2b126ce99c0089d08e88e538149f52549d84c6bc25
                                                    • Instruction Fuzzy Hash: A5D09271844103FFCA00ABA19E1C1593AE1A6187893264436E113F20A6CB7D1596AF2E
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B94BF2
                                                      • Part of subcall function 02B91BA7: __EH_prolog.LIBCMT ref: 02B91BAC
                                                      • Part of subcall function 02B91BA7: RtlEnterCriticalSection.NTDLL ref: 02B91BBC
                                                      • Part of subcall function 02B91BA7: RtlLeaveCriticalSection.NTDLL ref: 02B91BEA
                                                      • Part of subcall function 02B91BA7: RtlEnterCriticalSection.NTDLL ref: 02B91C13
                                                      • Part of subcall function 02B91BA7: RtlLeaveCriticalSection.NTDLL ref: 02B91C56
                                                      • Part of subcall function 02B9E02B: __EH_prolog.LIBCMT ref: 02B9E030
                                                      • Part of subcall function 02B9E02B: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B9E0AF
                                                    • InterlockedExchange.KERNEL32(?,00000000), ref: 02B94CF2
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                    • String ID:
                                                    • API String ID: 1927618982-0
                                                    • Opcode ID: c881831f3b868cdb0bb01772cc889976175134599b8630855927e0fd005dd7ae
                                                    • Instruction ID: 84b597931ddc2d0c9ccda022d87b843ed7c79fe3fc75ec773e6b94682f11e2c3
                                                    • Opcode Fuzzy Hash: c881831f3b868cdb0bb01772cc889976175134599b8630855927e0fd005dd7ae
                                                    • Instruction Fuzzy Hash: 49513775D04248DFDF15DFA8C884AEEBBB5EF09310F1481AAE905AB352DB709A44CF50
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B92D47
                                                    • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02B92D5C
                                                      • Part of subcall function 02B9A43C: WSAGetLastError.WS2_32(00000000,?,?,02B92A51), ref: 02B9A44A
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLast$Send
                                                    • String ID:
                                                    • API String ID: 1282938840-0
                                                    • Opcode ID: 8809b8daf071d712c3797ef85fc23e35cc3261206104e95a68dd3d2b1447061d
                                                    • Instruction ID: 18971c3b55377afb5fbb4aa4442a0ecd0185b23874a9b9f8587d66a9c50fa3e9
                                                    • Opcode Fuzzy Hash: 8809b8daf071d712c3797ef85fc23e35cc3261206104e95a68dd3d2b1447061d
                                                    • Instruction Fuzzy Hash: ED017575905205FFDB206F98C84496BBAEDFF45364B1005BEEC6983240DB709D008BA1
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B9833A
                                                    • shutdown.WS2_32(?,00000002), ref: 02B98343
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastshutdown
                                                    • String ID:
                                                    • API String ID: 1920494066-0
                                                    • Opcode ID: 20b6a091a7b0532577e4d190e888d7b23e88f03c1d6d61fc2ef028ff3a491dfa
                                                    • Instruction ID: e6f06fdedf9d7c31243a0d1c94e375628e33fa14bdc4f7eda3ebd54af8da230b
                                                    • Opcode Fuzzy Hash: 20b6a091a7b0532577e4d190e888d7b23e88f03c1d6d61fc2ef028ff3a491dfa
                                                    • Instruction Fuzzy Hash: 9CF03072A48714CFCB14AF58D415B5AB7E5FF4A360F0089ADE9A697380DB70A8108FA1
                                                    APIs
                                                    • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402DBF,00000000), ref: 00403A01
                                                      • Part of subcall function 004038A8: GetVersionExA.KERNEL32 ref: 004038C7
                                                    • HeapDestroy.KERNEL32 ref: 00403A40
                                                      • Part of subcall function 00403DC7: HeapAlloc.KERNEL32(00000000,00000140,00403A29,000003F8), ref: 00403DD4
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocCreateDestroyVersion
                                                    • String ID:
                                                    • API String ID: 2507506473-0
                                                    • Opcode ID: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                    • Instruction ID: 5dadef9d12e489db140da5c14b34350ea54a5b880f3286d9e4ff1a1591b79aa3
                                                    • Opcode Fuzzy Hash: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                    • Instruction Fuzzy Hash: 04F065707553016ADB24EF705E4676B3DD8AB80B53F10443BF541F41E0EB7C8690991A
                                                    APIs
                                                    • CommandLineToArgvW.SHELL32(00000000), ref: 0040250F
                                                    • GetLocalTime.KERNEL32(00409F90), ref: 0040B4F3
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: ArgvCommandLineLocalTime
                                                    • String ID:
                                                    • API String ID: 561774760-0
                                                    • Opcode ID: 7d711ecb45f5358fb29c09f6cea0aa565c0445b5a64e95f213db846171243a10
                                                    • Instruction ID: a66c5badff17ef84449faa0defee9372e3bee6a917213ae0b3641b484d659f82
                                                    • Opcode Fuzzy Hash: 7d711ecb45f5358fb29c09f6cea0aa565c0445b5a64e95f213db846171243a10
                                                    • Instruction Fuzzy Hash: 73D05E7180010BFFEB106F72C90818C36E1AB187893214836D417B3592CB3C0596DE2E
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: CloseValue
                                                    • String ID:
                                                    • API String ID: 3132538880-0
                                                    • Opcode ID: 26a545fd8a3e1c718b6c6ef77356f2afb723653ba756ac198d4733562de79363
                                                    • Instruction ID: 43114c3f15c09e113b0b949ad8a557ce12eb5bef164d2ca19a484039adfeabfe
                                                    • Opcode Fuzzy Hash: 26a545fd8a3e1c718b6c6ef77356f2afb723653ba756ac198d4733562de79363
                                                    • Instruction Fuzzy Hash: 89B09232848000EBCB058BB0EE095283E71FB08305B120071E207B04B0C7352461AB8E
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9511E
                                                      • Part of subcall function 02B93D7E: htons.WS2_32(?), ref: 02B93DA2
                                                      • Part of subcall function 02B93D7E: htonl.WS2_32(00000000), ref: 02B93DB9
                                                      • Part of subcall function 02B93D7E: htonl.WS2_32(00000000), ref: 02B93DC0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: htonl$H_prologhtons
                                                    • String ID:
                                                    • API String ID: 4039807196-0
                                                    • Opcode ID: d48b2cd6a0d13c821de4aa1615ca7885923f9bd1cd23e760827739bb524d50b0
                                                    • Instruction ID: c27a70554d9bd1e219d838f98dfe6f54bddd21ec522d01dac0aefd25589a3e4e
                                                    • Opcode Fuzzy Hash: d48b2cd6a0d13c821de4aa1615ca7885923f9bd1cd23e760827739bb524d50b0
                                                    • Instruction Fuzzy Hash: 6D8149B1D0424E8ECF16DFA8D080AEEBBB9EF48310F1081AAD855B7240EB755A45CF65
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002BCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BCA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2bca000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 83d5b9e89d3c4dec8ad19457d99d23d6254199a1a7bbf7859bbe2aa2ec4ecf4e
                                                    • Instruction ID: 10c9984ea2c95d86a8d9a6391b7b08fdd59172fa719bb38180626bb304a83b17
                                                    • Opcode Fuzzy Hash: 83d5b9e89d3c4dec8ad19457d99d23d6254199a1a7bbf7859bbe2aa2ec4ecf4e
                                                    • Instruction Fuzzy Hash: 49516BF280C6249FD701BF19E8816BAFBE4EF44760F06492DEAC993640E6359854CBD7
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002BCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BCA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2bca000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 8ba73b930b05e5d4fbe93724d9491f3cafcfdd6e7e1ef484a7674765cf767784
                                                    • Instruction ID: fbc9bc9fad5cddb5fbe0acc158c403324a1a951461d038b898303ef63a173f31
                                                    • Opcode Fuzzy Hash: 8ba73b930b05e5d4fbe93724d9491f3cafcfdd6e7e1ef484a7674765cf767784
                                                    • Instruction Fuzzy Hash: D45108F280C6109FE705BF19E8816BAFBE4EF54710F06492DEAC597340E636A854CB97
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002BCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BCA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2bca000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: d8ffed9a50cd2dd9738d21ba718de923d9e538f809d42d591953e7ded2d07516
                                                    • Instruction ID: 5e603c036501c2860178e46dc18256666c8d3a4127dc902c2a49e808f5dfa230
                                                    • Opcode Fuzzy Hash: d8ffed9a50cd2dd9738d21ba718de923d9e538f809d42d591953e7ded2d07516
                                                    • Instruction Fuzzy Hash: A3313BF180C6149FD701BF0ADC816BAFBE8EF44610F06482DE6C587340E632A854CB97
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002BCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BCA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2bca000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: 9039e011ea66bd93e3c64ad22b409589bd749e426d1b227fe6c0b6847e6ac190
                                                    • Instruction ID: e5e27b29f5269fc6d0e434a679176147f08aaba59932eb9ba1e6c163644ec810
                                                    • Opcode Fuzzy Hash: 9039e011ea66bd93e3c64ad22b409589bd749e426d1b227fe6c0b6847e6ac190
                                                    • Instruction Fuzzy Hash: B02194B251C604AFE3082E19EC457BEFBE5EB94721F56452DE7C583340FA7518018A96
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9E8F9
                                                      • Part of subcall function 02B91A01: TlsGetValue.KERNEL32 ref: 02B91A0A
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prologValue
                                                    • String ID:
                                                    • API String ID: 3700342317-0
                                                    • Opcode ID: a3c446b33c7a84a97080a53545d1bc686ebbb9b9f399c1f398ded03e8f8ea09d
                                                    • Instruction ID: 02a37cad1be419b08bfca6bae0bc4fb7ac7feed6aac82587d53ae593f3f9e778
                                                    • Opcode Fuzzy Hash: a3c446b33c7a84a97080a53545d1bc686ebbb9b9f399c1f398ded03e8f8ea09d
                                                    • Instruction Fuzzy Hash: 2E214FB2904209AFDF00DF98D540AFEBBF9EF49310F10406AE919A7240D771E900CBA1
                                                    APIs
                                                    • CreateFileA.KERNELBASE(?,?,0B579438), ref: 02C0A483
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002BCA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BCA000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2bca000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 476d1e4991b414cf9d2f1bb4c922e6d718817a5b1495b4419fcb155a647e00fb
                                                    • Instruction ID: 25884d4009b9278a01e9e504b296a0c3e56d3f41110482aefcd2e0c29dcaa328
                                                    • Opcode Fuzzy Hash: 476d1e4991b414cf9d2f1bb4c922e6d718817a5b1495b4419fcb155a647e00fb
                                                    • Instruction Fuzzy Hash: 430152B660C304AFE3516E0AECC0A6AF7EDFBD8664F51492EEB8493350D6711C118666
                                                    APIs
                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02B933CC
                                                      • Part of subcall function 02B932AB: __EH_prolog.LIBCMT ref: 02B932B0
                                                      • Part of subcall function 02B932AB: RtlEnterCriticalSection.NTDLL(?), ref: 02B932C3
                                                      • Part of subcall function 02B932AB: RtlLeaveCriticalSection.NTDLL(?), ref: 02B932EF
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                    • String ID:
                                                    • API String ID: 1518410164-0
                                                    • Opcode ID: b6ee4f7dbb4fd9aec3420fcc92912212d54a18043fb99f3fda5d2721ed2cb9eb
                                                    • Instruction ID: f8dc645766683a64659094d2b0eeafd705c8e72eeb113aaa0dec4b6dacb6d22c
                                                    • Opcode Fuzzy Hash: b6ee4f7dbb4fd9aec3420fcc92912212d54a18043fb99f3fda5d2721ed2cb9eb
                                                    • Instruction Fuzzy Hash: A7015671614606AFDB04DF59DC85F55FBA9FF45320B1483AAE928C72C0EB70E811CBA4
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9E489
                                                      • Part of subcall function 02B926DB: RtlEnterCriticalSection.NTDLL(?), ref: 02B92706
                                                      • Part of subcall function 02B926DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02B9272B
                                                      • Part of subcall function 02B926DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02BB5A93), ref: 02B92738
                                                      • Part of subcall function 02B926DB: SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02B92778
                                                      • Part of subcall function 02B926DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02B927D9
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                    • String ID:
                                                    • API String ID: 4293676635-0
                                                    • Opcode ID: de622fc2683226139f203d708f7a14187a8c41a7a46d5f5d5bf35b71ca634798
                                                    • Instruction ID: 0d50f1b8f9efa72e87b2e35523a336a77b49805b155b380e7305b9ad2584aa79
                                                    • Opcode Fuzzy Hash: de622fc2683226139f203d708f7a14187a8c41a7a46d5f5d5bf35b71ca634798
                                                    • Instruction Fuzzy Hash: 2B01D0B1910B059FC719CF0AC54499AFBF4EF88300B15C6EED4498B721E3B4AA40CF90
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9E268
                                                      • Part of subcall function 02BA3A8F: _malloc.LIBCMT ref: 02BA3AA7
                                                      • Part of subcall function 02B9E484: __EH_prolog.LIBCMT ref: 02B9E489
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$_malloc
                                                    • String ID:
                                                    • API String ID: 4254904621-0
                                                    • Opcode ID: f0719211b1c068c5723dadc4522bffaa57a082a67d1c8c34b68882bec0f0878d
                                                    • Instruction ID: e037df52b48030528141d0032bd3f4b55d1c57edc13f0c61b8c26ff66593fc7a
                                                    • Opcode Fuzzy Hash: f0719211b1c068c5723dadc4522bffaa57a082a67d1c8c34b68882bec0f0878d
                                                    • Instruction Fuzzy Hash: 18E0EC71A15605ABDF5EDFA8D8117BD77A6EF44300F0486EEA80996740DBB09A008A55
                                                    APIs
                                                      • Part of subcall function 02BA5B9A: __getptd_noexit.LIBCMT ref: 02BA5B9B
                                                      • Part of subcall function 02BA5B9A: __amsg_exit.LIBCMT ref: 02BA5BA8
                                                      • Part of subcall function 02BA33D6: __getptd_noexit.LIBCMT ref: 02BA33DA
                                                      • Part of subcall function 02BA33D6: __freeptd.LIBCMT ref: 02BA33F4
                                                      • Part of subcall function 02BA33D6: RtlExitUserThread.NTDLL(?,00000000,?,02BA33B6,00000000), ref: 02BA33FD
                                                    • __XcptFilter.LIBCMT ref: 02BA33C2
                                                      • Part of subcall function 02BA8CD4: __getptd_noexit.LIBCMT ref: 02BA8CD8
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                    • String ID:
                                                    • API String ID: 1405322794-0
                                                    • Opcode ID: 78196f5a6f1163bddb0569ef6dfc03d2b5b0726696826700104b8d6a8a9e4ece
                                                    • Instruction ID: 85a4caba76934a878a4487155862666ffe07dab2e2028e38ba09b0cdd8dfb64a
                                                    • Opcode Fuzzy Hash: 78196f5a6f1163bddb0569ef6dfc03d2b5b0726696826700104b8d6a8a9e4ece
                                                    • Instruction Fuzzy Hash: 81E0ECB1A09604DFEB08BBA4D915E6E77B6AF44302F2045C8E102AB661DB7899409F20
                                                    APIs
                                                    • RegQueryValueExA.KERNELBASE ref: 0040B4D8
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: 2f5546d42dbded5492406fa5634484d3e2a691636cb5c8f45c472d0c1f33c238
                                                    • Instruction ID: 9fba75ce85deb35514dbf5dfc8f120a2937be936b9c9105cc2ffa8b37696fb59
                                                    • Opcode Fuzzy Hash: 2f5546d42dbded5492406fa5634484d3e2a691636cb5c8f45c472d0c1f33c238
                                                    • Instruction Fuzzy Hash: 7CC08C30944012EBCB004F704C0897E3B70FA00380320483A8013B0080D73C8201ABEE
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: ManagerOpen
                                                    • String ID:
                                                    • API String ID: 1889721586-0
                                                    • Opcode ID: 5f13639d227a5180cf33ac7db06930f1d45a0f412a67e8bf912abbc4f5309a00
                                                    • Instruction ID: c64aef9cf31025abd9bbc16c16fc64d709cc8564973be6414f4394b75595928c
                                                    • Opcode Fuzzy Hash: 5f13639d227a5180cf33ac7db06930f1d45a0f412a67e8bf912abbc4f5309a00
                                                    • Instruction Fuzzy Hash: 65C048A0448002EEC780ABA04AE842D25A9E58030A73088BA9203B61E0C3380512FABF
                                                    APIs
                                                    • RegCreateKeyExA.KERNELBASE ref: 0040258B
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 37d0c2b5f7ea5079e41914024c50397ae092fff0add29827d5b05b26190a5dd7
                                                    • Instruction ID: 61f11328e0078924464a0d204448862961e808c8b6bb523d307ccc9655c3b69a
                                                    • Opcode Fuzzy Hash: 37d0c2b5f7ea5079e41914024c50397ae092fff0add29827d5b05b26190a5dd7
                                                    • Instruction Fuzzy Hash: 7AC08C34684000D6EE208B20AE88AE136B4E304704F0101B2E61AB41D1E3B449619E0D
                                                    APIs
                                                    • LoadLibraryExA.KERNELBASE(?), ref: 00402286
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 2494182743a9f3d64644e45db17fa4447cca1a3aa7dbfe65c867eefc36131674
                                                    • Instruction ID: 2ea80acedabe047d581b5f3e6d1bd2544320f2eb53d192504ce874644fc23cd4
                                                    • Opcode Fuzzy Hash: 2494182743a9f3d64644e45db17fa4447cca1a3aa7dbfe65c867eefc36131674
                                                    • Instruction Fuzzy Hash: 1DC08C30404102DFEB009FE0C9484283AB4BB05340320447BE803B5290C3748001EBAA
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: CopyFile
                                                    • String ID:
                                                    • API String ID: 1304948518-0
                                                    • Opcode ID: addcd9836e1a5233fd9991ec5594032736799085599f882b091875907dfdae55
                                                    • Instruction ID: 04cc51c922ee72ce98c7558a78240265d32db3dc63b300e514d6cee8f4e59500
                                                    • Opcode Fuzzy Hash: addcd9836e1a5233fd9991ec5594032736799085599f882b091875907dfdae55
                                                    • Instruction Fuzzy Hash: 85B0123428C200D1D50006100B5EB32122C8B44781F3804736617FA5D5CAFD8042742F
                                                    APIs
                                                    • CreateDirectoryA.KERNELBASE ref: 0040B43D
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectory
                                                    • String ID:
                                                    • API String ID: 4241100979-0
                                                    • Opcode ID: 38c847981bb38af88225e3e130c2bae22115b7cd790b24d25ae8070ff4548b45
                                                    • Instruction ID: 95dcf0b4612f5c9754a741b350396428ebd8c9d8f75c94f14ccdfc109a105aad
                                                    • Opcode Fuzzy Hash: 38c847981bb38af88225e3e130c2bae22115b7cd790b24d25ae8070ff4548b45
                                                    • Instruction Fuzzy Hash: 44A01120A8A220C2C00023802E2882A2828A808B0232080332223B00C003BA000222BF
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID:
                                                    • API String ID: 71445658-0
                                                    • Opcode ID: 9ee1dd0019134c0fe8d9e51aa40ad622ebdfd30c20794c4c00d2e6b719473a1b
                                                    • Instruction ID: a6798a8c712b94f45481812a4b2e2f5732e182ca6ce92c88fcfb46d6b76dec2c
                                                    • Opcode Fuzzy Hash: 9ee1dd0019134c0fe8d9e51aa40ad622ebdfd30c20794c4c00d2e6b719473a1b
                                                    • Instruction Fuzzy Hash: D9900220685101EAF2044A326E1C6152664690474575145355403E0190D7758011552D
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID:
                                                    • API String ID: 3535843008-0
                                                    • Opcode ID: 4ccf99fc5f99c087ededda1b07608fef6dc4e2a9571d10654a9b771f7e0f96ff
                                                    • Instruction ID: 72291223f85326530d859764b5b85184578b702a80253aa835319b5092d025c3
                                                    • Opcode Fuzzy Hash: 4ccf99fc5f99c087ededda1b07608fef6dc4e2a9571d10654a9b771f7e0f96ff
                                                    • Instruction Fuzzy Hash: D3900231999141A7C10047909B1D9152D90651870132241B77703714D485BD6013560F
                                                    APIs
                                                      • Part of subcall function 02BA1550: OpenEventA.KERNEL32(00100002,00000000,00000000,BE553FAB), ref: 02BA15F0
                                                      • Part of subcall function 02BA1550: CloseHandle.KERNEL32(00000000), ref: 02BA1605
                                                      • Part of subcall function 02BA1550: ResetEvent.KERNEL32(00000000,BE553FAB), ref: 02BA160F
                                                      • Part of subcall function 02BA1550: CloseHandle.KERNEL32(00000000,BE553FAB), ref: 02BA1644
                                                    • TlsSetValue.KERNEL32(00000029,?), ref: 02BA20EA
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseEventHandle$OpenResetValue
                                                    • String ID:
                                                    • API String ID: 1556185888-0
                                                    • Opcode ID: 85a8eb4a645fb3f2c54957d0f35c4f80a4d44d4aa48358c3d7b912ba849a21dc
                                                    • Instruction ID: dbf3e63931630804f2b05bba1ca3089b6d430b014fd23d738deeb47f382ab467
                                                    • Opcode Fuzzy Hash: 85a8eb4a645fb3f2c54957d0f35c4f80a4d44d4aa48358c3d7b912ba849a21dc
                                                    • Instruction Fuzzy Hash: 0601A276A44204AFD710CF5CDC45F9ABBE8FB09670F1047AAF829D3390DB7169108BA0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: lstrcmpi
                                                    • String ID:
                                                    • API String ID: 1586166983-0
                                                    • Opcode ID: c680f9321ffb2795063605ad27ad6f3670fe31d1a17b3adf35ee4f36706b9475
                                                    • Instruction ID: 18a693d7581b24c427e3eb0ea3c034f2b117684e6928f543a2870ce0a6dbc47d
                                                    • Opcode Fuzzy Hash: c680f9321ffb2795063605ad27ad6f3670fe31d1a17b3adf35ee4f36706b9475
                                                    • Instruction Fuzzy Hash: 27F0B470D09242EBDB015B608D5D56E77B0EB0131572440BBD922B61D1D3BC15159A4F
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: lstrcmpi
                                                    • String ID:
                                                    • API String ID: 1586166983-0
                                                    • Opcode ID: 60b91e8680f25560b610cb838e9f37f51c7105b02bd0ba24c675bff51400aecd
                                                    • Instruction ID: 2054b4fd39c2606445503ce7959900ab0f3dea9fcdd1b9e0384b09bd98d31f4a
                                                    • Opcode Fuzzy Hash: 60b91e8680f25560b610cb838e9f37f51c7105b02bd0ba24c675bff51400aecd
                                                    • Instruction Fuzzy Hash: 72D01730908008EACB14CBA1CE498AE7678EA04344B2000B7D803B11E1D77C9A06EA9E
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,?), ref: 0040B855
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 1b351df1ea7fb5f52790fd532d97bff4ab9f760ba618a6875d7f2db2019d22d6
                                                    • Instruction ID: 27d430b84107eb8c3d33d50eb7b463d1072ab48d8dc88e2b40c365a009dd6e41
                                                    • Opcode Fuzzy Hash: 1b351df1ea7fb5f52790fd532d97bff4ab9f760ba618a6875d7f2db2019d22d6
                                                    • Instruction Fuzzy Hash: A1C08C32045602FBE7012BA04D017E27B55FB08344F6A4439EE02221A0877A5826A6DF
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: c3c04b999d176e8e41d11d6c7bf4e37f1d741f7e928365ee3a4038cb35ecec84
                                                    • Instruction ID: b6cf6bc5a1628d9bdcfdaba0c6c60b10926de35f039921a88a62ddeaff12d55e
                                                    • Opcode Fuzzy Hash: c3c04b999d176e8e41d11d6c7bf4e37f1d741f7e928365ee3a4038cb35ecec84
                                                    • Instruction Fuzzy Hash: 55B01230484500F7D2010B105D0CF64B630F708340F210131B103344D0C37E2422A7CE
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: e4cb724f7270be88b450b238f886d7074c0bb9d49c67e2c1bb41180ffc3b92a3
                                                    • Instruction ID: 291086371d425e456660cdf191cb7b4de608090c6a0f07ed662f117ce2112aa5
                                                    • Opcode Fuzzy Hash: e4cb724f7270be88b450b238f886d7074c0bb9d49c67e2c1bb41180ffc3b92a3
                                                    • Instruction Fuzzy Hash: DBB01230488000D6C60107706F0DF243531B300300F110176E607304E0C3750056660F
                                                    APIs
                                                    • CreateServiceA.ADVAPI32 ref: 00402675
                                                    • CloseServiceHandle.ADVAPI32(?), ref: 00402686
                                                    • CloseServiceHandle.ADVAPI32(?), ref: 0040B255
                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 0040B30C
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Service$CloseHandle$Create
                                                    • String ID:
                                                    • API String ID: 2095555506-0
                                                    • Opcode ID: 2c177fea5e3b1ca242a291b39c34e61f142856b21c271f09049a033fe1dac573
                                                    • Instruction ID: 2a102d6e87c8b6f1c9538181c12bd26dfb7c3ee1b21278c10020f49b35fc6be6
                                                    • Opcode Fuzzy Hash: 2c177fea5e3b1ca242a291b39c34e61f142856b21c271f09049a033fe1dac573
                                                    • Instruction Fuzzy Hash: 39E09231698104DACB10AB909E5DA593F32DB61314B764062E202BB190C77A8E16EFAD
                                                    APIs
                                                    • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02BA08E2
                                                    • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02BA08EA
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorFormatLastMessage
                                                    • String ID:
                                                    • API String ID: 3479602957-0
                                                    • Opcode ID: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                    • Instruction ID: af3101a8307ad8cb3f79a444706a23d3f327737dfd7465dde3e7670ad4936eee
                                                    • Opcode Fuzzy Hash: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                    • Instruction Fuzzy Hash: 35F0903020C301CFEB14DE29C8A1B2EB7E4FB9C744F500D2CF69592191D370E1418B5A
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02BA4DD6,?,?,?,00000001), ref: 02BA946D
                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02BA9476
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 952344cc785edcc80735a76b1a546abfa8d99ec0f80621c5dfd256e918dcd972
                                                    • Instruction ID: bba47502cf8c6732e6c5b4dfa992ac5e235c18dbfcac8d42cd7e18ca95d1c74b
                                                    • Opcode Fuzzy Hash: 952344cc785edcc80735a76b1a546abfa8d99ec0f80621c5dfd256e918dcd972
                                                    • Instruction Fuzzy Hash: 3FB09B3248410CEBC7021B91EC097457F18E744691F404812F50D454508FA154206651
                                                    APIs
                                                    • StartServiceCtrlDispatcherA.ADVAPI32 ref: 00402719
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: CtrlDispatcherServiceStart
                                                    • String ID:
                                                    • API String ID: 3789849863-0
                                                    • Opcode ID: 9f13255892c8bf08ac00eb1bf696ad9aa7a534aed4384b8351f9cd11c7335cb2
                                                    • Instruction ID: 6b6b6efe36a3f1568233d432dcb729bc3d4173121f0198e184196ca36f25e975
                                                    • Opcode Fuzzy Hash: 9f13255892c8bf08ac00eb1bf696ad9aa7a534aed4384b8351f9cd11c7335cb2
                                                    • Instruction Fuzzy Hash: 86B0923320C004CAEA0196A8BB6C6AA2248A68A36A7205C33C10BF24C2D2FD8057613B
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B924E6
                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02B924FC
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B9250E
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B9256D
                                                    • SetLastError.KERNEL32(00000000,?,74DEDFB0), ref: 02B9257F
                                                    • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,74DEDFB0), ref: 02B92599
                                                    • GetLastError.KERNEL32(?,74DEDFB0), ref: 02B925A2
                                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02B925F0
                                                    • InterlockedDecrement.KERNEL32(00000002), ref: 02B9262F
                                                    • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02B9268E
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B92699
                                                    • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02B926AD
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,74DEDFB0), ref: 02B926BD
                                                    • GetLastError.KERNEL32(?,74DEDFB0), ref: 02B926C7
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                    • String ID:
                                                    • API String ID: 1213838671-0
                                                    • Opcode ID: afa0a24152aa112a1c0d8b3cbf79e8d7b65e3e83c3a1868f9110d2f423ae7b7f
                                                    • Instruction ID: c0c5e8efe65096904305608bc7a985177d37ba5bd8023791d468046da20260e6
                                                    • Opcode Fuzzy Hash: afa0a24152aa112a1c0d8b3cbf79e8d7b65e3e83c3a1868f9110d2f423ae7b7f
                                                    • Instruction Fuzzy Hash: DA611C71D00209AFCF11DFA4C984AAEFBB9FF48350F5049AAE916E3640DB74A954DF60
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B94608
                                                      • Part of subcall function 02BA3A8F: _malloc.LIBCMT ref: 02BA3AA7
                                                    • htons.WS2_32(?), ref: 02B94669
                                                    • htonl.WS2_32(?), ref: 02B9468C
                                                    • htonl.WS2_32(00000000), ref: 02B94693
                                                    • htons.WS2_32(00000000), ref: 02B94747
                                                    • _sprintf.LIBCMT ref: 02B9475D
                                                      • Part of subcall function 02B988BF: _memmove.LIBCMT ref: 02B988DF
                                                    • htons.WS2_32(?), ref: 02B946B0
                                                      • Part of subcall function 02B9966A: __EH_prolog.LIBCMT ref: 02B9966F
                                                      • Part of subcall function 02B9966A: RtlEnterCriticalSection.NTDLL(00000020), ref: 02B996EA
                                                      • Part of subcall function 02B9966A: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02B99708
                                                      • Part of subcall function 02B91BA7: __EH_prolog.LIBCMT ref: 02B91BAC
                                                      • Part of subcall function 02B91BA7: RtlEnterCriticalSection.NTDLL ref: 02B91BBC
                                                      • Part of subcall function 02B91BA7: RtlLeaveCriticalSection.NTDLL ref: 02B91BEA
                                                      • Part of subcall function 02B91BA7: RtlEnterCriticalSection.NTDLL ref: 02B91C13
                                                      • Part of subcall function 02B91BA7: RtlLeaveCriticalSection.NTDLL ref: 02B91C56
                                                      • Part of subcall function 02B9DE26: __EH_prolog.LIBCMT ref: 02B9DE2B
                                                    • htonl.WS2_32(?), ref: 02B9497C
                                                    • htonl.WS2_32(00000000), ref: 02B94983
                                                    • htonl.WS2_32(00000000), ref: 02B949C8
                                                    • htonl.WS2_32(00000000), ref: 02B949CF
                                                    • htons.WS2_32(?), ref: 02B949EF
                                                    • htons.WS2_32(?), ref: 02B949F9
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                    • String ID:
                                                    • API String ID: 1645262487-0
                                                    • Opcode ID: 4a0df4c791a2fdc430b0286ec3cfdb04412d0d5ed1c55ac7c75c5b468cf076d5
                                                    • Instruction ID: 6726963861a4fc44ef1ae7403d4b3c9ba6ea502b0ab1fd4b887176825e6226d9
                                                    • Opcode Fuzzy Hash: 4a0df4c791a2fdc430b0286ec3cfdb04412d0d5ed1c55ac7c75c5b468cf076d5
                                                    • Instruction Fuzzy Hash: A6023B72D00259DFDF15DFA4C844BEEBBB9AF09304F1045AAE505B7280DB746A89CFA1
                                                    APIs
                                                    • RegisterServiceCtrlHandlerA.ADVAPI32(DPI Analog Input 9.15.45,Function_0000235E), ref: 004023C1
                                                    • SetServiceStatus.ADVAPI32(0040A0E0), ref: 00402420
                                                    • GetLastError.KERNEL32 ref: 00402422
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                    • GetLastError.KERNEL32 ref: 00402450
                                                    • SetServiceStatus.ADVAPI32(0040A0E0), ref: 00402480
                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                    • CloseHandle.KERNEL32(?,?,Function_000022CB), ref: 004024A1
                                                    • SetServiceStatus.ADVAPI32(0040A0E0), ref: 004024CA
                                                    Strings
                                                    • DPI Analog Input 9.15.45, xrefs: 004023BC
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                    • String ID: DPI Analog Input 9.15.45
                                                    • API String ID: 3346042915-1008169544
                                                    • Opcode ID: 753c8bccf627cb5353d4a294398c8736193124083ae435b11ee25f47cab8285e
                                                    • Instruction ID: 1420ef795783f2c616889eaeaacfbb85f42c25b2a6fdf7f0143c9c805b11b94c
                                                    • Opcode Fuzzy Hash: 753c8bccf627cb5353d4a294398c8736193124083ae435b11ee25f47cab8285e
                                                    • Instruction Fuzzy Hash: D4210C70441309EBD210DF16EF49E567FB8EB85754711C03BE206B22B0D7BA0064EB6E
                                                    APIs
                                                    • RtlDecodePointer.NTDLL(?), ref: 02BA827A
                                                    • _free.LIBCMT ref: 02BA8293
                                                      • Part of subcall function 02BA2EB4: HeapFree.KERNEL32(00000000,00000000,?,02BA5C12,00000000,00000104,74DF0A60), ref: 02BA2EC8
                                                      • Part of subcall function 02BA2EB4: GetLastError.KERNEL32(00000000,?,02BA5C12,00000000,00000104,74DF0A60), ref: 02BA2EDA
                                                    • _free.LIBCMT ref: 02BA82A6
                                                    • _free.LIBCMT ref: 02BA82C4
                                                    • _free.LIBCMT ref: 02BA82D6
                                                    • _free.LIBCMT ref: 02BA82E7
                                                    • _free.LIBCMT ref: 02BA82F2
                                                    • _free.LIBCMT ref: 02BA8316
                                                    • RtlEncodePointer.NTDLL(0080FDF0), ref: 02BA831D
                                                    • _free.LIBCMT ref: 02BA8332
                                                    • _free.LIBCMT ref: 02BA8348
                                                    • _free.LIBCMT ref: 02BA8370
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 3064303923-0
                                                    • Opcode ID: 26a9d7c4cc489d8b919815922fbef8b40e44739032dc3e0068dda6004458b1a7
                                                    • Instruction ID: 3d124894d8de77390aa8d97f4de1e14c67ab2e73f5e1a88807b1ef97c162caaf
                                                    • Opcode Fuzzy Hash: 26a9d7c4cc489d8b919815922fbef8b40e44739032dc3e0068dda6004458b1a7
                                                    • Instruction Fuzzy Hash: 1A219736D49210DFDB25AF15F8A091677E9FF897F432988AAEC44A7240C7349C95CF90
                                                    APIs
                                                    • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035B9
                                                    • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035CD
                                                    • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035F9
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402DE4), ref: 00403631
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402DE4), ref: 00403653
                                                    • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402DE4), ref: 0040366C
                                                    • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 0040367F
                                                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004036BD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                    • String ID: -@
                                                    • API String ID: 1823725401-2999422947
                                                    • Opcode ID: d09c44be7b725e9416f1bbabc7ff939c5033ef1a694eb4ed66286c613d9d8241
                                                    • Instruction ID: a052efc5f8264b04540ba139265ff63877c4dc4e75c0ae38b6650f7b3518fcca
                                                    • Opcode Fuzzy Hash: d09c44be7b725e9416f1bbabc7ff939c5033ef1a694eb4ed66286c613d9d8241
                                                    • Instruction Fuzzy Hash: 7A31F0B24042217EDB303F785C8883B7E9CE64574A7120D3BF542E3390E67A8E814AAD
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B93428
                                                    • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02B9346B
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02B93472
                                                    • GetLastError.KERNEL32 ref: 02B93486
                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02B934D7
                                                    • RtlEnterCriticalSection.NTDLL(00000018), ref: 02B934ED
                                                    • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02B93518
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                    • String ID: CancelIoEx$KERNEL32
                                                    • API String ID: 2902213904-434325024
                                                    • Opcode ID: ffb7145a7bf5dce6d3d2202e91fc8dd971fdac8e030d47824a713b46e283174c
                                                    • Instruction ID: 03cbc2fa9624019f7d822445da69f7536c4361cc33dd5a0cb456f8820eb9ee69
                                                    • Opcode Fuzzy Hash: ffb7145a7bf5dce6d3d2202e91fc8dd971fdac8e030d47824a713b46e283174c
                                                    • Instruction Fuzzy Hash: 6C316E71904205DFDB12AF64C854AAABBF9FF49310F0588EAE8169B340CBB4D900CFA1
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00403D7D,?,Microsoft Visual C++ Runtime Library,00012010,?,00406528,?,00406578,?,?,?,Runtime Error!Program: ), ref: 0040541A
                                                    • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00405432
                                                    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00405443
                                                    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00405450
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll$xe@
                                                    • API String ID: 2238633743-4073082454
                                                    • Opcode ID: c1c5459b902c6d691e26e6f6b3d5bc075fbf46770f4929c54e66e674ea662e67
                                                    • Instruction ID: 002c49bf34bfddc632f277928187d9a53126bd14f393e8a72b926efab3457658
                                                    • Opcode Fuzzy Hash: c1c5459b902c6d691e26e6f6b3d5bc075fbf46770f4929c54e66e674ea662e67
                                                    • Instruction Fuzzy Hash: E1018431740705AFC7109FB4AD80E6B7AE9FB48791309843BB955F22A1D778C860CF69
                                                    APIs
                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 00403CC6
                                                    • GetStdHandle.KERNEL32(000000F4,00406528,00000000,?,00000000,00000000), ref: 00403D9C
                                                    • WriteFile.KERNEL32(00000000), ref: 00403DA3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: File$HandleModuleNameWrite
                                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $r@
                                                    • API String ID: 3784150691-1191147370
                                                    • Opcode ID: d598713df4d839de7fd74915155ccdeaa4efa499b3dc35e679589c6eb5dc5418
                                                    • Instruction ID: 901e413bd7d296cb1b0b97d790854a8d5494ec17f79a926850544caa0371b074
                                                    • Opcode Fuzzy Hash: d598713df4d839de7fd74915155ccdeaa4efa499b3dc35e679589c6eb5dc5418
                                                    • Instruction Fuzzy Hash: F831C772A04208AEEF20EF60DE49F9A776CEF45304F1004BBF545F61C1D6B8AA858A59
                                                    APIs
                                                    • LCMapStringW.KERNEL32(00000000,00000100,004065F4,00000001,00000000,00000000,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 00405917
                                                    • LCMapStringA.KERNEL32(00000000,00000100,004065F0,00000001,00000000,00000000,?,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405933
                                                    • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,004051A5,?,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 0040597C
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 004059B4
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405A0C
                                                    • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405A22
                                                    • LCMapStringW.KERNEL32(00000000,?,004051A5,00000000,004051A5,?,?,004051A5,00200020,00000000,?,00000000), ref: 00405A55
                                                    • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405ABD
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: String$ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 352835431-0
                                                    • Opcode ID: 6e7e0904aad4ffb7df7fa70090622cd283316a6a4d1fe7c3c07164d91eefa06b
                                                    • Instruction ID: ad677ee5f46337090c489763c5b1535e0d4a7e7cc2f37d679e5ddd81b555dfe6
                                                    • Opcode Fuzzy Hash: 6e7e0904aad4ffb7df7fa70090622cd283316a6a4d1fe7c3c07164d91eefa06b
                                                    • Instruction Fuzzy Hash: 8B516C71A00609EFCF218FA5DD85A9F7FB5FB48750F14422AF911B21A0D3398921DF69
                                                    APIs
                                                    • OpenEventA.KERNEL32(00100002,00000000,00000000,BE553FAB), ref: 02BA15F0
                                                    • CloseHandle.KERNEL32(00000000), ref: 02BA1605
                                                    • ResetEvent.KERNEL32(00000000,BE553FAB), ref: 02BA160F
                                                    • CloseHandle.KERNEL32(00000000,BE553FAB), ref: 02BA1644
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,BE553FAB), ref: 02BA16BA
                                                    • CloseHandle.KERNEL32(00000000), ref: 02BA16CF
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseEventHandle$CreateOpenReset
                                                    • String ID:
                                                    • API String ID: 1285874450-0
                                                    • Opcode ID: 8ecde27bcbd2d1758bc672a8d2e98eee08170934a385746290efefd83a38811c
                                                    • Instruction ID: 7746ca736ff5cbfb4ca33167ba83b96be2bdc22625018e9e68c9a62fe78de331
                                                    • Opcode Fuzzy Hash: 8ecde27bcbd2d1758bc672a8d2e98eee08170934a385746290efefd83a38811c
                                                    • Instruction Fuzzy Hash: 37418E71D18348AFDF21CFADC854BADBBB8EF05764F144259E819EB280D7709905CBA0
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B920AC
                                                    • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02B920CD
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B920D8
                                                    • InterlockedDecrement.KERNEL32(?), ref: 02B9213E
                                                    • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02B9217A
                                                    • InterlockedDecrement.KERNEL32(?), ref: 02B92187
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B921A6
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                    • String ID:
                                                    • API String ID: 1171374749-0
                                                    • Opcode ID: 1f4038ecdb1e0a4fe4746770a4f4d342c7de998b914e6e4aa02a78f083e70613
                                                    • Instruction ID: a99ffdbe469d841a8949ddb5f2fde99edfab969cc7a3d2702613433c2a6b9158
                                                    • Opcode Fuzzy Hash: 1f4038ecdb1e0a4fe4746770a4f4d342c7de998b914e6e4aa02a78f083e70613
                                                    • Instruction Fuzzy Hash: 64414972904701AFC711DF25D884A6BBBF9EFC8654F000A6EF89693250DB30E545DFA1
                                                    APIs
                                                      • Part of subcall function 02BA1E10: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02BA166E,?,?), ref: 02BA1E3F
                                                      • Part of subcall function 02BA1E10: CloseHandle.KERNEL32(00000000,?,?,02BA166E,?,?), ref: 02BA1E54
                                                      • Part of subcall function 02BA1E10: SetEvent.KERNEL32(00000000,02BA166E,?,?), ref: 02BA1E67
                                                    • OpenEventA.KERNEL32(00100002,00000000,00000000,BE553FAB), ref: 02BA15F0
                                                    • CloseHandle.KERNEL32(00000000), ref: 02BA1605
                                                    • ResetEvent.KERNEL32(00000000,BE553FAB), ref: 02BA160F
                                                    • CloseHandle.KERNEL32(00000000,BE553FAB), ref: 02BA1644
                                                    • __CxxThrowException@8.LIBCMT ref: 02BA1675
                                                      • Part of subcall function 02BA449A: RaiseException.KERNEL32(?,?,02B9FA92,?,?,?,?,?,?,?,02B9FA92,?,02BC0F78,?), ref: 02BA44EF
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,BE553FAB), ref: 02BA16BA
                                                    • CloseHandle.KERNEL32(00000000), ref: 02BA16CF
                                                      • Part of subcall function 02BA1B50: GetCurrentProcessId.KERNEL32(?), ref: 02BA1BA9
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,BE553FAB), ref: 02BA16DF
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                    • String ID:
                                                    • API String ID: 2227236058-0
                                                    • Opcode ID: a95c36c41bebc270eaae78f2e50e4d9d98743cb9219ddf0d4915e2613c12140e
                                                    • Instruction ID: d95a5300788fec98495cf7d0d1e143c315dea1fc0dfa4d9a53b7dd785a0aedc3
                                                    • Opcode Fuzzy Hash: a95c36c41bebc270eaae78f2e50e4d9d98743cb9219ddf0d4915e2613c12140e
                                                    • Instruction Fuzzy Hash: 12317E75D18308ABDF60CBACC864BADB7B9EF05355F184199E81DEB280EB6099058B60
                                                    APIs
                                                    • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,00403A36), ref: 00404639
                                                    • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,00403A36), ref: 0040465D
                                                    • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,00403A36), ref: 00404677
                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,00403A36), ref: 00404738
                                                    • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,00403A36), ref: 0040474F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual$FreeHeap
                                                    • String ID: r@$r@
                                                    • API String ID: 714016831-1712950306
                                                    • Opcode ID: 6146d640eca2786615fae02a601f05dd2cfcbd8d5d5bc8993479f9a7be96b628
                                                    • Instruction ID: 6d2ae56a8b2e66d9b660bb9c1c671dd7469dd609f739855ae4ec176a3c74651c
                                                    • Opcode Fuzzy Hash: 6146d640eca2786615fae02a601f05dd2cfcbd8d5d5bc8993479f9a7be96b628
                                                    • Instruction Fuzzy Hash: 3531BEB0940702ABD3309F24DD44B66B7A4EB86755F11463BF265BB2D0E7B8A8418B4D
                                                    APIs
                                                    • __init_pointers.LIBCMT ref: 02BA5CD4
                                                      • Part of subcall function 02BA8442: RtlEncodePointer.NTDLL(00000000), ref: 02BA8445
                                                      • Part of subcall function 02BA8442: __initp_misc_winsig.LIBCMT ref: 02BA8460
                                                      • Part of subcall function 02BA8442: GetModuleHandleW.KERNEL32(kernel32.dll,?,02BC1578,00000008,00000003,02BC0F5C,?,00000001), ref: 02BA91C1
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02BA91D5
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02BA91E8
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02BA91FB
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02BA920E
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02BA9221
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02BA9234
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02BA9247
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02BA925A
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02BA926D
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02BA9280
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02BA9293
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02BA92A6
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02BA92B9
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02BA92CC
                                                      • Part of subcall function 02BA8442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02BA92DF
                                                    • __mtinitlocks.LIBCMT ref: 02BA5CD9
                                                    • __mtterm.LIBCMT ref: 02BA5CE2
                                                      • Part of subcall function 02BA5D4A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02BA8878
                                                      • Part of subcall function 02BA5D4A: _free.LIBCMT ref: 02BA887F
                                                      • Part of subcall function 02BA5D4A: RtlDeleteCriticalSection.NTDLL(02BC3978), ref: 02BA88A1
                                                    • __calloc_crt.LIBCMT ref: 02BA5D07
                                                    • __initptd.LIBCMT ref: 02BA5D29
                                                    • GetCurrentThreadId.KERNEL32 ref: 02BA5D30
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                    • String ID:
                                                    • API String ID: 3567560977-0
                                                    • Opcode ID: a781e156ada611057d263b42142a6c9f0b680b854b0195f3d9c82705bd073c82
                                                    • Instruction ID: 3d54fb2f12f6d7a30c5db1b63d870cb0015e8be6fb09e8417d9743e74bc9a3fb
                                                    • Opcode Fuzzy Hash: a781e156ada611057d263b42142a6c9f0b680b854b0195f3d9c82705bd073c82
                                                    • Instruction Fuzzy Hash: 7CF02432D5C7111EE23836B87C3AA4E3792EF01770B600AE9F4A1CA0C4FF1199814B51
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,02BA33B6,00000000), ref: 02BA341E
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02BA3425
                                                    • RtlEncodePointer.NTDLL(00000000), ref: 02BA3431
                                                    • RtlDecodePointer.NTDLL(00000001), ref: 02BA344E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                    • String ID: RoInitialize$combase.dll
                                                    • API String ID: 3489934621-340411864
                                                    • Opcode ID: d69495c4a7c1d66091472475bd2f05d5bcf0f9dbead6e99ec3a9a190cf797c1b
                                                    • Instruction ID: 9473e08023b4ede093ad27bf0090d842d28e27eb3b161b1d17ca0b09d1f69bef
                                                    • Opcode Fuzzy Hash: d69495c4a7c1d66091472475bd2f05d5bcf0f9dbead6e99ec3a9a190cf797c1b
                                                    • Instruction Fuzzy Hash: FAE0ED71DD0300ABEA125F749C89F557769BB847D6F5048B0B006E3190CFF5C0649B24
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02BA33F3), ref: 02BA34F3
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02BA34FA
                                                    • RtlEncodePointer.NTDLL(00000000), ref: 02BA3505
                                                    • RtlDecodePointer.NTDLL(02BA33F3), ref: 02BA3520
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                    • String ID: RoUninitialize$combase.dll
                                                    • API String ID: 3489934621-2819208100
                                                    • Opcode ID: 00493b114ab3f232d6cff2300805e11dddecbccb2b6fd94015fff34e98e9b815
                                                    • Instruction ID: 4a60e97e411bfccb93f6cf02c0dfb49ff67fca2058200de6de7909bf3bf94e0d
                                                    • Opcode Fuzzy Hash: 00493b114ab3f232d6cff2300805e11dddecbccb2b6fd94015fff34e98e9b815
                                                    • Instruction Fuzzy Hash: 17E09A71DD0300ABEA225F64AC59B6577A9FB88796F200894F106B3195CBF8D1609A24
                                                    APIs
                                                    • TlsGetValue.KERNEL32(00000029,BE553FAB,?,?,?,?,00000000,02BB69F8,000000FF,02BA210A), ref: 02BA1EAA
                                                    • TlsSetValue.KERNEL32(00000029,02BA210A,?,?,00000000), ref: 02BA1F17
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02BA1F41
                                                    • HeapFree.KERNEL32(00000000), ref: 02BA1F44
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: HeapValue$FreeProcess
                                                    • String ID:
                                                    • API String ID: 1812714009-0
                                                    • Opcode ID: beeec67c78b59f79eb113fcd102b4b2d320ebd97846b7a5926ea11edfd82b525
                                                    • Instruction ID: ceb53c0dd39f3858c7659e33ae4ba8797ec2b851ac74723c6a42275457931280
                                                    • Opcode Fuzzy Hash: beeec67c78b59f79eb113fcd102b4b2d320ebd97846b7a5926ea11edfd82b525
                                                    • Instruction Fuzzy Hash: 3251C2359083849FD760CF2DC898B16BBE5FB857A4F058699F85D97290D771EC00CB90
                                                    APIs
                                                    • _ValidateScopeTableHandlers.LIBCMT ref: 02BB56D0
                                                    • __FindPESection.LIBCMT ref: 02BB56EA
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: FindHandlersScopeSectionTableValidate
                                                    • String ID:
                                                    • API String ID: 876702719-0
                                                    • Opcode ID: 07ba649d96f803a5c851e254991e3c6a6c12d9df0ec961dfb6bd0bcbaa7ee4fd
                                                    • Instruction ID: 3952739f7bcaebc9c6bf79584c0ae066eacc587a331165ca7ca114c26a25aa8d
                                                    • Opcode Fuzzy Hash: 07ba649d96f803a5c851e254991e3c6a6c12d9df0ec961dfb6bd0bcbaa7ee4fd
                                                    • Instruction Fuzzy Hash: 82A18071A006158FDB36CF29D9807FDB7A9FF48324FA846E9D8559B240E771E801CBA1
                                                    APIs
                                                    • GetStringTypeW.KERNEL32(00000001,004065F4,00000001,00000000,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405B63
                                                    • GetStringTypeA.KERNEL32(00000000,00000001,004065F0,00000001,?,?,00000000,00000000,00000001), ref: 00405B7D
                                                    • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BB1
                                                    • MultiByteToWideChar.KERNEL32(004051A5,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BE9
                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405C3F
                                                    • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405C51
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: StringType$ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 3852931651-0
                                                    • Opcode ID: d4209c6b3d3c9ca3d0b98124627720af5477d93fa3c81dc5f6dd6a722f71754a
                                                    • Instruction ID: b73683cf29d179dc30ac0dacbc12c8afa3e963ef4805c6be7b54428ebd0f8a91
                                                    • Opcode Fuzzy Hash: d4209c6b3d3c9ca3d0b98124627720af5477d93fa3c81dc5f6dd6a722f71754a
                                                    • Instruction Fuzzy Hash: 1E417B71500609EFDF219F94DD86AAF7F79EB05750F10443AFA12B6290C339A960CBA9
                                                    APIs
                                                    • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02B91CB1
                                                    • CloseHandle.KERNEL32(?), ref: 02B91CBA
                                                    • InterlockedExchangeAdd.KERNEL32(02BC7244,00000000), ref: 02B91CC6
                                                    • TerminateThread.KERNEL32(?,00000000), ref: 02B91CD4
                                                    • QueueUserAPC.KERNEL32(02B91E7C,?,00000000), ref: 02B91CE1
                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02B91CEC
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                    • String ID:
                                                    • API String ID: 1946104331-0
                                                    • Opcode ID: dbd985cb0f2a4eefab4c50d5fbe483a8295bc4f393be4639e99dfb6f3c774abb
                                                    • Instruction ID: 8b22e4614c3c3e2425496aee94395ba732cee764e3bded2f3689959be2894153
                                                    • Opcode Fuzzy Hash: dbd985cb0f2a4eefab4c50d5fbe483a8295bc4f393be4639e99dfb6f3c774abb
                                                    • Instruction Fuzzy Hash: DBF0A432550205BFDB114B99DC0DC5BFBBCEB85721B50469EF52AC3190DFB05910EB20
                                                    APIs
                                                    • GetVersionExA.KERNEL32 ref: 004038C7
                                                    • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 004038FC
                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040395C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentFileModuleNameVariableVersion
                                                    • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                    • API String ID: 1385375860-4131005785
                                                    • Opcode ID: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                    • Instruction ID: dfbe321087950a958f1f5ebe55e663b38e75b845a74228cdfb1d658b51cb0ff2
                                                    • Opcode Fuzzy Hash: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                    • Instruction Fuzzy Hash: A53127B29052446DEB319A705C46BDF3F6C9B02305F2400FBD185F52C2D2B99F85CB18
                                                    APIs
                                                    • std::exception::exception.LIBCMT ref: 02BA18BF
                                                      • Part of subcall function 02BA2413: std::exception::_Copy_str.LIBCMT ref: 02BA242C
                                                      • Part of subcall function 02BA0C90: __CxxThrowException@8.LIBCMT ref: 02BA0CEE
                                                    • std::exception::exception.LIBCMT ref: 02BA191E
                                                    Strings
                                                    • boost unique_lock has no mutex, xrefs: 02BA18AE
                                                    • boost unique_lock owns already the mutex, xrefs: 02BA190D
                                                    • $, xrefs: 02BA1923
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                    • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                    • API String ID: 2140441600-46888669
                                                    • Opcode ID: ce2b26a08f97090161046b8754445af1df5fb2a3d04e60d8660e06e5531b775a
                                                    • Instruction ID: 45f3186e73fad4ff763c851aeb9f9dbdc24a4f7e79034fec274caacc7994d954
                                                    • Opcode Fuzzy Hash: ce2b26a08f97090161046b8754445af1df5fb2a3d04e60d8660e06e5531b775a
                                                    • Instruction Fuzzy Hash: 5F2103B15083809FD321DF24C05479BBBE9BB88708F504D9EE4A587280D7B598088F82
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B92350
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B92360
                                                    • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02B92370
                                                    • GetLastError.KERNEL32 ref: 02B9237A
                                                      • Part of subcall function 02B91712: __EH_prolog.LIBCMT ref: 02B91717
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                    • String ID: pqcs
                                                    • API String ID: 1619523792-2559862021
                                                    • Opcode ID: 082c2bfec7f96bc47842c0989add3f29363d17fd608d681eb42727f0cea1ee57
                                                    • Instruction ID: 6500b1c98919e0c4ada61d897495b750a6024f5d57e0be05b77894d2f724a5d8
                                                    • Opcode Fuzzy Hash: 082c2bfec7f96bc47842c0989add3f29363d17fd608d681eb42727f0cea1ee57
                                                    • Instruction Fuzzy Hash: D9F05471D40305AFDB11AF78DC09BABBBACEF40741F4085AAE806D3140EBB0D9149B91
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B94035
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 02B94042
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02B94049
                                                    • std::exception::exception.LIBCMT ref: 02B94063
                                                      • Part of subcall function 02B9A5FD: __EH_prolog.LIBCMT ref: 02B9A602
                                                      • Part of subcall function 02B9A5FD: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02B9A611
                                                      • Part of subcall function 02B9A5FD: __CxxThrowException@8.LIBCMT ref: 02B9A630
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                    • String ID: bad allocation
                                                    • API String ID: 3112922283-2104205924
                                                    • Opcode ID: b8c372dc37664ab8508528cdc8d8ace1b97b1b0ce97f60870c79d6f9533e036a
                                                    • Instruction ID: 5a6631a92bcedaa88099f663eb97d0f069a5b0800509006895797079dc10a585
                                                    • Opcode Fuzzy Hash: b8c372dc37664ab8508528cdc8d8ace1b97b1b0ce97f60870c79d6f9533e036a
                                                    • Instruction Fuzzy Hash: 7BF05EB2E442099BCB11EFE0C914BFFB779EF04340F8045D5E915A2240DBB492148B51
                                                    APIs
                                                    • GetStartupInfoA.KERNEL32(?), ref: 00403729
                                                    • GetFileType.KERNEL32(00000800), ref: 004037CF
                                                    • GetStdHandle.KERNEL32(-000000F6), ref: 00403828
                                                    • GetFileType.KERNEL32(00000000), ref: 00403836
                                                    • SetHandleCount.KERNEL32 ref: 0040386D
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: FileHandleType$CountInfoStartup
                                                    • String ID:
                                                    • API String ID: 1710529072-0
                                                    • Opcode ID: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                    • Instruction ID: 340931fb5571d0dd89e9413526c141aa1936fc067e7847d678db743c6b9c99aa
                                                    • Opcode Fuzzy Hash: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                    • Instruction Fuzzy Hash: A65136B25003508BD7209F28CD48B563FE8EB01336F19C67AE492EB2E1C738C955C75A
                                                    APIs
                                                      • Part of subcall function 02BA1990: CloseHandle.KERNEL32(00000000,BE553FAB), ref: 02BA19E1
                                                      • Part of subcall function 02BA1990: WaitForSingleObject.KERNEL32(?,000000FF,BE553FAB,?,?,?,?,BE553FAB,02BA1963,BE553FAB), ref: 02BA19F8
                                                    • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02BA1C5E
                                                    • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02BA1C7E
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02BA1CB7
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02BA1D0B
                                                    • SetEvent.KERNEL32(?), ref: 02BA1D12
                                                      • Part of subcall function 02B9418C: CloseHandle.KERNEL32(00000000,?,02BA1C45), ref: 02B941B0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                    • String ID:
                                                    • API String ID: 4166353394-0
                                                    • Opcode ID: 7d5e4e82c28585e2c5452cb7ed557a5f203fc57d7dab26159177f5392dca146f
                                                    • Instruction ID: 4f3423ad4f71f925b17ad2b2612282d29acc2ac8e9c4f362bdca44511fda47f3
                                                    • Opcode Fuzzy Hash: 7d5e4e82c28585e2c5452cb7ed557a5f203fc57d7dab26159177f5392dca146f
                                                    • Instruction Fuzzy Hash: 3E410F316083119BDB66DF2CCC90B27B7A8EF45324F2406A9EC59EB291D735D8018BA1
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B920AC
                                                    • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02B920CD
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B920D8
                                                    • InterlockedDecrement.KERNEL32(?), ref: 02B9213E
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B921A6
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$Exchange$DecrementTimerWaitable
                                                    • String ID:
                                                    • API String ID: 1611172436-0
                                                    • Opcode ID: c4d87c733b39626e26a2c5ec14fbcf6450ea1880f99869fcdb38c7c7c554ab65
                                                    • Instruction ID: a0c880b0b6b3de65a29b6f19b3113d7ea25a55378fabad9ed9b4ed1baa40a01a
                                                    • Opcode Fuzzy Hash: c4d87c733b39626e26a2c5ec14fbcf6450ea1880f99869fcdb38c7c7c554ab65
                                                    • Instruction Fuzzy Hash: 9A319C72508701AFC711DF29C884A6BBBF9EFC8A54F100A6EF85683250DB30E446DF51
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9E030
                                                      • Part of subcall function 02B91A01: TlsGetValue.KERNEL32 ref: 02B91A0A
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B9E0AF
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B9E0CB
                                                    • InterlockedIncrement.KERNEL32(02BC5180), ref: 02B9E0F0
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B9E105
                                                      • Part of subcall function 02B927F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02B9284E
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                    • String ID:
                                                    • API String ID: 1578506061-0
                                                    • Opcode ID: fd0abc59b426a3ba5f98eef6dba8731a4e02119cfd72216fb0fc7e2e6c08633d
                                                    • Instruction ID: f7d311940b604a928a4cc5070d50facfd5e0a91534ffb6ef310e68935b39b53b
                                                    • Opcode Fuzzy Hash: fd0abc59b426a3ba5f98eef6dba8731a4e02119cfd72216fb0fc7e2e6c08633d
                                                    • Instruction Fuzzy Hash: 1E3149B2D016059FCB11DFA8C544AAEBBF9FF48310F1449AED849D7640E775AA04CFA1
                                                    APIs
                                                    • _malloc.LIBCMT ref: 02BB02F0
                                                      • Part of subcall function 02BA2EEC: __FF_MSGBANNER.LIBCMT ref: 02BA2F03
                                                      • Part of subcall function 02BA2EEC: __NMSG_WRITE.LIBCMT ref: 02BA2F0A
                                                      • Part of subcall function 02BA2EEC: RtlAllocateHeap.NTDLL(007F0000,00000000,00000001), ref: 02BA2F2F
                                                    • _free.LIBCMT ref: 02BB0303
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateHeap_free_malloc
                                                    • String ID:
                                                    • API String ID: 1020059152-0
                                                    • Opcode ID: d69add9ac6cce770a15e36e0d9a30e6d439fc69106dfc652df32365254eaffe8
                                                    • Instruction ID: c9312f89eb4bded25a6c5911b128f29a52774383181099aa8c3dcd60b95ee69e
                                                    • Opcode Fuzzy Hash: d69add9ac6cce770a15e36e0d9a30e6d439fc69106dfc652df32365254eaffe8
                                                    • Instruction Fuzzy Hash: E811A732D0C615ABDB223F74A81CBBB3799DF083A0B108DE5F9599B550DFB48590CB90
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B921DA
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B921ED
                                                    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02B92224
                                                    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02B92237
                                                    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02B92261
                                                      • Part of subcall function 02B92341: InterlockedExchange.KERNEL32(?,00000001), ref: 02B92350
                                                      • Part of subcall function 02B92341: InterlockedExchange.KERNEL32(?,00000001), ref: 02B92360
                                                      • Part of subcall function 02B92341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02B92370
                                                      • Part of subcall function 02B92341: GetLastError.KERNEL32 ref: 02B9237A
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 1856819132-0
                                                    • Opcode ID: 1d377f3c1445731e4080057e29e4d393b8f98c4d3c10df403b64834f8a1443f7
                                                    • Instruction ID: 25e18f3aa8ef263d507aff7740a032b1036a30198e6728429cd5b8d760d45aab
                                                    • Opcode Fuzzy Hash: 1d377f3c1445731e4080057e29e4d393b8f98c4d3c10df403b64834f8a1443f7
                                                    • Instruction Fuzzy Hash: 8911E132D08114EBCF02AFA9D8046AEFFBAFF49350F1045AAE811A3260DB718651DF90
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9229D
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B922B0
                                                    • TlsGetValue.KERNEL32 ref: 02B922E7
                                                    • TlsSetValue.KERNEL32(?), ref: 02B92300
                                                    • TlsSetValue.KERNEL32(?,?,?), ref: 02B9231C
                                                      • Part of subcall function 02B92341: InterlockedExchange.KERNEL32(?,00000001), ref: 02B92350
                                                      • Part of subcall function 02B92341: InterlockedExchange.KERNEL32(?,00000001), ref: 02B92360
                                                      • Part of subcall function 02B92341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02B92370
                                                      • Part of subcall function 02B92341: GetLastError.KERNEL32 ref: 02B9237A
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 1856819132-0
                                                    • Opcode ID: c940163277c1d8e3a3e704b73feedab05ec33b8d881278c4d7135ff5fb4ac212
                                                    • Instruction ID: 00a692957bee6f49cb8b3afcd87dfd4563ef6a0bbe5ec2b6873ddad3cb955207
                                                    • Opcode Fuzzy Hash: c940163277c1d8e3a3e704b73feedab05ec33b8d881278c4d7135ff5fb4ac212
                                                    • Instruction Fuzzy Hash: 80116072D04118EFCF02AFA5D844AAEFFBAFF48350F1045AAE805A3210DB718A51DF90
                                                    APIs
                                                      • Part of subcall function 02B9B098: __EH_prolog.LIBCMT ref: 02B9B09D
                                                    • __CxxThrowException@8.LIBCMT ref: 02B9BC62
                                                      • Part of subcall function 02BA449A: RaiseException.KERNEL32(?,?,02B9FA92,?,?,?,?,?,?,?,02B9FA92,?,02BC0F78,?), ref: 02BA44EF
                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02BC1D94,?,00000001), ref: 02B9BC78
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B9BC8B
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02BC1D94,?,00000001), ref: 02B9BC9B
                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B9BCA9
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                    • String ID:
                                                    • API String ID: 2725315915-0
                                                    • Opcode ID: d12fc429848d5a9bb4c22fb9782520ecf778a863e33e2f5b0ae011818c554f2e
                                                    • Instruction ID: 559e1c9411251b157417f135d3d479ef97329eea7d6e644bfd356e6128641c77
                                                    • Opcode Fuzzy Hash: d12fc429848d5a9bb4c22fb9782520ecf778a863e33e2f5b0ae011818c554f2e
                                                    • Instruction Fuzzy Hash: A3016272A40304AFDB10DEA4EC89E8A77ADEB04759F004565F625D7190DFA0E805DB10
                                                    APIs
                                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02B92432
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02B92445
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B92454
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B92469
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B92470
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 747265849-0
                                                    • Opcode ID: a74bdcaf04efcd2f8280b7ba939127c14411c767900e86f0d203aeacc7a5613e
                                                    • Instruction ID: 5ef361d6e3dacf30858e61cba8c7ad83c188aa1105c0cb0072d133d401d9074a
                                                    • Opcode Fuzzy Hash: a74bdcaf04efcd2f8280b7ba939127c14411c767900e86f0d203aeacc7a5613e
                                                    • Instruction Fuzzy Hash: A0F01D73A40204BBDA119AA4ED89FDAB76CFB85751F804462F701D7580DBA1A520DBA1
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(?), ref: 02B91ED2
                                                    • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02B91EEA
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B91EF9
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B91F0E
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B91F15
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 830998967-0
                                                    • Opcode ID: 4bc9a15716d05ed187ff61ea2584c4e17d2e09428d23ae78fe473678911cbe34
                                                    • Instruction ID: 97bedb1ac5d061caeb061174dca9ea9e18ff352141229e55a246ecc02992edbb
                                                    • Opcode Fuzzy Hash: 4bc9a15716d05ed187ff61ea2584c4e17d2e09428d23ae78fe473678911cbe34
                                                    • Instruction Fuzzy Hash: 63F09A73640205BBDB01AFA4EC88FDABB2CFF84381F400422F20183440CBB0A524DBE0
                                                    APIs
                                                      • Part of subcall function 02B99A0C: __EH_prolog.LIBCMT ref: 02B99A11
                                                      • Part of subcall function 02B99A0C: _Allocate.LIBCPMT ref: 02B99A68
                                                      • Part of subcall function 02B99A0C: _memmove.LIBCMT ref: 02B99ABF
                                                    • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02BA08E2
                                                    • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02BA08EA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateErrorFormatH_prologLastMessage_memmove
                                                    • String ID: Unknown error$invalid string position
                                                    • API String ID: 1017912131-1837348584
                                                    • Opcode ID: 3aaef495ae419d2c50824b1105964af83f7b56412dfa89993402766793b9baac
                                                    • Instruction ID: c4224ba17d6db5230b27330963ca3b5e60feed8290df27592b4ef7f1c1a2d2c2
                                                    • Opcode Fuzzy Hash: 3aaef495ae419d2c50824b1105964af83f7b56412dfa89993402766793b9baac
                                                    • Instruction Fuzzy Hash: 22519B7020C3418FEB14DF28C8A0B2EBBE4FB98744F5009AEF59297691D775E548CB96
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: invalid string position$string too long
                                                    • API String ID: 4104443479-4289949731
                                                    • Opcode ID: fa9976ff6a81fa0459c52269bd160b12f1a9bb79c1417e3090164340aedb62fa
                                                    • Instruction ID: 12c2bf92f8e8128e3203eaf949f852090b52083e60db30ac4210064bd49b94ce
                                                    • Opcode Fuzzy Hash: fa9976ff6a81fa0459c52269bd160b12f1a9bb79c1417e3090164340aedb62fa
                                                    • Instruction Fuzzy Hash: BC41D231300301AFDF24DE69DC84A66B7AAEF42724B0009BDE856CB391C775E944CBA0
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000), ref: 02B930C3
                                                    • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02B93102
                                                    • _memcmp.LIBCMT ref: 02B93141
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressErrorLastString_memcmp
                                                    • String ID: 255.255.255.255
                                                    • API String ID: 1618111833-2422070025
                                                    • Opcode ID: e8714f3356d9b449f3afa3a4dcf31ab07776e0bdc5ce093cbbc88a813ca43a23
                                                    • Instruction ID: 5351161f2518bb8b19da6f612d6c2923eb49b1ea194e6b451865e7f3a0e3cf53
                                                    • Opcode Fuzzy Hash: e8714f3356d9b449f3afa3a4dcf31ab07776e0bdc5ce093cbbc88a813ca43a23
                                                    • Instruction Fuzzy Hash: 8431A171A002159FDF20AF64C880B6EB7E6FF45324F1045F9E96A972A0DB71A9858F90
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B91F5B
                                                    • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02B91FC5
                                                    • GetLastError.KERNEL32(?,00000000), ref: 02B91FD2
                                                      • Part of subcall function 02B91712: __EH_prolog.LIBCMT ref: 02B91717
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$CompletionCreateErrorLastPort
                                                    • String ID: iocp
                                                    • API String ID: 998023749-976528080
                                                    • Opcode ID: 2f711dfc8b1d1c32303497af4685cb586f0dcb3767d9ca03de4d914acff47afb
                                                    • Instruction ID: a43ab50b6e1dfe54aa828dc81d1c263671f5d5b97a024965a079c5b060f916aa
                                                    • Opcode Fuzzy Hash: 2f711dfc8b1d1c32303497af4685cb586f0dcb3767d9ca03de4d914acff47afb
                                                    • Instruction Fuzzy Hash: 4121D3B1901B459FC721DF6AC50459BFBF8FFA4720B108A5FD4A683A90D7B0A604CF91
                                                    APIs
                                                    • _malloc.LIBCMT ref: 02BA3AA7
                                                      • Part of subcall function 02BA2EEC: __FF_MSGBANNER.LIBCMT ref: 02BA2F03
                                                      • Part of subcall function 02BA2EEC: __NMSG_WRITE.LIBCMT ref: 02BA2F0A
                                                      • Part of subcall function 02BA2EEC: RtlAllocateHeap.NTDLL(007F0000,00000000,00000001), ref: 02BA2F2F
                                                    • std::exception::exception.LIBCMT ref: 02BA3AC5
                                                    • __CxxThrowException@8.LIBCMT ref: 02BA3ADA
                                                      • Part of subcall function 02BA449A: RaiseException.KERNEL32(?,?,02B9FA92,?,?,?,?,?,?,?,02B9FA92,?,02BC0F78,?), ref: 02BA44EF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                    • String ID: bad allocation
                                                    • API String ID: 3074076210-2104205924
                                                    • Opcode ID: 5efe847513709b55d4d141ad36b009528dd292483a31ea577434d52c3fa4970d
                                                    • Instruction ID: 1b0f6752aef8c25ad0daf5482d9952d92adbf116b2c17e867e39068164d89d38
                                                    • Opcode Fuzzy Hash: 5efe847513709b55d4d141ad36b009528dd292483a31ea577434d52c3fa4970d
                                                    • Instruction Fuzzy Hash: 8AE0657590821EAADB00FF64CC259EFBBBDAF00344F5005D5AC25A5590EFB19644DA90
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B937B6
                                                    • __localtime64.LIBCMT ref: 02B937C1
                                                      • Part of subcall function 02BA2540: __gmtime64_s.LIBCMT ref: 02BA2553
                                                    • std::exception::exception.LIBCMT ref: 02B937D9
                                                      • Part of subcall function 02BA2413: std::exception::_Copy_str.LIBCMT ref: 02BA242C
                                                      • Part of subcall function 02B9A45B: __EH_prolog.LIBCMT ref: 02B9A460
                                                      • Part of subcall function 02B9A45B: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02B9A46F
                                                      • Part of subcall function 02B9A45B: __CxxThrowException@8.LIBCMT ref: 02B9A48E
                                                    Strings
                                                    • could not convert calendar time to UTC time, xrefs: 02B937CE
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                    • String ID: could not convert calendar time to UTC time
                                                    • API String ID: 1963798777-2088861013
                                                    • Opcode ID: aab1953f859d7873e2397fe9360e6df4153443a6eacf4aedd0ecf254cc229bbf
                                                    • Instruction ID: b7c869e7137038b4a6920fee5822d977ab8cf5821c6dd7056ee5564266735eea
                                                    • Opcode Fuzzy Hash: aab1953f859d7873e2397fe9360e6df4153443a6eacf4aedd0ecf254cc229bbf
                                                    • Instruction Fuzzy Hash: DEE06DB2D0460A9ACF12EF90D8157FEB7B9FF04300F4045EAD815A2640EBB956068F95
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,00008000,00004000,74DEDFF0,?,00000000), ref: 00404092
                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004040ED
                                                    • HeapFree.KERNEL32(00000000,?), ref: 004040FF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Free$Virtual$Heap
                                                    • String ID: -@
                                                    • API String ID: 2016334554-2999422947
                                                    • Opcode ID: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                    • Instruction ID: d55dda63c6158a3f001c35490e62a79414290c04420ce97baa52a0c06dad31a7
                                                    • Opcode Fuzzy Hash: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                    • Instruction Fuzzy Hash: D1B16C75A00205DFDB24CF04CA90AA9BBB1FB88314F24C1AED9196F396C735EE41CB84
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AdjustPointer_memmove
                                                    • String ID:
                                                    • API String ID: 1721217611-0
                                                    • Opcode ID: e1f5df76b802269190e374e85c63d0081ab903f00e896990588012c8fda6307b
                                                    • Instruction ID: 4de846b73fd86b3944a83847183ead8c89d833321c37fb0ce17b45201ec04362
                                                    • Opcode Fuzzy Hash: e1f5df76b802269190e374e85c63d0081ab903f00e896990588012c8fda6307b
                                                    • Instruction Fuzzy Hash: 7D41953760C7039BEB255E68D870BBA3BE6DF01714F28449FE849861E2DF71E580CA55
                                                    APIs
                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02B94149), ref: 02BA12FF
                                                      • Part of subcall function 02B93FDC: __EH_prolog.LIBCMT ref: 02B93FE1
                                                      • Part of subcall function 02B93FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02B93FF3
                                                    • CloseHandle.KERNEL32(00000000), ref: 02BA12F4
                                                    • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02B94149), ref: 02BA1340
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02B94149), ref: 02BA1411
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandle$Event$CreateH_prolog
                                                    • String ID:
                                                    • API String ID: 2825413587-0
                                                    • Opcode ID: ebfe1e83e71e4b4c48bb0cffda842522d965cc05ba15fbe7ea7a319af84cd129
                                                    • Instruction ID: d4d02a71667c0410065367469c9c3152e3f7c5545f7a0c4f69caa5a60cf8f0e6
                                                    • Opcode Fuzzy Hash: ebfe1e83e71e4b4c48bb0cffda842522d965cc05ba15fbe7ea7a319af84cd129
                                                    • Instruction Fuzzy Hash: 4951B0716083059BDF11DF2CC89479A77E4EF88328F1946A9E86D97390DB35D805CF91
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                    • String ID:
                                                    • API String ID: 2782032738-0
                                                    • Opcode ID: 4b00bb2f2e8909ad1b25914f564552747ffa73792e7b52f6c639d3ed484d2925
                                                    • Instruction ID: 4c80734a276df80cb5b385a4cad623068e021cbc1f0e4e02d296bdc867cd03a0
                                                    • Opcode Fuzzy Hash: 4b00bb2f2e8909ad1b25914f564552747ffa73792e7b52f6c639d3ed484d2925
                                                    • Instruction Fuzzy Hash: C441C4B5A08706ABDB18CFA9C8F09AE7BE6EF44364B1485FDE815C7240D770E941CB40
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02BAFE8B
                                                    • __isleadbyte_l.LIBCMT ref: 02BAFEB9
                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02BAFEE7
                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02BAFF1D
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: 4b7eefa3c262125802cbb401cdd253073147f59b99907343646ad1a5ac719a75
                                                    • Instruction ID: ed723187afdbe3fa52be955920ab2102a0e7b721048940489ef22f4ec4bb46e1
                                                    • Opcode Fuzzy Hash: 4b7eefa3c262125802cbb401cdd253073147f59b99907343646ad1a5ac719a75
                                                    • Instruction Fuzzy Hash: D331E131608246AFDF218E34C854BFA7BA9FF41354F1545A8E86887991E732D851DB90
                                                    APIs
                                                    • VirtualFree.KERNEL32(FFFFFFFF,00001000,00004000,74DEDFF0,?,00000000,?,-@,0040490E,00000010,00402FA3,?,?), ref: 004047F0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID: -@$r@$r@
                                                    • API String ID: 1263568516-1251997348
                                                    • Opcode ID: db728298b98a3dab2ecdb4dab480861bd9016d5beafec50a15f5b98851f5bcbc
                                                    • Instruction ID: a63ca1888fca441bf056fbcf5d5deb39584b298cc2094c54b415f4e68fc1e946
                                                    • Opcode Fuzzy Hash: db728298b98a3dab2ecdb4dab480861bd9016d5beafec50a15f5b98851f5bcbc
                                                    • Instruction Fuzzy Hash: EE21A1B66003419BDB20AB24DD4476633A4EB81379F24CA3BDB65B66D0D378E941CB58
                                                    APIs
                                                    • htons.WS2_32(?), ref: 02B93DA2
                                                      • Part of subcall function 02B93BD3: __EH_prolog.LIBCMT ref: 02B93BD8
                                                      • Part of subcall function 02B93BD3: std::bad_exception::bad_exception.LIBCMT ref: 02B93BED
                                                    • htonl.WS2_32(00000000), ref: 02B93DB9
                                                    • htonl.WS2_32(00000000), ref: 02B93DC0
                                                    • htons.WS2_32(?), ref: 02B93DD4
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                    • String ID:
                                                    • API String ID: 3882411702-0
                                                    • Opcode ID: a49fc74bac03038da8b4c9e673e7e85d2bcc384cd15ce5702e05a2dda988dc22
                                                    • Instruction ID: b9bfbd798daef9cd10a3d736d33e495a69a739875f04f51874f0d3bd69ee7b35
                                                    • Opcode Fuzzy Hash: a49fc74bac03038da8b4c9e673e7e85d2bcc384cd15ce5702e05a2dda988dc22
                                                    • Instruction Fuzzy Hash: 1C118276900209EFCF019F64D885A5AB7B9EF49310F0084A6FC04DF205DB719A54DBA1
                                                    APIs
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02B923D0
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B923DE
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B92401
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B92408
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 4018804020-0
                                                    • Opcode ID: 8a307a603a9b3f9be76c7fa9f03d5176a5d2a6b4e0752c68e9db207e7c9f5267
                                                    • Instruction ID: 4210b656dedcba248e0e17d14590949ca8f719e5abdd80696d9810cd15dd2c83
                                                    • Opcode Fuzzy Hash: 8a307a603a9b3f9be76c7fa9f03d5176a5d2a6b4e0752c68e9db207e7c9f5267
                                                    • Instruction Fuzzy Hash: 3911CE72A00204AFDB109F64D884B6ABBB9FF41744F1044BDEA019B240EBB1E911DBA0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                    • String ID:
                                                    • API String ID: 3016257755-0
                                                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                    • Instruction ID: 280091ae5f346f20186c11e9963e2296d22dd81903497990b095b7cb2d9b3257
                                                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                    • Instruction Fuzzy Hash: B3011C7600814EBBCF126E84CC618EE3F67BB18358F488496FA1899131D736D5B1EB81
                                                    APIs
                                                    • ___BuildCatchObject.LIBCMT ref: 02BABC84
                                                      • Part of subcall function 02BAC29B: ___AdjustPointer.LIBCMT ref: 02BAC2E4
                                                    • _UnwindNestedFrames.LIBCMT ref: 02BABC9B
                                                    • ___FrameUnwindToState.LIBCMT ref: 02BABCAD
                                                    • CallCatchBlock.LIBCMT ref: 02BABCD1
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                    • String ID:
                                                    • API String ID: 2633735394-0
                                                    • Opcode ID: bf7e6a2e7c15418c5902c0973dae014681d9a77571f4c99d076f4f289f483f1c
                                                    • Instruction ID: ffd02dd98419a3cc4e95c6054e92a8888f66b4c7dce910ff41227f4555bf8275
                                                    • Opcode Fuzzy Hash: bf7e6a2e7c15418c5902c0973dae014681d9a77571f4c99d076f4f289f483f1c
                                                    • Instruction Fuzzy Hash: 31011332004109BBCF126F95CD10EDA3FBAFF58758F044055F92866120D772E8A2DFA0
                                                    APIs
                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02B924A9
                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02B924B8
                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02B924CD
                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02B924D4
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                    • String ID:
                                                    • API String ID: 4018804020-0
                                                    • Opcode ID: 8fa622122724b9b5ad4d24f113c22aafddb1cb72b19b6f9d71bbdefdbe9f133e
                                                    • Instruction ID: dac7d8512b5e438cb2659aedbc808e5fe3d1254a8c0c8c96297089cad3289fd2
                                                    • Opcode Fuzzy Hash: 8fa622122724b9b5ad4d24f113c22aafddb1cb72b19b6f9d71bbdefdbe9f133e
                                                    • Instruction Fuzzy Hash: BDF03C72640205AFDB00AF69EC84F9ABBACFF45750F40446AFA05CB141DBB1E560CFA0
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B92009
                                                    • RtlDeleteCriticalSection.NTDLL(?), ref: 02B92028
                                                    • CloseHandle.KERNEL32(00000000), ref: 02B92037
                                                    • CloseHandle.KERNEL32(00000000), ref: 02B9204E
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                    • String ID:
                                                    • API String ID: 2456309408-0
                                                    • Opcode ID: 79847fa6ea9b6e8a4c95fb8282109df75c714a3e3a3d5902dc599ffdf245d322
                                                    • Instruction ID: e7a51ee706fbc382d037dc04a23fe660e177ee9cf7e68262894c0dad76a838c0
                                                    • Opcode Fuzzy Hash: 79847fa6ea9b6e8a4c95fb8282109df75c714a3e3a3d5902dc599ffdf245d322
                                                    • Instruction Fuzzy Hash: 240186728046049BCB39AF58E508BEAF7F5FF04704F4049AEE84693590CBB56548DF55
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Event$H_prologSleep
                                                    • String ID:
                                                    • API String ID: 1765829285-0
                                                    • Opcode ID: 1bcf7c784dae98e3a0021300a4b444aea9fcd62b869dc8880f85891a2bd4f1c3
                                                    • Instruction ID: 518c1887ca69b6e5762608d0247ee196cf05594ac7c7634982f410512ab21eb6
                                                    • Opcode Fuzzy Hash: 1bcf7c784dae98e3a0021300a4b444aea9fcd62b869dc8880f85891a2bd4f1c3
                                                    • Instruction Fuzzy Hash: 02F03036640110DFCB019F94D888B98BBA4FF4D311F5081A9F6199B290CBB59854DB61
                                                    APIs
                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,r@,0040485C,r@,74DEDFF0,?,00000000,?,-@,0040490E,00000010,00402FA3), ref: 0040476B
                                                    • HeapFree.KERNEL32(00000000,?), ref: 004047A1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Free$HeapVirtual
                                                    • String ID: r@$r@
                                                    • API String ID: 3783212868-1712950306
                                                    • Opcode ID: 615be266f2133a35edff91ca5e545c140f31fce35e26d2f64644c01e7612d901
                                                    • Instruction ID: 9f28707f468f96f8ba01f1c404cbd9d3f6c084a3717c71e7c0065962692db169
                                                    • Opcode Fuzzy Hash: 615be266f2133a35edff91ca5e545c140f31fce35e26d2f64644c01e7612d901
                                                    • Instruction Fuzzy Hash: C6F01774544210DFC3248F08EE08A427BA0FB88720B11867EF996672E1C371AC50CF88
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog_memmove
                                                    • String ID: &'
                                                    • API String ID: 3529519853-655172784
                                                    • Opcode ID: 361fced60099b89e4497b5271b400dc2fdcd8476f2d9ac1203d28525da2b8e2c
                                                    • Instruction ID: c204fe145208204bd743e0ef1fba957198682444b7a05f2e8b3d7e3fb411c57c
                                                    • Opcode Fuzzy Hash: 361fced60099b89e4497b5271b400dc2fdcd8476f2d9ac1203d28525da2b8e2c
                                                    • Instruction Fuzzy Hash: 71613B71D00619DBDF21DFA4C981BEDFBBAEF49310F1481AAD405AB290D770AA45CFA1
                                                    APIs
                                                    • GetCPInfo.KERNEL32(?,00000000), ref: 00404ED1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: Info
                                                    • String ID: $
                                                    • API String ID: 1807457897-3032137957
                                                    • Opcode ID: ade2e129719512a706aeac876f0a8c01095c6a06ec5d81e25aee3eb1febfb5f9
                                                    • Instruction ID: e64d793a5bd47a750bf71bc710b27f1b951018593c94bf49e3c2bba34da37a12
                                                    • Opcode Fuzzy Hash: ade2e129719512a706aeac876f0a8c01095c6a06ec5d81e25aee3eb1febfb5f9
                                                    • Instruction Fuzzy Hash: 1D416B710142985EEB169714CE59FEB3FE8EB02704F1404F6DA49F61D2C2794924DBBB
                                                    APIs
                                                    • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02B98306,?,?,00000000), ref: 02B99603
                                                    • getsockname.WS2_32(?,?,?), ref: 02B99619
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorLastgetsockname
                                                    • String ID: &'
                                                    • API String ID: 566540725-655172784
                                                    • Opcode ID: 5adfb63f08369a716628935453de362d9fb5e08eb31bd35635ae71c816941254
                                                    • Instruction ID: 8d95fd3431113c356049e54fb014632197288361c484688f4318c53276596df3
                                                    • Opcode Fuzzy Hash: 5adfb63f08369a716628935453de362d9fb5e08eb31bd35635ae71c816941254
                                                    • Instruction Fuzzy Hash: 3A216072A04208DFDB10DF68D844ACEF7F5FF4D324F1185AAE919EB280DB30A9458B90
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9CBE7
                                                      • Part of subcall function 02B9D1C3: std::exception::exception.LIBCMT ref: 02B9D1F2
                                                      • Part of subcall function 02B9D979: __EH_prolog.LIBCMT ref: 02B9D97E
                                                      • Part of subcall function 02BA3A8F: _malloc.LIBCMT ref: 02BA3AA7
                                                      • Part of subcall function 02B9D222: __EH_prolog.LIBCMT ref: 02B9D227
                                                    Strings
                                                    • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02B9CC24
                                                    • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02B9CC1D
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$_mallocstd::exception::exception
                                                    • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                    • API String ID: 1953324306-1943798000
                                                    • Opcode ID: e0e51e3c8faee40dc4e89d3149069a10be77b43297f58259c67c5e55136f169d
                                                    • Instruction ID: 36439e664faec7d093a515bc07edc181e8dc8a678c39b62b50099e644a5a858e
                                                    • Opcode Fuzzy Hash: e0e51e3c8faee40dc4e89d3149069a10be77b43297f58259c67c5e55136f169d
                                                    • Instruction Fuzzy Hash: 8D21A271E012549ADF14EFE9D9546EDBBB9EF05704F1040EEE845AB280DB705A44CF51
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9CCDC
                                                      • Part of subcall function 02B9D29A: std::exception::exception.LIBCMT ref: 02B9D2C7
                                                      • Part of subcall function 02B9DAB0: __EH_prolog.LIBCMT ref: 02B9DAB5
                                                      • Part of subcall function 02BA3A8F: _malloc.LIBCMT ref: 02BA3AA7
                                                      • Part of subcall function 02B9D2F7: __EH_prolog.LIBCMT ref: 02B9D2FC
                                                    Strings
                                                    • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02B9CD12
                                                    • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02B9CD19
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$_mallocstd::exception::exception
                                                    • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                    • API String ID: 1953324306-412195191
                                                    • Opcode ID: bf178f5a92d4d9bd379d104b694bf6fafe0c90d3869017292ca3addda7d6f64d
                                                    • Instruction ID: 3c80ea203528aba22ad9cc03c647fd4baa2ecc07a97003008cd663bbfb22ced4
                                                    • Opcode Fuzzy Hash: bf178f5a92d4d9bd379d104b694bf6fafe0c90d3869017292ca3addda7d6f64d
                                                    • Instruction Fuzzy Hash: B3218071E002589BDF04EFE9D854AEDBBB9EF19304F2041EDE846AB240DBB05A44CF91
                                                    APIs
                                                    • _malloc.LIBCMT ref: 02B9535D
                                                      • Part of subcall function 02BA2EEC: __FF_MSGBANNER.LIBCMT ref: 02BA2F03
                                                      • Part of subcall function 02BA2EEC: __NMSG_WRITE.LIBCMT ref: 02BA2F0A
                                                      • Part of subcall function 02BA2EEC: RtlAllocateHeap.NTDLL(007F0000,00000000,00000001), ref: 02BA2F2F
                                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02B9536F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateFolderHeapPathSpecial_malloc
                                                    • String ID: \save.dat
                                                    • API String ID: 4128168839-3580179773
                                                    • Opcode ID: aea636678ce278f2b30ae7222799d759b868be7ab50f7f6b789756665e6dfffe
                                                    • Instruction ID: 2003706f2c8a3c4f74f3ba05e835677381df3afb85ea164f5462abae0e9c40da
                                                    • Opcode Fuzzy Hash: aea636678ce278f2b30ae7222799d759b868be7ab50f7f6b789756665e6dfffe
                                                    • Instruction Fuzzy Hash: E7113A729082457FDF339E658C909AFFFABDF82650B5441F9E84667202DAA21D06C7A0
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9396A
                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 02B939C1
                                                      • Part of subcall function 02B91410: std::exception::exception.LIBCMT ref: 02B91428
                                                      • Part of subcall function 02B9A551: __EH_prolog.LIBCMT ref: 02B9A556
                                                      • Part of subcall function 02B9A551: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02B9A565
                                                      • Part of subcall function 02B9A551: __CxxThrowException@8.LIBCMT ref: 02B9A584
                                                    Strings
                                                    • Day of month is not valid for year, xrefs: 02B939AC
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                    • String ID: Day of month is not valid for year
                                                    • API String ID: 1404951899-1521898139
                                                    • Opcode ID: 035b5a32c862bed0ce813ef4e0a04f761aa1ff3f9cb842f804cf65ad6b39a063
                                                    • Instruction ID: c7587cfa7e87612a7200696c2628beafda3420b8c3a122bc678ae2c13a8d7e9f
                                                    • Opcode Fuzzy Hash: 035b5a32c862bed0ce813ef4e0a04f761aa1ff3f9cb842f804cf65ad6b39a063
                                                    • Instruction Fuzzy Hash: C401D87691420AAADF05EFA4D445AFEB779FF18710F4080AAFC0493300EB748A55DB95
                                                    APIs
                                                    • std::exception::exception.LIBCMT ref: 02B9FA4A
                                                    • __CxxThrowException@8.LIBCMT ref: 02B9FA5F
                                                      • Part of subcall function 02BA3A8F: _malloc.LIBCMT ref: 02BA3AA7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Exception@8Throw_mallocstd::exception::exception
                                                    • String ID: bad allocation
                                                    • API String ID: 4063778783-2104205924
                                                    • Opcode ID: c35f68c556fbbe58bd67433758cff7aea10f0f89b3de6c5efab80e2705bd3ae9
                                                    • Instruction ID: 8913fe1e6cf761fe3454ce9c331ce226305fe67b15f2b5bb3bb5173fb69d6d49
                                                    • Opcode Fuzzy Hash: c35f68c556fbbe58bd67433758cff7aea10f0f89b3de6c5efab80e2705bd3ae9
                                                    • Instruction Fuzzy Hash: B6F08270604309AADF04EAA998659BF73EDEB04255B9005EAE925E2680EFF0F6048594
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B93C1B
                                                    • std::bad_exception::bad_exception.LIBCMT ref: 02B93C30
                                                      • Part of subcall function 02BA23F7: std::exception::exception.LIBCMT ref: 02BA2401
                                                      • Part of subcall function 02B9A58A: __EH_prolog.LIBCMT ref: 02B9A58F
                                                      • Part of subcall function 02B9A58A: __CxxThrowException@8.LIBCMT ref: 02B9A5B8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                    • String ID: bad cast
                                                    • API String ID: 1300498068-3145022300
                                                    • Opcode ID: abc38eaa4ced72803f05fe1d0348e39de3a8c513913b7a56672c91b4a1e137d0
                                                    • Instruction ID: 71157c1cf6acb09608863b9cb94dac9186f0b8f49038ae931017c42b8aa020a3
                                                    • Opcode Fuzzy Hash: abc38eaa4ced72803f05fe1d0348e39de3a8c513913b7a56672c91b4a1e137d0
                                                    • Instruction Fuzzy Hash: D7F0A0729045048BCB1AEF58D450AFAF7B5EF52311F4080EEEE065B250CBB2DA4ACB91
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B93886
                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 02B938A5
                                                      • Part of subcall function 02B91410: std::exception::exception.LIBCMT ref: 02B91428
                                                      • Part of subcall function 02B988BF: _memmove.LIBCMT ref: 02B988DF
                                                    Strings
                                                    • Day of month value is out of range 1..31, xrefs: 02B93894
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                    • String ID: Day of month value is out of range 1..31
                                                    • API String ID: 3258419250-1361117730
                                                    • Opcode ID: e791fad8b4c18725851ace8146658f2bc4419c93f3a1918ae2d5d6be738847f4
                                                    • Instruction ID: f326c8a8ed1c2d7f4bcb2097a74bcb80453f07966e65b162e68e549c5014a710
                                                    • Opcode Fuzzy Hash: e791fad8b4c18725851ace8146658f2bc4419c93f3a1918ae2d5d6be738847f4
                                                    • Instruction Fuzzy Hash: 34E09272E1410497EB25AF988811BFDB779DF48B10F4040DAE40163380DAF519408F95
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B938D2
                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 02B938F1
                                                      • Part of subcall function 02B91410: std::exception::exception.LIBCMT ref: 02B91428
                                                      • Part of subcall function 02B988BF: _memmove.LIBCMT ref: 02B988DF
                                                    Strings
                                                    • Year is out of valid range: 1400..10000, xrefs: 02B938E0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                    • String ID: Year is out of valid range: 1400..10000
                                                    • API String ID: 3258419250-2344417016
                                                    • Opcode ID: d1449389ca40c2459cee6aca183e547dfae0bfb8b748b93a127e2c35fbf86d85
                                                    • Instruction ID: dedd89c565055f223df151f105a2a7ca56d07c61df2772a5e3a745d83d012e3f
                                                    • Opcode Fuzzy Hash: d1449389ca40c2459cee6aca183e547dfae0bfb8b748b93a127e2c35fbf86d85
                                                    • Instruction Fuzzy Hash: 6FE09272E5410497EB25EF9888117FDB779DF48710F4044DAE40167280DAF11944CF91
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B9391E
                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 02B9393D
                                                      • Part of subcall function 02B91410: std::exception::exception.LIBCMT ref: 02B91428
                                                      • Part of subcall function 02B988BF: _memmove.LIBCMT ref: 02B988DF
                                                    Strings
                                                    • Month number is out of range 1..12, xrefs: 02B9392C
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                    • String ID: Month number is out of range 1..12
                                                    • API String ID: 3258419250-4198407886
                                                    • Opcode ID: a8e752a2b62437c327c834a365cd95b1e9acc9a17572f712d6a58c8f8dbf16f5
                                                    • Instruction ID: e2800e3cfb1ab50b9582153eb4cd1f6decff29f418af041e666b264d9a759d29
                                                    • Opcode Fuzzy Hash: a8e752a2b62437c327c834a365cd95b1e9acc9a17572f712d6a58c8f8dbf16f5
                                                    • Instruction Fuzzy Hash: 97E09272E1410897EB25BF9888517FDB779DF18710F4040EAE80163280DAF12940CB91
                                                    APIs
                                                    • TlsAlloc.KERNEL32 ref: 02B919CC
                                                    • GetLastError.KERNEL32 ref: 02B919D9
                                                      • Part of subcall function 02B91712: __EH_prolog.LIBCMT ref: 02B91717
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocErrorH_prologLast
                                                    • String ID: tss
                                                    • API String ID: 249634027-1638339373
                                                    • Opcode ID: 5e6aae6d8ab7dd25f8b2ef4cc3a0f6a079c364f0a46b74acb60155b2b533ee5f
                                                    • Instruction ID: 06806d56d61d01a46a4052bb9b355a2a807414f2ea1b2a56c9df0282029469f6
                                                    • Opcode Fuzzy Hash: 5e6aae6d8ab7dd25f8b2ef4cc3a0f6a079c364f0a46b74acb60155b2b533ee5f
                                                    • Instruction Fuzzy Hash: 59E04F329142115B86017A78D80809BBBA49B40274F108BA7EDBA832D0EA7099109AC6
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 02B93BD8
                                                    • std::bad_exception::bad_exception.LIBCMT ref: 02B93BED
                                                      • Part of subcall function 02BA23F7: std::exception::exception.LIBCMT ref: 02BA2401
                                                      • Part of subcall function 02B9A58A: __EH_prolog.LIBCMT ref: 02B9A58F
                                                      • Part of subcall function 02B9A58A: __CxxThrowException@8.LIBCMT ref: 02B9A5B8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2929379695.0000000002B91000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B91000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_2b91000_freeprogramingtv32.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                    • String ID: bad cast
                                                    • API String ID: 1300498068-3145022300
                                                    • Opcode ID: 65fa484a0889356a721ff6892ffff3d3cab8d5d0e6de5a0a84ab23d9d34a2b66
                                                    • Instruction ID: e25df86f71baca2f0f72cbd864c216c74308ce7bada8559852491e023a5c8e3d
                                                    • Opcode Fuzzy Hash: 65fa484a0889356a721ff6892ffff3d3cab8d5d0e6de5a0a84ab23d9d34a2b66
                                                    • Instruction Fuzzy Hash: A9E01A719041099BCB1AEF54D551BB8B7B1EF15300F4080EDE90657290CB769956CE96
                                                    APIs
                                                    • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 00404494
                                                    • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044C8
                                                    • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044E2
                                                    • HeapFree.KERNEL32(00000000,?,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044F9
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.2928140086.0000000000400000.00000040.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.2928140086.0000000000409000.00000040.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_freeprogramingtv32.jbxd
                                                    Similarity
                                                    • API ID: AllocHeap$FreeVirtual
                                                    • String ID:
                                                    • API String ID: 3499195154-0
                                                    • Opcode ID: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                    • Instruction ID: 6532d2b8740b88ca5c68c93f46193dcc45771cdeba7f909f778517217a69801f
                                                    • Opcode Fuzzy Hash: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                    • Instruction Fuzzy Hash: 02113670200301AFC731CF29EE45A627BB5FB847207104A3AF252E65F0D775A866EF19